메뉴 건너뛰기




Volumn , Issue , 2014, Pages 2584-2589

Monitoring confidentiality by diagnosis techniques

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL ENGINEERING;

EID: 84955199515     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.23919/ecc.2009.7074795     Document Type: Conference Paper
Times cited : (8)

References (13)
  • 2
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • G. Lowe, "Towards a completeness result for model checking of security protocols," Journal of Computer Security, vol. 7, 1999.
    • (1999) Journal of Computer Security , vol.7
    • Lowe, G.1
  • 8
    • 84928178790 scopus 로고    scopus 로고
    • Monitoring information flow by diagnosis techniques
    • August
    • J. Dubreil, T. Jéron, and H. Marchand, "Monitoring information flow by diagnosis techniques," IRISA, Tech. Rep. 1901, August 2008.
    • (2008) IRISA, Tech. Rep. , vol.1901
    • Dubreil, J.1    Jéron, T.2    Marchand, H.3
  • 10
    • 79961019944 scopus 로고    scopus 로고
    • Predictability of sequence patterns in discrete event systems
    • Seoul, Korea, July
    • T. Jéron, H. Marchand, S. Genc, and S. Lafortune, "Predictability of sequence patterns in discrete event systems," in IFAC World Congress, Seoul, Korea, July 2008.
    • (2008) IFAC World Congress
    • Jéron, T.1    Marchand, H.2    Genc, S.3    Lafortune, S.4
  • 11
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • F. B. Schneider, "Enforceable security policies," ACM Trans. Inf. Syst. Secur., vol. 3, no. 1, pp. 30-50, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 12
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • Feb
    • J. Ligatti, L. Bauer, and D. Walker, "Edit automata: Enforcement mechanisms for run-time security policies," International Journal of Information Security, vol. 4, no. 1-2, pp. 2-16, Feb. 2005.
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.