-
1
-
-
84948414101
-
Soft constraints for security protocol analysis: Confidentiality
-
LNCS 1990
-
Bella, G., and Bistarelli, S. 2001. Soft Constraints for Security Protocol Analysis: Confidentiality. In Proc. of PADL'01, LNCS 1990, 108-122.
-
(2001)
Proc. of PADL'01
, pp. 108-122
-
-
Bella, G.1
Bistarelli, S.2
-
4
-
-
0003369786
-
Semiring-based CSPs and Valued CSPs: Frameworks, properties, and comparison
-
Bistarelli, S.; Fargier, H.; Montanari, U.; Rossi, F.; Schiex, T.; and Verfaillie, G. 1999. Semiring-based CSPs and Valued CSPs: Frameworks, properties, and comparison. CONSTRAINTS: An international journal. Kluwer 4(3).
-
(1999)
CONSTRAINTS: An International Journal. Kluwer
, vol.4
, Issue.3
-
-
Bistarelli, S.1
Fargier, H.2
Montanari, U.3
Rossi, F.4
Schiex, T.5
Verfaillie, G.6
-
5
-
-
0031095278
-
Semiring-based Constraint Solving and Optimization
-
Bistarelli, S.; Montanari, U.; and Rossi, F. 1997. Semiring-based Constraint Solving and Optimization. JACM 44(2):201-236.
-
(1997)
JACM
, vol.44
, Issue.2
, pp. 201-236
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
7
-
-
0027559721
-
A shortest path network security model
-
Fitch, J. A., and Hoffman, L. J. 1993. A shortest path network security model. Computers and Security 12(2):169-189.
-
(1993)
Computers and Security
, vol.12
, Issue.2
, pp. 169-189
-
-
Fitch, J.A.1
Hoffman, L.J.2
-
9
-
-
0027969913
-
The complexity and composability of secure interoperation
-
Oakland, CA: IEEE Comp. Soc. Press
-
Gong, L., and Qian, X. 1994. The complexity and composability of secure interoperation. In Proceedings of the Symposium on Security and Privacy, 190-200. Oakland, CA: IEEE Comp. Soc. Press.
-
(1994)
Proceedings of the Symposium on Security and Privacy
, pp. 190-200
-
-
Gong, L.1
Qian, X.2
-
10
-
-
0032045587
-
The cascade vulnerability problem: The detection problem and a simulated annealing approach to its correction
-
Gritalis, S., and Spinellis, D. 1998. The cascade vulnerability problem: The detection problem and a simulated annealing approach to its correction. Microprocessors and Microsystems 21(10):621-628.
-
(1998)
Microprocessors and Microsystems
, vol.21
, Issue.10
, pp. 621-628
-
-
Gritalis, S.1
Spinellis, D.2
-
11
-
-
84974751467
-
The cascade vulnerability problem
-
Horton, R., et al. 1993. The cascade vulnerability problem, Journal of Computer Security 2(4):279-290.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.4
, pp. 279-290
-
-
Horton, R.1
-
14
-
-
0028567611
-
A filtering algorithm for constraints of difference in csps
-
Regin, J.-C. 1994. A filtering algorithm for constraints of difference in csps. In Proceedings AAAI-94, 362-367.
-
(1994)
Proceedings AAAI-94
, pp. 362-367
-
-
Regin, J.-C.1
-
15
-
-
2442558738
-
Computer security requirements - Guidance for applying the department of defense trusted computer system evaluation criteria in specific environments
-
National Computer Security Center. Orange Book
-
TCSEC. 19385. Computer security requirements - guidance for applying the department of defense trusted computer system evaluation criteria in specific environments. Technical Report CSC-STD-003-85, National Computer Security Center. Orange Book.
-
(1985)
Technical Report
, vol.CSC-STD-003-85
-
-
-
16
-
-
2442613539
-
Trusted computer system evaluation criteria: Trusted network interpretation
-
National Computer Security Center. Red Book
-
TNI. 1987. Trusted computer system evaluation criteria: Trusted network interpretation. Technical report, National Computer Security Center. Red Book.
-
(1987)
Technical Report
-
-
-
17
-
-
0001737878
-
Practical applications of constraint programming
-
Wallace, M. 1996. Practical applications of constraint programming. Constraints 1(1-2):139-168.
-
(1996)
Constraints
, vol.1
, Issue.1-2
, pp. 139-168
-
-
Wallace, M.1
|