Author of the publication

Modeling and detecting the cascade vulnerability problem using soft constraints.

, , and . SAC, page 383-390. ACM, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast automatic synthesis of security protocols using backward search., and . FMSE, page 1-10. ACM, (2003)What You Can Change and What You Can't: Human Experience in Computer Network Defenses., and . NordSec, volume 11252 of Lecture Notes in Computer Science, page 219-235. Springer, (2018)Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems.. IFIPTM, volume 401 of IFIP Advances in Information and Communication Technology, page 193-207. Springer, (2013)Avoiding inconsistencies in the Security Content Automation Protocol., and . CNS, page 454-461. IEEE, (2013)Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion).. Security Protocols Workshop, volume 8809 of Lecture Notes in Computer Science, page 28-37. Springer, (2014)Building Chinese walls in standard unixTM.. Comput. Secur., 16 (6): 551-563 (1997)Reasoning about firewall policies through refinement and composition., and . J. Comput. Secur., 26 (2): 207-254 (2018)The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties.. ACM Conference on Computer and Communications Security, page 125-134. ACM, (1997)Are handheld viruses a significant threat?, and . Commun. ACM, 44 (1): 105-107 (2001)Automated Smartphone Security Configuration., , and . DPM/SETOP, volume 7731 of Lecture Notes in Computer Science, page 227-242. Springer, (2012)