From post

A Logic-Based Reasoner for Discovering Authentication Vulnerabilities Between Interconnected Accounts.

, , и . ETAA@ESORICS, том 11263 из Lecture Notes in Computer Science, стр. 73-87. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Conflict Analysis for Management Policies., и . Integrated Network Management, том 86 из IFIP Conference Proceedings, стр. 430-443. Chapman & Hall, (1997)HA-Grid: Security Aware Hazard Analysis for Smart Grids., , , , , , и . SmartGridComm, стр. 446-452. IEEE, (2022)The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment., , , , , , , , , и 2 other автор(ы). POLICY, стр. 247-249. IEEE Computer Society, (2008)The Uses of Role Hierarchies in Access Control., и . ACM Workshop on Role-Based Access Control, стр. 153-160. ACM, (1999)Use of Roles and Policies for Specifying and Managing a Virtual Enterprise., , и . RIDE, стр. 72-79. IEEE Computer Society, (1999)Workflow-Based Composition of Web-Services: A Business Model or a Programming Paradigm?, и . EDOC, стр. 273-284. IEEE Computer Society, (2002)An Efficient Policy System for Body Sensor Networks., , , , , и . ICPADS, стр. 383-390. IEEE Computer Society, (2008)Security policy refinement using data integration: a position paper., , , , и . SafeConfig, стр. 25-28. ACM, (2009)Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical Devices., и . IEEE Trans. Dependable Secur. Comput., 18 (2): 875-888 (2021)PEACE: A Policy-Based Establishment of Ad-hoc Communities., , и . ACSAC, стр. 386-395. IEEE Computer Society, (2004)