Search results for: Nora Cuppens-Boulahia
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Harnessing Context > 176-195
Lecture Notes in Computer Science > Data Privacy Management and Autonomous Spontaneous Security > Data Privacy Management > 121-135
Lecture Notes in Computer Science > Engineering Secure Software and Systems > Session 4. Policy Verification and Enforcement II > 123-139
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Access Control > 127-137
Lecture Notes in Computer Science > Information and Communications Security > Access Control > 190-205
Lecture Notes in Computer Science > Information Systems Security > Data and Application Security > 101-115
Lecture Notes in Computer Science > Computer Safety, Reliability, and Security > Networks Dependability > 182-194
Lecture Notes in Computer Science > Data Privacy Management and Autonomous Spontaneous Security > Autonomous and Spontaneous Security > 153-162
Lecture Notes in Computer Science > Data Privacy Management and Autonomous Spontaneous Security > Autonomous and Spontaneous Security > 203-215
Lecture Notes in Computer Science > Critical Information Infrastructures Security > Session 2: Communication Risk and Assurance I > 58-70
Lecture Notes in Computer Science > Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues > ASIAN’2006 > 45-59
Lecture Notes in Computer Science > Computer Security – ESORICS 2010 > Network Security and Economics > 626-642