Publisher: IOS Press
< previous issue
next issue >
Multilevel secure transaction processing
Jajodia, S.; Atluri, V.; Keefe, T.F.; McCollum, C.D.; Mukkamala, R.
Relations between secrets: two formal analyses of the Yahalom protocol
Model checking security properties of control flow graphs
Besson, F.; Jensen, T.; Le Métayer, D.; Thorn, T.
Here are a few pages on the site that we think you may find useful: