2 research outputs found

    Foundations of Security Analysis and Design IV

    No full text
    The proceedings contain 10 papers. The topics discussed include: secure service orchestration; IT security analysis best-practices and formal approaches; enhancing Java security with history based access control; on the protection and technologies of critical information infrastructures; a interpretation of identity-based cryptography; trust and reputation systems; an introduction to the role based trust management framework RT; and trusted mobile platforms

    Foundations of Security Analysis and Design IV

    No full text
    The proceedings contain 10 papers. The topics discussed include: secure service orchestration; IT security analysis best-practices and formal approaches; enhancing Java security with history based access control; on the protection and technologies of critical information infrastructures; a interpretation of identity-based cryptography; trust and reputation systems; an introduction to the role based trust management framework RT; and trusted mobile platforms
    corecore