Items where Division is "Faculty of Computing, Engineering and the Built Environment > School of Computing and Digital Technology > Cyber Security" and Year is 2008

Up a level
Export as [feed] RSS
Group by: Creators | Item Type | No Grouping
Jump to: A | H | P
Number of items: 6.

A

Abdallah, Ali E. and Takabi, Hassan (2008) Integrating Delegation with the Formal Core RBAC Model. In: Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference. IEEE Conference Publications, pp. 33-36. ISBN 978-0-7695-3324-7

H

Haidar, Ali N. and Abdallah, Ali E. (2008) Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations. In: Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference. IEEE Conference Publications, pp. 21-26. ISBN 978-0-7695-3324-7

Haidar, Ali Nasrat and Abdallah, Ali E. (2008) Composition and Customization of Web Services Using Wrappers: A Formal Approach Based on CSP. In: Software Engineering Workshop, 2008. SEW '08. 32nd Annual IEEE. IEEE Conference Publications, pp. 187-194. ISBN 978-0-7695-3617-0

Haidar, Ali Nasrat and Abdallah, Ali E. (2008) Composition of Web Services Using Wrappers. In: Leveraging Applications of Formal Methods, Verification and Validation. Springer, pp. 862-865. ISBN 0302-9743

Haidar, Ali Nasrat and Abdallah, Ali E. (2008) Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion. In: Leveraging Applications of Formal Methods, Verification and Validation. Springer, pp. 831-846. ISBN 0302-9743

P

Palomar, Esther and Tapiador, Juan M.E. and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Secure content access and replication in pure P2P networks. Computer Communications, 31 (2). pp. 266-279. ISSN 0140-3664

This list was generated on Tue Oct 26 20:01:00 2021 UTC.

Research

In this section...