Filter your results
- 7
- 7
- 7
- 1
- 5
- 2
- 2
- 1
- 2
- 1
- 1
- 2
- 4
- 1
- 2
- 1
- 7
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Collaborative Approach to Botnet ProtectionInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.624-638, ⟨10.1007/978-3-642-32498-7_47⟩
Conference papers
hal-01542425v1
|
||
|
Replica-Based High-Performance Tuple Space Computing17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.3-18, ⟨10.1007/978-3-319-19282-6_1⟩
Conference papers
hal-01774936v1
|
||
|
Klaim-DB: A Modeling Language for Distributed Database Applications17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.197-212, ⟨10.1007/978-3-319-19282-6_13⟩
Conference papers
hal-01774934v1
|
||
|
Attack Tree Generation by Policy Invalidation9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.249-259, ⟨10.1007/978-3-319-24018-3_16⟩
Conference papers
hal-01442547v1
|
||
|
A Fixpoint-Based Calculus for Graph-Shaped Computational Fields17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.101-116, ⟨10.1007/978-3-319-19282-6_7⟩
Conference papers
hal-01774933v1
|
||
|
Integrating Attributes into Role-Based Access Control29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.242-249, ⟨10.1007/978-3-319-20810-7_17⟩
Conference papers
hal-01745833v1
|
||
|
Recursive Advice for Coordination14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.137-151, ⟨10.1007/978-3-642-30829-1_10⟩
Conference papers
hal-01529587v1
|