Filter your results
- 4
- 4
- 4
- 1
- 2
- 1
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Re-designing the Web’s Access Control System23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.4-11, ⟨10.1007/978-3-642-22348-8_2⟩
Conference papers
hal-01586586v1
|
||
|
Real-Time System for Assessing the Information Security of Computer Networks1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.123-133, ⟨10.1007/978-3-642-19228-9_11⟩
Conference papers
hal-01581341v1
|
||
|
Throwing a MonkeyWrench into Web Attackers Plans11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.28-39, ⟨10.1007/978-3-642-13241-4_4⟩
Conference papers
hal-01056370v1
|
||
|
Semantically Sound Analysis of Content Security Policies39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.293-297, ⟨10.1007/978-3-030-21759-4_18⟩
Conference papers
hal-02313752v1
|