Toggle navigation
Publications
Researchers
Institutions
0
Sign In
Federated Authentication
(Click on the image)
Local Sign In
Password Recovery
Register
Sign In
Jan Gunnar Cederquist
AuthID:
R-000-HZQ
Publications
Confirmed
To Validate
Document Source:
All
Document Type:
All Document Types
Proceedings Paper (5)
Article (2)
Editorial Material (1)
Year Start - End:
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
-
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
Order:
Year Dsc
Year Asc
Cit. WOS Dsc
IF WOS Dsc
Cit. Scopus Dsc
IF Scopus Dsc
Title Asc
Title Dsc
Results:
10
20
30
40
50
Confirmed Publications: 8
1
TITLE:
Informative Types and Effects for Hybrid Migration Control
AUTHORS:
Ana Almeida Matos
;
Jan Cederquist
;
PUBLISHED:
2013
,
SOURCE:
4th International Conference on Runtime Verification (RV)
in
RUNTIME VERIFICATION, RV 2013,
VOLUME:
8174
INDEXED IN:
Scopus
WOS
DBLP
CrossRef
2
TITLE:
Risk balance in optimistic non-repudiation protocols
AUTHORS:
Torabi Dashti, M;
Cederquist, J
; Wang, Y;
PUBLISHED:
2012
,
SOURCE:
8th International Workshop on Formal Aspects of Security and Trust, FAST 2011
in
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
VOLUME:
7140 LNCS
INDEXED IN:
Scopus
CrossRef
3
TITLE:
Complexity of fairness constraints for the Dolev-Yao attacker model
Full Text
AUTHORS:
Cederquist, J
; Dashti, MT;
PUBLISHED:
2011
,
SOURCE:
26th Annual ACM Symposium on Applied Computing, SAC 2011
in
Proceedings of the ACM Symposium on Applied Computing
INDEXED IN:
Scopus
CrossRef
4
TITLE:
Non-disclosure for distributed mobile code
AUTHORS:
Ana Almeida Matos
;
Jan Cederquist
;
PUBLISHED:
2011
,
SOURCE:
MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE,
VOLUME:
21,
ISSUE:
6
INDEXED IN:
Scopus
WOS
DBLP
CrossRef
5
TITLE:
Software verification and testing track
AUTHORS:
Cederquist, J
;
PUBLISHED:
2011
,
SOURCE:
26th Annual ACM Symposium on Applied Computing, SAC 2011
in
Proceedings of the ACM Symposium on Applied Computing
INDEXED IN:
Scopus
6
TITLE:
A certified email protocol using key chains
AUTHORS:
Cederquist, J
; Dashti, MT;
Mauw, S
;
PUBLISHED:
2007
,
SOURCE:
21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07
in
Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07,
VOLUME:
2
INDEXED IN:
Scopus
CrossRef
7
TITLE:
Audit-based compliance control
Full Text
AUTHORS:
Cederquist, JG
; Corin, R; Dekker, MAC;
Etalle, S
; den Hartog, JI; Lenzini, G;
PUBLISHED:
2007
,
SOURCE:
2nd International Workshop on Formal Aspects in Security and Trust held at the 18th World Computer Congress
in
INTERNATIONAL JOURNAL OF INFORMATION SECURITY,
VOLUME:
6,
ISSUE:
2-3
INDEXED IN:
Scopus
WOS
CrossRef
8
TITLE:
Extended privilege inheritance in RBAC
AUTHORS:
Dekker, MAC;
Cederquist, JG
; Crampton, J;
Etalle, S
;
PUBLISHED:
2007
,
SOURCE:
2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
in
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
INDEXED IN:
Scopus
CrossRef
Add to Marked List
Check All
Export
×
Publication Export Settings
BibTex
EndNote
APA
CSV
PDF
Export Preview
Print
×
Publication Print Settings
HTML
PDF
Print Preview
×
Select Source
This publication has:
2 records from
ISI
2 records from
SCOPUS
2 records from
DBLP
2 records from
Unpaywall
2 records from
Openlibrary
2 records from
Handle
Please select which records must be used by Authenticus!
×
Preview Publications
© 2024 CRACS & Inesc TEC - All Rights Reserved
Privacy Policy
|
Terms of Service