1
TITLE: Informative Types and Effects for Hybrid Migration Control
AUTHORS: Ana Almeida Matos ; Jan Cederquist ;
PUBLISHED: 2013, SOURCE: 4th International Conference on Runtime Verification (RV) in RUNTIME VERIFICATION, RV 2013, VOLUME: 8174
INDEXED IN: Scopus WOS DBLP CrossRef
2
TITLE: Risk balance in optimistic non-repudiation protocols
AUTHORS: Torabi Dashti, M; Cederquist, J ; Wang, Y;
PUBLISHED: 2012, SOURCE: 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 7140 LNCS
INDEXED IN: Scopus CrossRef
3
TITLE: Complexity of fairness constraints for the Dolev-Yao attacker model  Full Text
AUTHORS: Cederquist, J ; Dashti, MT;
PUBLISHED: 2011, SOURCE: 26th Annual ACM Symposium on Applied Computing, SAC 2011 in Proceedings of the ACM Symposium on Applied Computing
INDEXED IN: Scopus CrossRef
4
TITLE: Non-disclosure for distributed mobile code
AUTHORS: Ana Almeida Matos ; Jan Cederquist ;
PUBLISHED: 2011, SOURCE: MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, VOLUME: 21, ISSUE: 6
INDEXED IN: Scopus WOS DBLP CrossRef
5
TITLE: Software verification and testing track
AUTHORS: Cederquist, J ;
PUBLISHED: 2011, SOURCE: 26th Annual ACM Symposium on Applied Computing, SAC 2011 in Proceedings of the ACM Symposium on Applied Computing
INDEXED IN: Scopus
6
TITLE: A certified email protocol using key chains
AUTHORS: Cederquist, J ; Dashti, MT; Mauw, S;
PUBLISHED: 2007, SOURCE: 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07 in Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07, VOLUME: 2
INDEXED IN: Scopus CrossRef
7
TITLE: Audit-based compliance control  Full Text
AUTHORS: Cederquist, JG ; Corin, R; Dekker, MAC; Etalle, S; den Hartog, JI; Lenzini, G;
PUBLISHED: 2007, SOURCE: 2nd International Workshop on Formal Aspects in Security and Trust held at the 18th World Computer Congress in INTERNATIONAL JOURNAL OF INFORMATION SECURITY, VOLUME: 6, ISSUE: 2-3
INDEXED IN: Scopus WOS CrossRef
8
TITLE: Extended privilege inheritance in RBAC
AUTHORS: Dekker, MAC; Cederquist, JG ; Crampton, J; Etalle, S;
PUBLISHED: 2007, SOURCE: 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 in Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
INDEXED IN: Scopus CrossRef