1
TÍTULO: Informative Types and Effects for Hybrid Migration Control
AUTORES: Ana Almeida Matos ; Jan Cederquist ;
PUBLICAÇÃO: 2013, FONTE: 4th International Conference on Runtime Verification (RV) in RUNTIME VERIFICATION, RV 2013, VOLUME: 8174
INDEXADO EM: Scopus WOS DBLP CrossRef
2
TÍTULO: Risk balance in optimistic non-repudiation protocols
AUTORES: Torabi Dashti, M; Cederquist, J ; Wang, Y;
PUBLICAÇÃO: 2012, FONTE: 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 7140 LNCS
INDEXADO EM: Scopus CrossRef
3
TÍTULO: Complexity of fairness constraints for the Dolev-Yao attacker model  Full Text
AUTORES: Cederquist, J ; Dashti, MT;
PUBLICAÇÃO: 2011, FONTE: 26th Annual ACM Symposium on Applied Computing, SAC 2011 in Proceedings of the ACM Symposium on Applied Computing
INDEXADO EM: Scopus CrossRef
4
TÍTULO: Non-disclosure for distributed mobile code
AUTORES: Ana Almeida Matos ; Jan Cederquist ;
PUBLICAÇÃO: 2011, FONTE: MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, VOLUME: 21, NÚMERO: 6
INDEXADO EM: Scopus WOS DBLP CrossRef
5
TÍTULO: Software verification and testing track
AUTORES: Cederquist, J ;
PUBLICAÇÃO: 2011, FONTE: 26th Annual ACM Symposium on Applied Computing, SAC 2011 in Proceedings of the ACM Symposium on Applied Computing
INDEXADO EM: Scopus
6
TÍTULO: A certified email protocol using key chains
AUTORES: Cederquist, J ; Dashti, MT; Mauw, S;
PUBLICAÇÃO: 2007, FONTE: 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07 in Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07, VOLUME: 2
INDEXADO EM: Scopus CrossRef
7
TÍTULO: Audit-based compliance control  Full Text
AUTORES: Cederquist, JG ; Corin, R; Dekker, MAC; Etalle, S; den Hartog, JI; Lenzini, G;
PUBLICAÇÃO: 2007, FONTE: 2nd International Workshop on Formal Aspects in Security and Trust held at the 18th World Computer Congress in INTERNATIONAL JOURNAL OF INFORMATION SECURITY, VOLUME: 6, NÚMERO: 2-3
INDEXADO EM: Scopus WOS CrossRef
8
TÍTULO: Extended privilege inheritance in RBAC
AUTORES: Dekker, MAC; Cederquist, JG ; Crampton, J; Etalle, S;
PUBLICAÇÃO: 2007, FONTE: 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 in Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
INDEXADO EM: Scopus CrossRef