共 50 条
- [1] Adaptable Authentication Model: Exploring Security with Weaker Attacker Models [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2011, 6542 : 234 - 247
- [3] A Generic Framework for Information Security Policy Development [J]. 2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), 2017, : 320 - 325
- [4] Grid Cyber-Security Strategy in an Attacker-Defender Model [J]. 2020 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2020,
- [5] Introducing security aspects with model transformation [J]. 12TH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2005, : 543 - 549
- [6] Introducing a new framework for using generic Information Delivery Manuals [J]. EWORK AND EBUSINESS IN ARCHITECTURE, ENGINEERING AND CONSTRUCTION 2014, 2015, : 295 - 301
- [8] A note on security proofs in the generic model [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 458 - 469
- [9] A generic model for analyzing security protocols [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 119 - 128
- [10] A Generic Model for Delegation in Security Policies [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING (COMNET 2009), 2009, : 125 - 132