Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 20 di 36
Titolo Data di pubblicazione Autori Tipo File Abstract
Boundary inference for enforcing security policies in mobile ambients 2002 C. Braghin + Book Part (author) -
Control flow analysis of mobile ambients with security boundaries 2002 C. Braghin + Book Part (author) -
Security boundaries in mobile ambients 2002 C. Braghin + Article (author) -
Complexity of nesting analysis in mobile ambients 2003 C. Braghin + Book Part (author) -
BANANA : a tool for boundary ambients nesting analysis 2003 C. Braghin + Book Part (author) -
Information leakage detection in boundary ambients 2003 C. Braghin + Article (author) -
Nesting analysis of mobile ambients 2004 C. Braghin + Article (author) -
A distributed calculus for role-based access control 2004 C. Braghin + Book Part (author) -
Checking integrity via CoPS and Banana : the E-commerce case study 2004 C. Braghin + Article (author) -
Behind BANANA : design and implementation of a tool for nesting analysis of mobile ambients 2004 C. Braghin + Article (author) -
Defining the total cost of ownership for the transition to open source systems 2005 C. Braghin + Book Part (author) -
Analisi dei costi di proprietà di prodotti software nella transizione a sistemi open source 2005 C. Braghin + Book Part (author) -
Role-based access control for a distributed calculus 2006 C. Braghin + Article (author) -
Modeling and verification of mobile systems 2006 Chiara Braghin + Book Part (author) -
Automated verification of security policies in mobile code 2007 Chiara Braghin + Book Part (author) -
Information flow security in boundary ambients 2008 C. Braghin + Article (author) -
An exact approach for solving the balanced minimum evolution problem 2008 R. AringhieriC. Braghin + Book Part (author) -
Net privacy 2009 M. CremoniniC. BraghinC.A. Ardagna Book Part (author) -
A model checking-based approach for security policy verification of mobile systems 2011 C. Braghin + Article (author) -
The binary perfect phylogeny with persistent characters 2012 C. BraghinG. Trucco + Article (author) -
Mostrati risultati da 1 a 20 di 36
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile