home
news
Statistics
browse
conferences
journals
series
search
author
CompleteSearch
Faceted Search @ L3S
Free Search @ isearch
about
f.a.q.
team
legal bits
Electronic Notes in Theoretical Computer Science
, Volume 121
Volume 121, February 2005
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004)
view
electronic edition via DOI
export record as
BibTeX
XML
dblp key:
journals/entcs/BusiGM05
ask others
Google
Google Scholar
MS Academic Search
PubZone
Nadia Busi
,
Roberto Gorrieri
,
Fabio Martinelli
:
Preface.
1-2
view
electronic edition via DOI
export record as
BibTeX
XML
dblp key:
journals/entcs/AalstM05
ask others
Google
Google Scholar
MS Academic Search
PubZone
Wil M. P. van der Aalst
,
Ana Karla A. de Medeiros
:
Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance.
3-21
view
electronic edition via DOI
export record as
BibTeX
XML
dblp key:
journals/entcs/BaldiBFT05
ask others
Google
Google Scholar
MS Academic Search
PubZone
Giacomo Baldi
,
Andrea Bracciali
,
Gian Luigi Ferrari
,
Emilio Tuosto
:
A Coordination-based Methodology for Security Protocol Verification.
23-46
view
electronic edition via DOI
export record as
BibTeX
XML
dblp key:
journals/entcs/CorinDE05
ask others
Google
Google Scholar
MS Academic Search
PubZone
Ricardo Corin
,
Jeroen Doumen
,
Sandro Etalle
:
Analysing Password Protocol Security Against Off-line Dictionary Attacks.
47-63
view
electronic edition via DOI
export record as
BibTeX
XML
dblp key:
journals/entcs/BodeiCDP05
ask others
Google
Google Scholar
MS Academic Search
PubZone
Chiara Bodei
,
Michele Curti
,
Pierpaolo Degano
,
Corrado Priami
:
A Quantitative Study of Two Attacks.
65-85
view
electronic edition via DOI
export record as
BibTeX
XML
dblp key:
journals/entcs/BighamJGP05
ask others
Google
Google Scholar
MS Academic Search
PubZone
John Bigham
,
Xuan Jin
,
David Gamez
,
Chris I. Phillips
:
Hybrid Workflow and Bayesian Networks to Correlate Information in the Protection of Large Scale Critical Infrastructures.
87-99
view
electronic edition via DOI
export record as
BibTeX
XML
dblp key:
journals/entcs/BryansKR05
ask others
Google
Google Scholar
MS Academic Search
PubZone
Jeremy Bryans
,
Maciej Koutny
,
Peter Y. A. Ryan
:
Modelling Opacity Using Petri Nets.
101-115
view
electronic edition via DOI
export record as
BibTeX
XML
dblp key:
journals/entcs/LabordeNGBB05
ask others
Google
Google Scholar
MS Academic Search
PubZone
Romain Laborde
,
Bassem Nasser
,
Frédéric Grasset
,
François Barrère
,
Abdelmalek Benzekri
:
A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies.
117-142
view
electronic edition via DOI
export record as
BibTeX
XML
dblp key:
journals/entcs/CrazzolaraW05
ask others
Google
Google Scholar
MS Academic Search
PubZone
Federico Crazzolara
,
Glynn Winskel
:
Petri Nets With Persistence.
143-155