Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-4
|
Results: 4
Correctness in hierarchical knowledge-based requirements
Authors:
Shen, VRL
Citation:
Vrl. Shen, Correctness in hierarchical knowledge-based requirements, IEEE SYST B, 30(4), 2000, pp. 625-631
Improvement of a multi-role-based access control policy
Authors:
Shen, VRL
Citation:
Vrl. Shen, Improvement of a multi-role-based access control policy, IEICE T FUN, E83A(7), 2000, pp. 1483-1485
Cryptographic key assignment scheme for dynamic access control in a user hierarchy
Authors:
Kuo, FH Shen, VRL Chen, TS Lai, F
Citation:
Fh. Kuo et al., Cryptographic key assignment scheme for dynamic access control in a user hierarchy, IEE P-COM D, 146(5), 1999, pp. 235-240
Incremental CTL model checker for fair states
Authors:
Shen, VRL
Citation:
Vrl. Shen, Incremental CTL model checker for fair states, IEICE T INF, E82D(7), 1999, pp. 1126-1130
Risultati:
1-4
|