A Survey of Policy-Based Management Approaches for Service Oriented Systems | 24 | 1.41 | 2008 |
An automatic anti-anti-VMware technique applicable for multi-stage packed malware | 2 | 0.46 | 2008 |
Permission Set Mining: Discovering Practical and Useful Roles | 24 | 0.85 | 2008 |
Role engineering using graph optimisation | 51 | 2.42 | 2007 |
ws-Attestation: Enabling Trusted Computing on Web Services | 6 | 0.50 | 2007 |
Policy-based service registration and discovery | 4 | 0.59 | 2007 |
WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services | 29 | 1.83 | 2005 |
Parasitic authentication | 0 | 0.34 | 2000 |
Parasitic Authentication To Protect Your E-Wallet | 4 | 0.56 | 2000 |
Engineering an eCash System | 0 | 0.34 | 1999 |