ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An algebraic approach to non-interference (computer security)
[1992] Proceedings The Computer Security Foundations Workshop V
◽
10.1109/csfw.1992.236789
◽
2003
◽
Cited By ~ 1
Author(s):
S. Pinsky
Keyword(s):
Computer Security
◽
Algebraic Approach
Download Full-text
Related Documents
Cited By
References
Red team performance for improved computer security
PsycEXTRA Dataset
◽
10.1037/e577102012-010
◽
2004
◽
Author(s):
Sara Kraemer
◽
Pascale Carayon
◽
Ruth Duggan
Keyword(s):
Computer Security
◽
Team Performance
Download Full-text
I Downloaded What?: An Examination of Computer Security Decisions
PsycEXTRA Dataset
◽
10.1037/e577712012-021
◽
2006
◽
Author(s):
Jefferson B. Hardee
◽
Christopher B. Mayhorn
◽
Ryan West
Keyword(s):
Computer Security
Download Full-text
Some algebraic approach for the second Painleve equation using the optimal homotopy asymptotic method (OHAM)
Сибирский журнал вычислительной математики
◽
10.15372/sjnm20180207
◽
2018
◽
Keyword(s):
Asymptotic Method
◽
Algebraic Approach
◽
Painlevé Equation
◽
Optimal Homotopy Asymptotic Method
◽
Painleve Equation
◽
Second Painlevé Equation
Download Full-text
2nd Aerospace Computer Security Conference
10.2514/mats86
◽
1986
◽
Keyword(s):
Computer Security
Download Full-text
One algebraic approach to the theory of linear controlled systems implementation
Automation Telemechanization and Communication in Oil Industry
◽
10.30713/0132-2222-2018-11-47-52
◽
2018
◽
pp. 47-52
Author(s):
N.I. Osetinsky
◽
◽
O.N. Kochueva
◽
Keyword(s):
Algebraic Approach
◽
Controlled Systems
◽
Systems Implementation
◽
Linear Controlled Systems
Download Full-text
Multilevel Algebraic Approach for Performance Analysis of Parallel Algorithms
Computing and Informatics
◽
10.31577/cai_2019_4_817
◽
2019
◽
Vol 38
(4)
◽
pp. 817-850
◽
Cited By ~ 8
Author(s):
Luisa D'Amore
◽
Valeria Mele
◽
Diego Romano
◽
Giuliano Laccetti
Keyword(s):
Performance Analysis
◽
Parallel Algorithms
◽
Algebraic Approach
Download Full-text
Communications and Information: Computer Security
10.21236/ada405011
◽
2001
◽
Author(s):
SECRETARY OF THE AIR FORCE WASHINGTON DC
Keyword(s):
Computer Security
Download Full-text
The Reference Monitor Concept as a Unifying Principle in Computer Security Education
10.21236/ada423529
◽
1999
◽
Cited By ~ 7
Author(s):
Cynthia E. Irvine
Keyword(s):
Computer Security
◽
Security Education
Download Full-text
The Specification and Modeling of Computer Security
10.21236/ada462368
◽
1990
◽
Cited By ~ 5
Author(s):
John McLean
Keyword(s):
Computer Security
Download Full-text
The Handbook for the Computer Security Certification of Trusted Systems
10.21236/ada462362
◽
1992
◽
Cited By ~ 1
Author(s):
Judith N. Froscher
◽
Jr Payne
◽
Charles N.
Keyword(s):
Computer Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close