1
by Atluri, Vijay, Jajodia, Sushil, George, Binto
Published 2000
Springer US
Table of Contents: ... Introduction to Workflow Systems -- 2 Workflow Transaction Model -- 3 Multilevel Secure Workflow Model -- 4...

2
Published 2008
Springer US
Table of Contents: ... Systems -- Adversary Modeling and Simulation in Cyber Warfare -- Interactive Selection of ISO 27001...

3
Published 2004
Springer US
Table of Contents: ... Access Control Models -- Enforcing Integrity in Multimedia Surveillance -- A Learning-based Approach...

4
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Fingerprinting Codes -- Session 11: Formal Models and Cryptographic Protocols -- Formally Bounding the Side...

5
Published 2011
Springer New York
Table of Contents: ...A Formal Model for a System’s Attack Surface -- Effectiveness of Moving Target Defenses -- Global...

6
Published 2016
Springer International Publishing
Table of Contents: ...Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception...

7
Published 1998
Springer Berlin Heidelberg
Table of Contents: ... Modelling of VBR Coded Video Sources in ATM Networks -- Retrieving Images by Content: The Surfimage System...

8
Published 1997
Springer US
Table of Contents: ... your objects are? -- 12 A model for specifying individual integrity constraints on objects -- 13 View...

9
Published 1998
Springer US
Table of Contents: ... for databases with explicit markings of damaged data -- 7 Application of models from epidemiology to metrics...

10
Published 2020
Springer International Publishing
Table of Contents: ... framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms...