Security analysis of cryptographically controlled access to XML documents
From MaRDI portal
Publication:3546366
Recommendations
Cited in
(10)- scientific article; zbMATH DE number 2044543 (Why is no real title available?)
- scientific article; zbMATH DE number 2017872 (Why is no real title available?)
- scientific article; zbMATH DE number 2030113 (Why is no real title available?)
- Automated Technology for Verification and Analysis
- scientific article; zbMATH DE number 2100561 (Why is no real title available?)
- Interprocedural information flow analysis of XML processors
- Universally composable cryptographic role-based access control
- XML security protection scheme based on Kerberos authentication and polynomials authorization
- Sound and complete computational interpretation of symbolic hashes in the standard model
- A survey of symbolic methods in computational analysis of cryptographic systems
This page was built for publication: Security analysis of cryptographically controlled access to XML documents
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3546366)