>
Fa
  |  
Ar
  |  
En
  
the isc international journal of information security
  
سال:2011 - دوره:3 - شماره:2
  
 
A Model for Specification, Composition and Verification of Access Control Policies and Its Application toWeb Services
- صفحه:103-120
  
 
Alert Correlation and Prediction Using Data Mining and HMM
- صفحه:77-101
  
 
Constructing Cryptographic Definitions
- صفحه:69-76
  
 
Editorial
- صفحه:67-67
  
 
Separating Indexes from Data:A Distributed Scheme for Secure Database Outsourcing
- صفحه:121-133
Copyright 2023
Islamic World Science Citation Center
All Rights Reserved