logo
ArticlesAbout
Register | Login
Research Article
JUCS - Journal of Universal Computer Science 18(6): 732-749
https://doi.org/10.3217/jucs-018-06-0732 (28 Mar 2012)
Other versions:
PDF
 
 
Twitter
Facebook
Mendeley
Reddit
Notify a colleague
  • Article InfoArticle Info
  • CitationCitation
  • MetricsMetrics
  • CommentComment
  • RelatedRelated
  • CitedCited
JUCS - Journal of Universal Computer Science 18(6): 732-749
doi: 10.3217/jucs-018-06-0732
Received: 15 Oct 2011 | Approved: 15 Feb 2012 | Published: 28 Mar 2012
This article is part of:
JUCS - Journal of Universal Computer Science 18(6): Security in Information Systems: New Challenges and Opportunities
Authors
Hannes Holm - Corresponding author
Royal Institute of Technology, Stockholm, Sweden
Articles by this author in:  CrossRef  |  Google Scholar
Teodor Sommestad
Royal Institute of Technology, Stockholm, Sweden
Articles by this author in:  CrossRef  |  Google Scholar
Ulrik Franke
Royal Institute of Technology, Stockholm, Sweden
Articles by this author in:  CrossRef  |  Google Scholar
Mathias Ekstedt
Royal Institute of Technology, Stockholm, Sweden
Articles by this author in:  CrossRef  |  Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.
Powered by

This website uses cookies in order to improve your web experience. Read our Cookies Policy

OK