
International Journal of Critical Computer-Based Systems
2019 Vol.9 No.4
Pages | Title and author(s) |
293-317 | Securing the weak link of federated systems via trusted execution: a case study from the eHealth domainLuigi Coppolino; Salvatore D'Antonio; Giovanni Mazzeo; Luigi Romano; Luigi Sgaglione DOI: 10.1504/IJCCBS.2019.106823 |
318-347 | Soft error sensitivity and vulnerability of languages and their implementationsFrederico Cerveira; Alcides Fonseca; Raul Barbosa; Henrique S. Madeira DOI: 10.1504/IJCCBS.2019.106816 |
348-378 | Extending a re-identification risk-based anonymisation framework and evaluating its impact on data mining classifiersTania Basso; Hebert Silva; Regina Moraes DOI: 10.1504/IJCCBS.2019.106817 |
379-406 | Timed CTL checking of time critical cloud applications using timed bigraphsFateh Latreche; Faiza Belala DOI: 10.1504/IJCCBS.2019.106818 |