default search action
Journal of Computer Security, Volume 2
Volume 2, Issue 1, 1993
- Thomas Beth:
Obituary: Fighting for Computer Security - Chris Jahl - in Memoriam. J. Comput. Secur. 2: 3-4 (1993) - Hermann Härtig, Oliver C. Kowalski, Winfried E. Kühnhauser:
The BirliX Security Architecture. J. Comput. Secur. 2: 5-22 (1993) - Chris J. Mitchell, Andy Thomas:
Standardising Authentication Protocols Based on Public-Key Techniques. J. Comput. Secur. 2: 23-36 (1993) - John Graham-Cumming:
Laws of Non-Interference in CSP. J. Comput. Secur. 2: 37-52 (1993) - Andrea Sgarro:
Information-Theoretic Bounds for Authentication Frauds. J. Comput. Secur. 2: 53-64 (1993) - Bert den Boer:
A Simple and Key-Economical Unconditional Authentication Scheme. J. Comput. Secur. 2: 65-72 (1993) - K. Lam:
Building an Authentication Service for Distributed Systems. J. Comput. Secur. 2: 73-84 (1993)
Volume 2, Number 2-3, 1993
- Jonathan K. Millen:
A Resource Allocation Model for Denial of Service Protection. 89-106 - Thomas Y. C. Woo, Simon S. Lam:
Authorizations in Distributed Systems: A New Approach. 107-136 - Virgil D. Gligor, Shyh-Wei Luan, Joseph N. Pato:
On Inter-Realm Authentication in Large Distributed Systems. 137-158 - Jeremy Epstein, John McHugh, Hilarie K. Orman, Rita Pascale, Ann B. Marmor-Squires, Bonnie P. Danner, Charles R. Martin, Martha A. Branstad, Glenn S. Benson, D. Rothnie:
A High Assurance Window System Prototype. 159-190 - Raphael Yahalom:
Optimality of Asynchronous Two-Party Secure Data-Exchange Protocols. 191-210 - Bev Littlewood, Sarah Brocklehurst, Norman E. Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John A. McDermid, Dieter Gollmann:
Towards Operational Measures of Computer Security. 211-230 - Roshan K. Thomas, Ravi S. Sandhu:
A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. 231-275
Volume 2, Number 4, 1993
- Joseph Douglas Horton, Rodney H. Cooper, W. F. Hyslop, Bradford G. Nickerson, O. K. Ward, Robert Harland, Elton Ashby, W. M. Stewart:
The Cascade Vulnerability Problem. 279-290 - Jonathan T. Trostle:
Modelling a Fuzzy Time System. 291-310 - Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. 311-352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.