default search action
Journal of Computer Security, Volume 4
Volume 4, Number 1, 1996
- Bruno d'Ausbourg, Christel Calas:
Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem. J. Comput. Secur. 4(1): 3-26 (1996) - A. W. Roscoe, Jim Woodcock, Lars Wulf:
Non-interference through Determinism. 27-54 - Ueli M. Maurer, Pierre E. Schmid:
A Calculus for Security Bootstrapping in Distributed Systems. 55-80 - Azad Jiwa, Thomas Hardjono, Jennifer Seberry:
Beacons for Authentication in Distributed Systems. 81-96 - Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen:
Robust and Secure Password and Key Change Method. 97-112
Volume 4, Number 2/3, 1996
- Shiuh-Pyng Shieh, Virgil D. Gligor:
Detecting Illicit Leakage of Information in Operating Systems. 123-148 - Paul Ammann, Richard J. Lipton, Ravi S. Sandhu:
The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. 149-166 - Dennis M. Volpano, Cynthia E. Irvine, Geoffrey Smith:
A Sound Type System for Secure Flow Analysis. 167-188 - John P. McDermott, Ravi Mukkamala:
A Performance Comparison of Five Transaction Processing Algorithms for the SINTRA Replicated-Architecture Database system. 189-228 - David Elliott Bell, Leonard J. LaPadula:
Secure Computer Systems: A Mathematical Model, Volume II. J. Comput. Secur. 4(2/3): 229-263 (1996)
Volume 4, Number 4, 1996
- Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
The Omega Key Management Service. 267-288 - Shaw-Cheng Chuang:
Securing ATM Networks. 289-330 - Matt Bishop:
Conspiracy and Information Flow in the Take-Grant Protection Model. 331-360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.