Search dblp for Publications

export results for "toc:db/journals/jcs/jcs2.bht:"

 download as .bib file

@article{DBLP:journals/csec/WooL93,
  author       = {Thomas Y. C. Woo and
                  Simon S. Lam},
  title        = {Authorizations in Distributed Systems: {A} New Approach},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {2-3},
  pages        = {107--136},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-22-304},
  doi          = {10.3233/JCS-1993-22-304},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csec/WooL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AtluriBJ93,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  title        = {Achieving Stricter Correctness Requirements in Multilevel Secure Database
                  Management Systems},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {311--352},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-2404},
  doi          = {10.3233/JCS-1993-2404},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AtluriBJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Beth93,
  author       = {Thomas Beth},
  title        = {Obituary: Fighting for Computer Security - Chris Jahl - in Memoriam},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  pages        = {3--4},
  year         = {1993},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Beth93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Boer93,
  author       = {Bert den Boer},
  title        = {A Simple and Key-Economical Unconditional Authentication Scheme},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  pages        = {65--72},
  year         = {1993},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Boer93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/EpsteinMOPMDMBBR93,
  author       = {Jeremy Epstein and
                  John McHugh and
                  Hilarie K. Orman and
                  Rita Pascale and
                  Ann B. Marmor{-}Squires and
                  Bonnie P. Danner and
                  Charles R. Martin and
                  Martha A. Branstad and
                  Glenn S. Benson and
                  D. Rothnie},
  title        = {A High Assurance Window System Prototype},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {2-3},
  pages        = {159--190},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-22-306},
  doi          = {10.3233/JCS-1993-22-306},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/EpsteinMOPMDMBBR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GligorLP93,
  author       = {Virgil D. Gligor and
                  Shyh{-}Wei Luan and
                  Joseph N. Pato},
  title        = {On Inter-Realm Authentication in Large Distributed Systems},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {2-3},
  pages        = {137--158},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-22-305},
  doi          = {10.3233/JCS-1993-22-305},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GligorLP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Graham-Cumming93,
  author       = {John Graham{-}Cumming},
  title        = {Laws of Non-Interference in {CSP}},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  pages        = {37--52},
  year         = {1993},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Graham-Cumming93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HaertigKK93,
  author       = {Hermann H{\"{a}}rtig and
                  Oliver C. Kowalski and
                  Winfried E. K{\"{u}}hnhauser},
  title        = {The BirliX Security Architecture},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  pages        = {5--22},
  year         = {1993},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HaertigKK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HortonCHNWHAS93,
  author       = {Joseph Douglas Horton and
                  Rodney H. Cooper and
                  W. F. Hyslop and
                  Bradford G. Nickerson and
                  O. K. Ward and
                  Robert Harland and
                  Elton Ashby and
                  W. M. Stewart},
  title        = {The Cascade Vulnerability Problem},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {279--290},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-2402},
  doi          = {10.3233/JCS-1993-2402},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HortonCHNWHAS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Lam93,
  author       = {K. Lam},
  title        = {Building an Authentication Service for Distributed Systems},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  pages        = {73--84},
  year         = {1993},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Lam93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LittlewoodBFMPWDMG93,
  author       = {Bev Littlewood and
                  Sarah Brocklehurst and
                  Norman E. Fenton and
                  Peter Mellor and
                  Stella Page and
                  David Wright and
                  John Dobson and
                  John A. McDermid and
                  Dieter Gollmann},
  title        = {Towards Operational Measures of Computer Security},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {2-3},
  pages        = {211--230},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-22-308},
  doi          = {10.3233/JCS-1993-22-308},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LittlewoodBFMPWDMG93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Millen93,
  author       = {Jonathan K. Millen},
  title        = {A Resource Allocation Model for Denial of Service Protection},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {2-3},
  pages        = {89--106},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-22-303},
  doi          = {10.3233/JCS-1993-22-303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Millen93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MitchellT93,
  author       = {Chris J. Mitchell and
                  Andy Thomas},
  title        = {Standardising Authentication Protocols Based on Public-Key Techniques},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  pages        = {23--36},
  year         = {1993},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MitchellT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Sgarro93,
  author       = {Andrea Sgarro},
  title        = {Information-Theoretic Bounds for Authentication Frauds},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  pages        = {53--64},
  year         = {1993},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Sgarro93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ThomasS93,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  title        = {A Kernelized Architecture for Multilevel Secure Object-Oriented Databases
                  Supporting Write-Up},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {2-3},
  pages        = {231--275},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-22-309},
  doi          = {10.3233/JCS-1993-22-309},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ThomasS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Trostle93,
  author       = {Jonathan T. Trostle},
  title        = {Modelling a Fuzzy Time System},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {291--310},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-2403},
  doi          = {10.3233/JCS-1993-2403},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Trostle93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Yahalom93,
  author       = {Raphael Yahalom},
  title        = {Optimality of Asynchronous Two-Party Secure Data-Exchange Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {2-3},
  pages        = {191--210},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-22-307},
  doi          = {10.3233/JCS-1993-22-307},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Yahalom93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics