Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jcs/jcs2.bht:"
@article{DBLP:journals/csec/WooL93, author = {Thomas Y. C. Woo and Simon S. Lam}, title = {Authorizations in Distributed Systems: {A} New Approach}, journal = {J. Comput. Secur.}, volume = {2}, number = {2-3}, pages = {107--136}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-22-304}, doi = {10.3233/JCS-1993-22-304}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csec/WooL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AtluriBJ93, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, title = {Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems}, journal = {J. Comput. Secur.}, volume = {2}, number = {4}, pages = {311--352}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-2404}, doi = {10.3233/JCS-1993-2404}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AtluriBJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Beth93, author = {Thomas Beth}, title = {Obituary: Fighting for Computer Security - Chris Jahl - in Memoriam}, journal = {J. Comput. Secur.}, volume = {2}, pages = {3--4}, year = {1993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Beth93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Boer93, author = {Bert den Boer}, title = {A Simple and Key-Economical Unconditional Authentication Scheme}, journal = {J. Comput. Secur.}, volume = {2}, pages = {65--72}, year = {1993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Boer93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/EpsteinMOPMDMBBR93, author = {Jeremy Epstein and John McHugh and Hilarie K. Orman and Rita Pascale and Ann B. Marmor{-}Squires and Bonnie P. Danner and Charles R. Martin and Martha A. Branstad and Glenn S. Benson and D. Rothnie}, title = {A High Assurance Window System Prototype}, journal = {J. Comput. Secur.}, volume = {2}, number = {2-3}, pages = {159--190}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-22-306}, doi = {10.3233/JCS-1993-22-306}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/EpsteinMOPMDMBBR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GligorLP93, author = {Virgil D. Gligor and Shyh{-}Wei Luan and Joseph N. Pato}, title = {On Inter-Realm Authentication in Large Distributed Systems}, journal = {J. Comput. Secur.}, volume = {2}, number = {2-3}, pages = {137--158}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-22-305}, doi = {10.3233/JCS-1993-22-305}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GligorLP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Graham-Cumming93, author = {John Graham{-}Cumming}, title = {Laws of Non-Interference in {CSP}}, journal = {J. Comput. Secur.}, volume = {2}, pages = {37--52}, year = {1993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Graham-Cumming93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HaertigKK93, author = {Hermann H{\"{a}}rtig and Oliver C. Kowalski and Winfried E. K{\"{u}}hnhauser}, title = {The BirliX Security Architecture}, journal = {J. Comput. Secur.}, volume = {2}, pages = {5--22}, year = {1993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HaertigKK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HortonCHNWHAS93, author = {Joseph Douglas Horton and Rodney H. Cooper and W. F. Hyslop and Bradford G. Nickerson and O. K. Ward and Robert Harland and Elton Ashby and W. M. Stewart}, title = {The Cascade Vulnerability Problem}, journal = {J. Comput. Secur.}, volume = {2}, number = {4}, pages = {279--290}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-2402}, doi = {10.3233/JCS-1993-2402}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HortonCHNWHAS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Lam93, author = {K. Lam}, title = {Building an Authentication Service for Distributed Systems}, journal = {J. Comput. Secur.}, volume = {2}, pages = {73--84}, year = {1993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Lam93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LittlewoodBFMPWDMG93, author = {Bev Littlewood and Sarah Brocklehurst and Norman E. Fenton and Peter Mellor and Stella Page and David Wright and John Dobson and John A. McDermid and Dieter Gollmann}, title = {Towards Operational Measures of Computer Security}, journal = {J. Comput. Secur.}, volume = {2}, number = {2-3}, pages = {211--230}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-22-308}, doi = {10.3233/JCS-1993-22-308}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LittlewoodBFMPWDMG93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Millen93, author = {Jonathan K. Millen}, title = {A Resource Allocation Model for Denial of Service Protection}, journal = {J. Comput. Secur.}, volume = {2}, number = {2-3}, pages = {89--106}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-22-303}, doi = {10.3233/JCS-1993-22-303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Millen93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MitchellT93, author = {Chris J. Mitchell and Andy Thomas}, title = {Standardising Authentication Protocols Based on Public-Key Techniques}, journal = {J. Comput. Secur.}, volume = {2}, pages = {23--36}, year = {1993}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MitchellT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Sgarro93, author = {Andrea Sgarro}, title = {Information-Theoretic Bounds for Authentication Frauds}, journal = {J. Comput. Secur.}, volume = {2}, pages = {53--64}, year = {1993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Sgarro93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ThomasS93, author = {Roshan K. Thomas and Ravi S. Sandhu}, title = {A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up}, journal = {J. Comput. Secur.}, volume = {2}, number = {2-3}, pages = {231--275}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-22-309}, doi = {10.3233/JCS-1993-22-309}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ThomasS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Trostle93, author = {Jonathan T. Trostle}, title = {Modelling a Fuzzy Time System}, journal = {J. Comput. Secur.}, volume = {2}, number = {4}, pages = {291--310}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-2403}, doi = {10.3233/JCS-1993-2403}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Trostle93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Yahalom93, author = {Raphael Yahalom}, title = {Optimality of Asynchronous Two-Party Secure Data-Exchange Protocols}, journal = {J. Comput. Secur.}, volume = {2}, number = {2-3}, pages = {191--210}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-22-307}, doi = {10.3233/JCS-1993-22-307}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Yahalom93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.