


default search action
Journal of Computer Security, Volume 2
Volume 2, Issue 1, 1993
- Thomas Beth:

Obituary: Fighting for Computer Security - Chris Jahl - in Memoriam. J. Comput. Secur. 2: 3-4 (1993) - Hermann Härtig, Oliver C. Kowalski, Winfried E. Kühnhauser:

The BirliX Security Architecture. J. Comput. Secur. 2: 5-22 (1993) - Chris J. Mitchell, Andy Thomas:

Standardising Authentication Protocols Based on Public-Key Techniques. J. Comput. Secur. 2: 23-36 (1993) - John Graham-Cumming:

Laws of Non-Interference in CSP. J. Comput. Secur. 2: 37-52 (1993) - Andrea Sgarro:

Information-Theoretic Bounds for Authentication Frauds. J. Comput. Secur. 2: 53-64 (1993) - Bert den Boer:

A Simple and Key-Economical Unconditional Authentication Scheme. J. Comput. Secur. 2: 65-72 (1993) - K. Lam:

Building an Authentication Service for Distributed Systems. J. Comput. Secur. 2: 73-84 (1993)
Volume 2, Number 2-3, 1993
- Jonathan K. Millen:

A Resource Allocation Model for Denial of Service Protection. 89-106 - Thomas Y. C. Woo, Simon S. Lam:

Authorizations in Distributed Systems: A New Approach. 107-136 - Virgil D. Gligor, Shyh-Wei Luan, Joseph N. Pato:

On Inter-Realm Authentication in Large Distributed Systems. 137-158 - Jeremy Epstein, John McHugh, Hilarie K. Orman, Rita Pascale, Ann B. Marmor-Squires, Bonnie P. Danner, Charles R. Martin, Martha A. Branstad, Glenn S. Benson, D. Rothnie:

A High Assurance Window System Prototype. 159-190 - Raphael Yahalom:

Optimality of Asynchronous Two-Party Secure Data-Exchange Protocols. 191-210 - Bev Littlewood, Sarah Brocklehurst, Norman E. Fenton

, Peter Mellor, Stella Page, David Wright, John Dobson, John A. McDermid, Dieter Gollmann:
Towards Operational Measures of Computer Security. 211-230 - Roshan K. Thomas, Ravi S. Sandhu:

A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. 231-275
Volume 2, Number 4, 1993
- Joseph Douglas Horton, Rodney H. Cooper, W. F. Hyslop, Bradford G. Nickerson, O. K. Ward, Robert Harland, Elton Ashby, W. M. Stewart:

The Cascade Vulnerability Problem. 279-290 - Jonathan T. Trostle:

Modelling a Fuzzy Time System. 291-310 - Vijayalakshmi Atluri

, Elisa Bertino, Sushil Jajodia:
Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. 311-352

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














