


default search action
Journal of Computer Security, Volume 7
Volume 7, Number 1, 1999
- Thomas E. Daniels, Eugene H. Spafford:

Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities. 3-35 - Giovanni Vigna, Richard A. Kemmerer:

NetSTAT: A Network-based Intrusion Detection System. 37-71 - Carlo Blundo, Barbara Masucci:

A Note on the Randomness in Dynamic Threshold Schemes. 73-85
Volume 7, Number 2/3, 1999
- Gavin Lowe:

Towards a Completeness Result for Model Checking of Security Protocols. 89-146 - A. W. Roscoe, Philippa J. Broadfoot:

Proving Security Protocols with Model Checkers by Data Independence Techniques. 147-190 - F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman

:
Strand Spaces: Proving Security Protocols Correct. 191-230 - Dennis M. Volpano, Geoffrey Smith:

Probabilistic Noninterference in a Concurrent Language.
Volume 7, Number 4, 1999
- Elisa Bertino, Elena Ferrari:

Secure Object Deletion and Garbage Collection in Multilevel Object Bases. - Ehud Gudes, Martin S. Olivier, Reind P. van de Riet:

Modeling, Specifying and Implementing Workflow Security in Cyberspace. 287-315 - Ravi S. Sandhu, Venkata Bhamidipati:

Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation. 317-342

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














