


default search action
Journal of Computer Security, Volume 8
Volume 8, Number 1, 2000
- Vijayalakshmi Atluri

, Wei-kuang Huang, Elisa Bertino:
A Semantic-Based Execution Model for Multilevel Secure Workflows. 3-41 - John Hale

, Jody Threet, Sujeet Shenoi:
A Ticket-Based Access Control Architecture for Object Systems. 43-65 - Adrian Spalka, Armin B. Cremers:

Structured Name-Spaces in Secure Databases. 67-86
Volume 8, Number 2/3, 2000
- Vijayalakshmi Atluri

, Wei-kuang Huang:
A Petri Net Based Safety Analysis of Workflow Authorization Models. 209-240
- Günter Karjoth:

Authorization in CORBA Security. 89-108 - Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo:

A Logic-Based Approach for Enforcing Access Control. - John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:

Side Channel Cryptanalysis of Product Ciphers. 141-158 - Andreas Wespi, Hervé Debar, Marc Dacier

, Mehdi Nassehi:
Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. - Günther Horn, Bart Preneel:

Authentication and Payment in Future Mobile Systems. 183-207
Volume 8, Number 4, 2000
- Peng Liu, Sushil Jajodia, Catherine D. McCollum:

Intrusion Confinement by Isolation in Information Systems. 243-279 - Chris Clifton:

Using Sample Size to Limit Exposure to Data Mining. 281-307 - Elisa Bertino, Piero A. Bonatti, Elena Ferrari

, Maria Luisa Sapino:
Temporal Authorization Bases: From Specification to Integration. 309-353

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














