default search action
Journal of Computer Security, Volume 3
Volume 3, Number 1, 1995
- Riccardo Focardi, Roberto Gorrieri:
A Taxonomy of Security Properties for Process Algebras. 5-34 - Jonathan K. Millen:
Unwinding Forward Correctability. 35-54 - William R. Bevier, William D. Young:
A State-Machine Approach to Non-Interference. 55-70 - Gustavus J. Simmons, Catherine Meadows:
The Role of Trust in Information Integrity Protocols. 71-84
Volume 3, Number 2/3, 1995
- Paul Ammann, Frank Jaeckle, Sushil Jajodia:
Concurrency Control in a Secure Database via a Two-Snapshot Algorithm. 87-114 - Iwen E. Kang, Thomas F. Keefe:
Transaction Management for Multilevel Secure Replicated Databases. 115-146 - Thomas H. Hinke, Harry S. Delugach, Asha Chandrasekhar:
A Fast Algorithm for Detecting Second Paths in Database Inference Analysis. 147-168 - Elisa Bertino, Fabio Origgi, Pierangela Samarati:
An Extended Authorization Model for Object Databases. 169-206 - LouAnna Notargiacomo, Barbara T. Blaustein, Catherine D. McCollum:
Merging Models: Integrity, Dynamic Separation of Duty, and Trusted Data Management. 207-230
Volume 3, Number 4, 1995
- Simon N. Foley, Jeremy Jacob:
Specifying Security for Computer Supported Collaborative Working. 233-254 - Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Distributing Trust Amongst Multiple Authentication Servers. 255-268 - Aris Zakinthinos, E. Stewart Lee:
The Composability of Non-Interference. 269-282 - Matt Bishop:
Theft of Information in the Take-Grant Protection Model. 283-308 - Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson:
Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels. 309-322
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.