


default search action
Journal of Computer Security, Volume 6
Volume 6, Number 1-2, 1998
- Martín Abadi:
On SDSI's Linked Local Name Spaces. 3-22 - James W. Gray III, Kin Fai Epsilon Ip, King-Shan Lui:
Provable Security for Cryptographic Protocols - Exact Analysis and Engineering Applications. 23-52 - Gavin Lowe:
Casper: A Compiler for the Analysis of Security Protocols. 53-84 - Lawrence C. Paulson:
The Inductive Approach to Verifying Cryptographic Protocols. 85-128
Volume 6, Number 3, 1998
- Tsutomu Matsumoto:
Human-Computer Cryptography: An Attempt. 129-150 - Steven A. Hofmeyr, Stephanie Forrest
, Anil Somayaji:
Intrusion Detection Using Sequences of System Calls. 151-180 - Indrakshi Ray, Paul Ammann, Sushil Jajodia:
A Semantic-Based Transaction Processing Model for Multilevel Transactions. 181-217
Volume 6, Number 4, 1998
- Lars R. Knudsen, Keith M. Martin:
In Search of Multiple Domain Key Recovery. 219-236 - Matthew K. Franklin, Dahlia Malkhi:
Auditable Metering with Lightweight Security. 237-256 - Fabio Casati, Silvana Castano, Maria Grazia Fugini:
Enforcing Workflow Authorization Constraints Using Triggers. 257-286

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.