default search action
Journal of Computer Security, Volume 8
Volume 8, Number 1, 2000
- Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino:
A Semantic-Based Execution Model for Multilevel Secure Workflows. 3-41 - John Hale, Jody Threet, Sujeet Shenoi:
A Ticket-Based Access Control Architecture for Object Systems. 43-65 - Adrian Spalka, Armin B. Cremers:
Structured Name-Spaces in Secure Databases. 67-86
Volume 8, Number 2/3, 2000
- Vijayalakshmi Atluri, Wei-kuang Huang:
A Petri Net Based Safety Analysis of Workflow Authorization Models. 209-240
- Günter Karjoth:
Authorization in CORBA Security. 89-108 - Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo:
A Logic-Based Approach for Enforcing Access Control. - John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. 141-158 - Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi:
Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. - Günther Horn, Bart Preneel:
Authentication and Payment in Future Mobile Systems. 183-207
Volume 8, Number 4, 2000
- Peng Liu, Sushil Jajodia, Catherine D. McCollum:
Intrusion Confinement by Isolation in Information Systems. 243-279 - Chris Clifton:
Using Sample Size to Limit Exposure to Data Mining. 281-307 - Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino:
Temporal Authorization Bases: From Specification to Integration. 309-353
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.