default search action
Search dblp for Publications
export results for "toc:db/journals/jcs/jcs3.bht:"
@article{DBLP:journals/jcs/AmmannJJ95, author = {Paul Ammann and Frank Jaeckle and Sushil Jajodia}, title = {Concurrency Control in a Secure Database via a Two-Snapshot Algorithm}, journal = {J. Comput. Secur.}, volume = {3}, number = {2/3}, pages = {87--114}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-32-302}, doi = {10.3233/JCS-1994/1995-32-302}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AmmannJJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BertinoOS95, author = {Elisa Bertino and Fabio Origgi and Pierangela Samarati}, title = {An Extended Authorization Model for Object Databases}, journal = {J. Comput. Secur.}, volume = {3}, number = {2/3}, pages = {169--206}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-32-305}, doi = {10.3233/JCS-1994/1995-32-305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BertinoOS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BevierY95, author = {William R. Bevier and William D. Young}, title = {A State-Machine Approach to Non-Interference}, journal = {J. Comput. Secur.}, volume = {3}, number = {1}, pages = {55--70}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3105}, doi = {10.3233/JCS-1994/1995-3105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BevierY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Bishop95, author = {Matt Bishop}, title = {Theft of Information in the Take-Grant Protection Model}, journal = {J. Comput. Secur.}, volume = {3}, number = {4}, pages = {283--308}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3405}, doi = {10.3233/JCS-1994/1995-3405}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Bishop95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BlundoMS95, author = {Carlo Blundo and Luiz A. Frota Mattos and Douglas R. Stinson}, title = {Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels}, journal = {J. Comput. Secur.}, volume = {3}, number = {4}, pages = {309--322}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3406}, doi = {10.3233/JCS-1994/1995-3406}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BlundoMS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChenGM95, author = {Liqun Chen and Dieter Gollmann and Chris J. Mitchell}, title = {Distributing Trust Amongst Multiple Authentication Servers}, journal = {J. Comput. Secur.}, volume = {3}, number = {4}, pages = {255--268}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3403}, doi = {10.3233/JCS-1994/1995-3403}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ChenGM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/FocardiG95, author = {Riccardo Focardi and Roberto Gorrieri}, title = {A Taxonomy of Security Properties for Process Algebras}, journal = {J. Comput. Secur.}, volume = {3}, number = {1}, pages = {5--34}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3103}, doi = {10.3233/JCS-1994/1995-3103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/FocardiG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/FoleyJ95, author = {Simon N. Foley and Jeremy Jacob}, title = {Specifying Security for Computer Supported Collaborative Working}, journal = {J. Comput. Secur.}, volume = {3}, number = {4}, pages = {233--254}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3402}, doi = {10.3233/JCS-1994/1995-3402}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/FoleyJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HinkeDC95, author = {Thomas H. Hinke and Harry S. Delugach and Asha Chandrasekhar}, title = {A Fast Algorithm for Detecting Second Paths in Database Inference Analysis}, journal = {J. Comput. Secur.}, volume = {3}, number = {2/3}, pages = {147--168}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-32-304}, doi = {10.3233/JCS-1994/1995-32-304}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HinkeDC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KangK95, author = {Iwen E. Kang and Thomas F. Keefe}, title = {Transaction Management for Multilevel Secure Replicated Databases}, journal = {J. Comput. Secur.}, volume = {3}, number = {2/3}, pages = {115--146}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-32-303}, doi = {10.3233/JCS-1994/1995-32-303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KangK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Millen95, author = {Jonathan K. Millen}, title = {Unwinding Forward Correctability}, journal = {J. Comput. Secur.}, volume = {3}, number = {1}, pages = {35--54}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3104}, doi = {10.3233/JCS-1994/1995-3104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Millen95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/NotargiacomoBM95, author = {LouAnna Notargiacomo and Barbara T. Blaustein and Catherine D. McCollum}, title = {Merging Models: Integrity, Dynamic Separation of Duty, and Trusted Data Management}, journal = {J. Comput. Secur.}, volume = {3}, number = {2/3}, pages = {207--230}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-32-306}, doi = {10.3233/JCS-1994/1995-32-306}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/NotargiacomoBM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SimmonsM95, author = {Gustavus J. Simmons and Catherine Meadows}, title = {The Role of Trust in Information Integrity Protocols}, journal = {J. Comput. Secur.}, volume = {3}, number = {1}, pages = {71--84}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3106}, doi = {10.3233/JCS-1994/1995-3106}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SimmonsM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZakinthinosL95, author = {Aris Zakinthinos and E. Stewart Lee}, title = {The Composability of Non-Interference}, journal = {J. Comput. Secur.}, volume = {3}, number = {4}, pages = {269--282}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3404}, doi = {10.3233/JCS-1994/1995-3404}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZakinthinosL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.