Search dblp for Publications

export results for "toc:db/journals/jcs/jcs3.bht:"

 download as .bib file

@article{DBLP:journals/jcs/AmmannJJ95,
  author       = {Paul Ammann and
                  Frank Jaeckle and
                  Sushil Jajodia},
  title        = {Concurrency Control in a Secure Database via a Two-Snapshot Algorithm},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {2/3},
  pages        = {87--114},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-32-302},
  doi          = {10.3233/JCS-1994/1995-32-302},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AmmannJJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BertinoOS95,
  author       = {Elisa Bertino and
                  Fabio Origgi and
                  Pierangela Samarati},
  title        = {An Extended Authorization Model for Object Databases},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {2/3},
  pages        = {169--206},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-32-305},
  doi          = {10.3233/JCS-1994/1995-32-305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BertinoOS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BevierY95,
  author       = {William R. Bevier and
                  William D. Young},
  title        = {A State-Machine Approach to Non-Interference},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {55--70},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3105},
  doi          = {10.3233/JCS-1994/1995-3105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BevierY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Bishop95,
  author       = {Matt Bishop},
  title        = {Theft of Information in the Take-Grant Protection Model},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {283--308},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3405},
  doi          = {10.3233/JCS-1994/1995-3405},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Bishop95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BlundoMS95,
  author       = {Carlo Blundo and
                  Luiz A. Frota Mattos and
                  Douglas R. Stinson},
  title        = {Multiple Key Distribution Maintaining User Anonymity via Broadcast
                  Channels},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {309--322},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3406},
  doi          = {10.3233/JCS-1994/1995-3406},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BlundoMS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChenGM95,
  author       = {Liqun Chen and
                  Dieter Gollmann and
                  Chris J. Mitchell},
  title        = {Distributing Trust Amongst Multiple Authentication Servers},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {255--268},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3403},
  doi          = {10.3233/JCS-1994/1995-3403},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ChenGM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/FocardiG95,
  author       = {Riccardo Focardi and
                  Roberto Gorrieri},
  title        = {A Taxonomy of Security Properties for Process Algebras},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {5--34},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3103},
  doi          = {10.3233/JCS-1994/1995-3103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/FocardiG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/FoleyJ95,
  author       = {Simon N. Foley and
                  Jeremy Jacob},
  title        = {Specifying Security for Computer Supported Collaborative Working},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {233--254},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3402},
  doi          = {10.3233/JCS-1994/1995-3402},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/FoleyJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HinkeDC95,
  author       = {Thomas H. Hinke and
                  Harry S. Delugach and
                  Asha Chandrasekhar},
  title        = {A Fast Algorithm for Detecting Second Paths in Database Inference
                  Analysis},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {2/3},
  pages        = {147--168},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-32-304},
  doi          = {10.3233/JCS-1994/1995-32-304},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HinkeDC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KangK95,
  author       = {Iwen E. Kang and
                  Thomas F. Keefe},
  title        = {Transaction Management for Multilevel Secure Replicated Databases},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {2/3},
  pages        = {115--146},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-32-303},
  doi          = {10.3233/JCS-1994/1995-32-303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KangK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Millen95,
  author       = {Jonathan K. Millen},
  title        = {Unwinding Forward Correctability},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {35--54},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3104},
  doi          = {10.3233/JCS-1994/1995-3104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Millen95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/NotargiacomoBM95,
  author       = {LouAnna Notargiacomo and
                  Barbara T. Blaustein and
                  Catherine D. McCollum},
  title        = {Merging Models: Integrity, Dynamic Separation of Duty, and Trusted
                  Data Management},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {2/3},
  pages        = {207--230},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-32-306},
  doi          = {10.3233/JCS-1994/1995-32-306},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/NotargiacomoBM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SimmonsM95,
  author       = {Gustavus J. Simmons and
                  Catherine Meadows},
  title        = {The Role of Trust in Information Integrity Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {71--84},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3106},
  doi          = {10.3233/JCS-1994/1995-3106},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SimmonsM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZakinthinosL95,
  author       = {Aris Zakinthinos and
                  E. Stewart Lee},
  title        = {The Composability of Non-Interference},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {269--282},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3404},
  doi          = {10.3233/JCS-1994/1995-3404},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZakinthinosL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics