Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jcs/jcs7.bht:"
@article{DBLP:journals/jcs/BertinoF99, author = {Elisa Bertino and Elena Ferrari}, title = {Secure Object Deletion and Garbage Collection in Multilevel Object Bases}, journal = {J. Comput. Secur.}, volume = {7}, number = {4}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-7402}, doi = {10.3233/JCS-1999-7402}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BertinoF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BlundoM99, author = {Carlo Blundo and Barbara Masucci}, title = {A Note on the Randomness in Dynamic Threshold Schemes}, journal = {J. Comput. Secur.}, volume = {7}, number = {1}, pages = {73--85}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-7104}, doi = {10.3233/JCS-1999-7104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BlundoM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DanielsS99, author = {Thomas E. Daniels and Eugene H. Spafford}, title = {Identification of Host Audit Data to Detect Attacks on Low-level {IP} Vulnerabilities}, journal = {J. Comput. Secur.}, volume = {7}, number = {1}, pages = {3--35}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-7102}, doi = {10.3233/JCS-1999-7102}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DanielsS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GudesOR99, author = {Ehud Gudes and Martin S. Olivier and Reind P. van de Riet}, title = {Modeling, Specifying and Implementing Workflow Security in Cyberspace}, journal = {J. Comput. Secur.}, volume = {7}, number = {4}, pages = {287--315}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-7403}, doi = {10.3233/JCS-1999-7403}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GudesOR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Lowe99, author = {Gavin Lowe}, title = {Towards a Completeness Result for Model Checking of Security Protocols}, journal = {J. Comput. Secur.}, volume = {7}, number = {1}, pages = {89--146}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-72-302}, doi = {10.3233/JCS-1999-72-302}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Lowe99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RoscoeB99, author = {A. W. Roscoe and Philippa J. Broadfoot}, title = {Proving Security Protocols with Model Checkers by Data Independence Techniques}, journal = {J. Comput. Secur.}, volume = {7}, number = {1}, pages = {147--190}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-72-303}, doi = {10.3233/JCS-1999-72-303}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RoscoeB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SandhuB99, author = {Ravi S. Sandhu and Venkata Bhamidipati}, title = {Role-based Administration of User-Role Assignment: The {URA97} Model and its Oracle Implementation}, journal = {J. Comput. Secur.}, volume = {7}, number = {4}, pages = {317--342}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-7404}, doi = {10.3233/JCS-1999-7404}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SandhuB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ThayerHG99, author = {F. Javier Thayer and Jonathan C. Herzog and Joshua D. Guttman}, title = {Strand Spaces: Proving Security Protocols Correct}, journal = {J. Comput. Secur.}, volume = {7}, number = {1}, pages = {191--230}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-72-304}, doi = {10.3233/JCS-1999-72-304}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ThayerHG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VignaK99, author = {Giovanni Vigna and Richard A. Kemmerer}, title = {NetSTAT: {A} Network-based Intrusion Detection System}, journal = {J. Comput. Secur.}, volume = {7}, number = {1}, pages = {37--71}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-7103}, doi = {10.3233/JCS-1999-7103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VignaK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VolpanoS99, author = {Dennis M. Volpano and Geoffrey Smith}, title = {Probabilistic Noninterference in a Concurrent Language}, journal = {J. Comput. Secur.}, volume = {7}, number = {1}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-72-305}, doi = {10.3233/JCS-1999-72-305}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VolpanoS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.