Search dblp for Publications

export results for "toc:db/journals/jcs/jcs7.bht:"

 download as .bib file

@article{DBLP:journals/jcs/BertinoF99,
  author       = {Elisa Bertino and
                  Elena Ferrari},
  title        = {Secure Object Deletion and Garbage Collection in Multilevel Object
                  Bases},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {4},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-7402},
  doi          = {10.3233/JCS-1999-7402},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BertinoF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BlundoM99,
  author       = {Carlo Blundo and
                  Barbara Masucci},
  title        = {A Note on the Randomness in Dynamic Threshold Schemes},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {73--85},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-7104},
  doi          = {10.3233/JCS-1999-7104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BlundoM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DanielsS99,
  author       = {Thomas E. Daniels and
                  Eugene H. Spafford},
  title        = {Identification of Host Audit Data to Detect Attacks on Low-level {IP}
                  Vulnerabilities},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {3--35},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-7102},
  doi          = {10.3233/JCS-1999-7102},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DanielsS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GudesOR99,
  author       = {Ehud Gudes and
                  Martin S. Olivier and
                  Reind P. van de Riet},
  title        = {Modeling, Specifying and Implementing Workflow Security in Cyberspace},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {287--315},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-7403},
  doi          = {10.3233/JCS-1999-7403},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GudesOR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Lowe99,
  author       = {Gavin Lowe},
  title        = {Towards a Completeness Result for Model Checking of Security Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {89--146},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-72-302},
  doi          = {10.3233/JCS-1999-72-302},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Lowe99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RoscoeB99,
  author       = {A. W. Roscoe and
                  Philippa J. Broadfoot},
  title        = {Proving Security Protocols with Model Checkers by Data Independence
                  Techniques},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {147--190},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-72-303},
  doi          = {10.3233/JCS-1999-72-303},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RoscoeB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SandhuB99,
  author       = {Ravi S. Sandhu and
                  Venkata Bhamidipati},
  title        = {Role-based Administration of User-Role Assignment: The {URA97} Model
                  and its Oracle Implementation},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {317--342},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-7404},
  doi          = {10.3233/JCS-1999-7404},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SandhuB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ThayerHG99,
  author       = {F. Javier Thayer and
                  Jonathan C. Herzog and
                  Joshua D. Guttman},
  title        = {Strand Spaces: Proving Security Protocols Correct},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {191--230},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-72-304},
  doi          = {10.3233/JCS-1999-72-304},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ThayerHG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VignaK99,
  author       = {Giovanni Vigna and
                  Richard A. Kemmerer},
  title        = {NetSTAT: {A} Network-based Intrusion Detection System},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {37--71},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-7103},
  doi          = {10.3233/JCS-1999-7103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VignaK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VolpanoS99,
  author       = {Dennis M. Volpano and
                  Geoffrey Smith},
  title        = {Probabilistic Noninterference in a Concurrent Language},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {1},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-72-305},
  doi          = {10.3233/JCS-1999-72-305},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VolpanoS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics