Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec13.bht:"
@article{DBLP:journals/compsec/BadenhorstE94, author = {Karin P. Badenhorst and Jan H. P. Eloff}, title = {{TOPM:} a formal approach to the optimization of information technology risk management}, journal = {Comput. Secur.}, volume = {13}, number = {5}, pages = {411--435}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90036-1}, doi = {10.1016/0167-4048(94)90036-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BadenhorstE94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BornS94, author = {Eike Born and Helmut G. Stiegler}, title = {Discretionary access control by means of usage conditions}, journal = {Comput. Secur.}, volume = {13}, number = {5}, pages = {437--450}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90037-X}, doi = {10.1016/0167-4048(94)90037-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BornS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChangJB94, author = {Chin{-}Chen Chang and Jinn{-}Ke Jan and Daniel J. Buehrer}, title = {A scheme to determine the relationship between two users in a hierarchy}, journal = {Comput. Secur.}, volume = {13}, number = {3}, pages = {255--261}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90079-5}, doi = {10.1016/0167-4048(94)90079-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChangJB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChangL94, author = {Chin{-}Chin Chang and Wen{-}Yuan Liao}, title = {A remote password authentication scheme based upon ElGamal's signature scheme}, journal = {Comput. Secur.}, volume = {13}, number = {2}, pages = {137--144}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90063-9}, doi = {10.1016/0167-4048(94)90063-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChangL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChangSW94, author = {Chin{-}Chen Chang and Jao{-}Ji Shen and Tzong{-}Chen Wu}, title = {Access control with binary keys}, journal = {Comput. Secur.}, volume = {13}, number = {8}, pages = {681--686}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90050-7}, doi = {10.1016/0167-4048(94)90050-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChangSW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenH94, author = {Jau{-}Liang Chen and Tzonelih Hwang}, title = {Identity-based conference key broadcast schemes with user authentication}, journal = {Comput. Secur.}, volume = {13}, number = {1}, pages = {53--57}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90095-7}, doi = {10.1016/0167-4048(94)90095-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenH94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Collinson94, author = {Helen Collinson}, title = {Abstracts of recent articles and literature}, journal = {Comput. Secur.}, volume = {13}, number = {5}, pages = {401--406}, year = {1994}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Collinson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CourtneyW94, author = {Robert H. Courtney and Willis H. Ware}, title = {What do we mean by integrity?}, journal = {Comput. Secur.}, volume = {13}, number = {3}, pages = {206--208}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90070-1}, doi = {10.1016/0167-4048(94)90070-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CourtneyW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DawsonD94, author = {Ed Dawson and Diane M. Donovan}, title = {The breadth of Shamir's secret-sharing scheme}, journal = {Comput. Secur.}, volume = {13}, number = {1}, pages = {69--78}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90097-3}, doi = {10.1016/0167-4048(94)90097-3}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DawsonD94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DenaultKGS94, author = {Michel Denault and Dimitris Karagiannis and Dimitris Gritzalis and Paul G. Spirakis}, title = {Intrusion detection: Approach and performance issues of the {SECURENET} system}, journal = {Comput. Secur.}, volume = {13}, number = {6}, pages = {495--508}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(91)90138-4}, doi = {10.1016/0167-4048(91)90138-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DenaultKGS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ganley94, author = {Michael J. Ganley}, title = {Digital signatures and their uses}, journal = {Comput. Secur.}, volume = {13}, number = {5}, pages = {385--391}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90031-0}, doi = {10.1016/0167-4048(94)90031-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ganley94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GentileGGMV94, author = {Francesco Gentile and Luigi Giuri and Franco Guida and Emilio Montolivo and Michele Volpe}, title = {Security evaluation in information technology standards}, journal = {Comput. Secur.}, volume = {13}, number = {8}, pages = {647--650}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90044-2}, doi = {10.1016/0167-4048(94)90044-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GentileGGMV94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GustafsonDNC94, author = {Helen Gustafson and Ed Dawson and Lauren Nielsen and William J. Caelli}, title = {A computer package for measuring the strength of encryption algorithms}, journal = {Comput. Secur.}, volume = {13}, number = {8}, pages = {687--697}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90051-5}, doi = {10.1016/0167-4048(94)90051-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GustafsonDNC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HardjonoZS94, author = {Thomas Hardjono and Yuliang Zheng and Jennifer Seberry}, title = {Database authentication revisited}, journal = {Comput. Secur.}, volume = {13}, number = {7}, pages = {573--580}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90008-6}, doi = {10.1016/0167-4048(94)90008-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HardjonoZS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HarrisS94, author = {Duncan Harris and David Sidwell}, title = {Distributed database security}, journal = {Comput. Secur.}, volume = {13}, number = {7}, pages = {547--557}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90003-5}, doi = {10.1016/0167-4048(94)90003-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HarrisS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Heinlein94, author = {Edwin B. Heinlein}, title = {Communications, security, privacy and the law}, journal = {Comput. Secur.}, volume = {13}, number = {2}, pages = {119--121}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90058-2}, doi = {10.1016/0167-4048(94)90058-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Heinlein94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Heinlein94a, author = {Edwin B. Heinlein}, title = {17th National Computer Security Conference - An opinion}, journal = {Comput. Secur.}, volume = {13}, number = {6}, pages = {481--483}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(91)90134-Y}, doi = {10.1016/0167-4048(91)90134-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Heinlein94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland94, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {13}, number = {1}, pages = {4--14}, year = {1994}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland94a, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {13}, number = {2}, pages = {98--106}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90055-8}, doi = {10.1016/0167-4048(94)90055-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland94b, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {13}, number = {3}, pages = {192--205}, year = {1994}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland94b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland94c, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {13}, number = {4}, pages = {278--286}, year = {1994}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland94c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland94d, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {13}, number = {5}, pages = {372--378}, year = {1994}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland94d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland94e, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {13}, number = {6}, pages = {458--465}, year = {1994}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland94e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland94f, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {13}, number = {7}, pages = {540--546}, year = {1994}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland94f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland94g, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {13}, number = {8}, pages = {622--627}, year = {1994}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland94g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hoppe94, author = {Norman Hopp{\'{e}}}, title = {Achieving consistent security controls throughout a multinational organization}, journal = {Comput. Secur.}, volume = {13}, number = {1}, pages = {23--29}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90087-6}, doi = {10.1016/0167-4048(94)90087-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hoppe94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HudoklinS94, author = {Alenka Hudoklin and Branislav Smitek}, title = {Computer systems security in Slovenia}, journal = {Comput. Secur.}, volume = {13}, number = {1}, pages = {30--33}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90088-4}, doi = {10.1016/0167-4048(94)90088-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HudoklinS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kanungo94, author = {Shivraj Kanungo}, title = {Identity authentication in heterogeneous computing environments: a comparative study for an integrated framework}, journal = {Comput. Secur.}, volume = {13}, number = {3}, pages = {231--253}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90078-7}, doi = {10.1016/0167-4048(94)90078-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kanungo94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LadkinT94, author = {Peter B. Ladkin and Harold W. Thimbleby}, title = {Comments on a paper by Voas, Payne and Cohen: 'A model for detecting the existence of software corruption in real time'}, journal = {Comput. Secur.}, volume = {13}, number = {6}, pages = {527--531}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(91)90140-9}, doi = {10.1016/0167-4048(91)90140-9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LadkinT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LaihCC94, author = {Chi{-}Sung Laih and Wen{-}Hong Chiou and Chin{-}Chen Chang}, title = {Authentication and protection of public keys}, journal = {Comput. Secur.}, volume = {13}, number = {7}, pages = {581--585}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90009-4}, doi = {10.1016/0167-4048(94)90009-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LaihCC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Liaw94, author = {Horng{-}Twu Liaw}, title = {A dynamic cryptographic key generation and information broadcasting scheme in information systems}, journal = {Comput. Secur.}, volume = {13}, number = {7}, pages = {601--610}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90011-6}, doi = {10.1016/0167-4048(94)90011-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Liaw94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Lillywhite94, author = {Thomas Lillywhite}, title = {{IT} security standards and the adoption of a benchmarking approach}, journal = {Comput. Secur.}, volume = {13}, number = {6}, pages = {467--471}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(91)90132-W}, doi = {10.1016/0167-4048(91)90132-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Lillywhite94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LindgreenH94, author = {Edo Roos Lindgreen and I. S. Herschberg}, title = {On the validity of the Bell-La Padula model}, journal = {Comput. Secur.}, volume = {13}, number = {4}, pages = {317--333}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90023-X}, doi = {10.1016/0167-4048(94)90023-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LindgreenH94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Lindup94, author = {Ken Lindup}, title = {The cyberpunk age}, journal = {Comput. Secur.}, volume = {13}, number = {8}, pages = {637--645}, year = {1994}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Lindup94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ListM94, author = {William List and Rob Melville}, title = {Integrity in information systems - Executive summary}, journal = {Comput. Secur.}, volume = {13}, number = {4}, pages = {295--301}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90018-3}, doi = {10.1016/0167-4048(94)90018-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ListM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LongleyV94, author = {Dennis Longley and S. Vasudevan}, title = {Effect of key generators on the automatic search for flaws in key management schemes}, journal = {Comput. Secur.}, volume = {13}, number = {4}, pages = {335--347}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90024-8}, doi = {10.1016/0167-4048(94)90024-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LongleyV94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LooiC94, author = {Mark Looi and William J. Caelli}, title = {A note on supplying a trusted clock via a secure device}, journal = {Comput. Secur.}, volume = {13}, number = {7}, pages = {611--613}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90012-4}, doi = {10.1016/0167-4048(94)90012-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LooiC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Magruder94, author = {Scott Magruder}, title = {High-level language computer viruses - a new threat?}, journal = {Comput. Secur.}, volume = {13}, number = {3}, pages = {263--269}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90080-9}, doi = {10.1016/0167-4048(94)90080-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Magruder94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus94, author = {Belden Menkus}, title = {The new importance of "business continuity" in data processing disaster recovery planning}, journal = {Comput. Secur.}, volume = {13}, number = {2}, pages = {115--118}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90057-4}, doi = {10.1016/0167-4048(94)90057-4}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MohammedD94, author = {Imtiaz Mohammed and David M. Dilts}, title = {Design for dynamic user-role-based security}, journal = {Comput. Secur.}, volume = {13}, number = {8}, pages = {661--671}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90048-5}, doi = {10.1016/0167-4048(94)90048-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MohammedD94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MostertS94, author = {D. N. J. Mostert and Sebastiaan H. von Solms}, title = {A methodology to include computer security, safety and resilience requirements as part of the user requirement}, journal = {Comput. Secur.}, volume = {13}, number = {4}, pages = {349--364}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90025-6}, doi = {10.1016/0167-4048(94)90025-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MostertS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Olnes94, author = {Jon {\O}lnes}, title = {Development of security policies}, journal = {Comput. Secur.}, volume = {13}, number = {8}, pages = {628--636}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90042-6}, doi = {10.1016/0167-4048(94)90042-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Olnes94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PicciottoG94, author = {Jeffrey Picciotto and Richard D. Graubart}, title = {Extended labeling policies for enhanced application support}, journal = {Comput. Secur.}, volume = {13}, number = {7}, pages = {587--599}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90010-8}, doi = {10.1016/0167-4048(94)90010-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PicciottoG94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Rihaczek94, author = {Karl Rihaczek}, title = {Data interchange and legal security - signature surrogates}, journal = {Comput. Secur.}, volume = {13}, number = {4}, pages = {287--293}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90017-5}, doi = {10.1016/0167-4048(94)90017-5}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Rihaczek94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Russell94, author = {Selwyn Russell}, title = {Audit-by-receiver paradigms for verification of authorization at source of electronic documents}, journal = {Comput. Secur.}, volume = {13}, number = {1}, pages = {59--67}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90096-5}, doi = {10.1016/0167-4048(94)90096-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Russell94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Shain94, author = {Michael Shain}, title = {Security issues with enterprise multimedia}, journal = {Comput. Secur.}, volume = {13}, number = {1}, pages = {15--22}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90086-8}, doi = {10.1016/0167-4048(94)90086-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Shain94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShaoHW94, author = {Bao{-}Min Shao and Jing{-}Jang Hwang and PeCheng Wang}, title = {Distributed assignment of cryptographic keys for access control in a hierarchy}, journal = {Comput. Secur.}, volume = {13}, number = {1}, pages = {79--84}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90098-1}, doi = {10.1016/0167-4048(94)90098-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShaoHW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SolmsM94, author = {Sebastiaan H. von Solms and Isak van der Merwe}, title = {The management of computer security profiles using a role-oriented approach}, journal = {Comput. Secur.}, volume = {13}, number = {8}, pages = {673--680}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90049-3}, doi = {10.1016/0167-4048(94)90049-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SolmsM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Sommer94, author = {Peter Sommer}, title = {Industrial espionage: Analysing the risk}, journal = {Comput. Secur.}, volume = {13}, number = {7}, pages = {558--563}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90004-3}, doi = {10.1016/0167-4048(94)90004-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Sommer94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SpectorG94, author = {Yishay Spector and Jacob Ginzberg}, title = {Pass-sentence - a new approach to computer code}, journal = {Comput. Secur.}, volume = {13}, number = {2}, pages = {145--160}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90064-7}, doi = {10.1016/0167-4048(94)90064-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SpectorG94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Strous94, author = {Leon Strous}, title = {Security evaluation criteria}, journal = {Comput. Secur.}, volume = {13}, number = {5}, pages = {379--384}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90030-2}, doi = {10.1016/0167-4048(94)90030-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Strous94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Svigals94, author = {Jerome Svigals}, title = {Smartcards - {A} security assessment}, journal = {Comput. Secur.}, volume = {13}, number = {2}, pages = {107--114}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90056-6}, doi = {10.1016/0167-4048(94)90056-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Svigals94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Symonds94, author = {Ian M. Symonds}, title = {Security in distributed and client/server systems - {A} management view}, journal = {Comput. Secur.}, volume = {13}, number = {6}, pages = {473--480}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(91)90133-X}, doi = {10.1016/0167-4048(91)90133-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Symonds94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Thuraisingham94, author = {Bhavani Thuraisingham}, title = {Security issues for federated database systems}, journal = {Comput. Secur.}, volume = {13}, number = {6}, pages = {509--525}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(91)90139-5}, doi = {10.1016/0167-4048(91)90139-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Thuraisingham94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Vazquez-Gomez94, author = {Jos{\'{e}} V{\'{a}}zquez{-}G{\'{o}}mez}, title = {Multidomain security}, journal = {Comput. Secur.}, volume = {13}, number = {2}, pages = {161--184}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90065-5}, doi = {10.1016/0167-4048(94)90065-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Vazquez-Gomez94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood94, author = {Charles Cresson Wood}, title = {Fifty ways to secure dial-up connections}, journal = {Comput. Secur.}, volume = {13}, number = {3}, pages = {209--215}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90071-X}, doi = {10.1016/0167-4048(94)90071-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zajac94, author = {Bernard P. Zajac Jr.}, title = {Cost effectiveness of anti-viral scanners}, journal = {Comput. Secur.}, volume = {13}, number = {5}, pages = {392--400}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90032-9}, doi = {10.1016/0167-4048(94)90032-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Zajac94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.