Search dblp for Publications

export results for "toc:db/journals/jcs/jcs5.bht:"

 download as .bib file

@article{DBLP:journals/jcs/AsokanTW97,
  author       = {N. Asokan and
                  Gene Tsudik and
                  Michael Waidner},
  title        = {Server-Supported Signatures},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {91--108},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5105},
  doi          = {10.3233/JCS-1997-5105},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AsokanTW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AtluriH97,
  author       = {Vijayalakshmi Atluri and
                  Wei{-}kuang Huang},
  title        = {Enforcing Mandatory and Discretionary Security in Workflow Management
                  Systems},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {303--340},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5403},
  doi          = {10.3233/JCS-1997-5403},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AtluriH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BergadanoCL97,
  author       = {Francesco Bergadano and
                  Bruno Crispo and
                  T. Mark A. Lomas},
  title        = {Strong Authentication and Privacy with Standard Browsers},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {191--212},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5302},
  doi          = {10.3233/JCS-1997-5302},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BergadanoCL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BonattiSS97,
  author       = {Piero A. Bonatti and
                  Maria Luisa Sapino and
                  V. S. Subrahmanian},
  title        = {Merging Heterogeneous Security Orderings},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {3--30},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5102},
  doi          = {10.3233/JCS-1997-5102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BonattiSS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BryceKALR97,
  author       = {Ciar{\'{a}}n Bryce and
                  Winfried E. K{\"{u}}hnhauser and
                  R{\'{e}}my Amouroux and
                  Mauricio L{\'{o}}pez and
                  Harry Rudnik},
  title        = {{CWASAR:} a European Infrastructure for Secure Electronic Commerce},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {225--236},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5304},
  doi          = {10.3233/JCS-1997-5304},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BryceKALR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CamenischMS97,
  author       = {Jan Camenisch and
                  Ueli M. Maurer and
                  Markus Stadler},
  title        = {Digital Payment Systems With Passive Anonymity-Revoking Trustees},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {69--90},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5104},
  doi          = {10.3233/JCS-1997-5104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CamenischMS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CastanoVF97,
  author       = {Silvana Castano and
                  Sabrina De Capitani di Vimercati and
                  Maria Grazia Fugini},
  title        = {Automated Derivation of Global Authorizations for Database Federations},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {271--302},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5402},
  doi          = {10.3233/JCS-1997-5402},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CastanoVF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DemurjianT97,
  author       = {Steven A. Demurjian and
                  T. C. Ting},
  title        = {Towards a Definitive Paradigm for Security in Object-Oriented Systems
                  and Applications},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {341--382},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5404},
  doi          = {10.3233/JCS-1997-5404},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DemurjianT97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Lotz97,
  author       = {Volkmar Lotz},
  title        = {Threat Scenarios as a Means to Formally Develop Secure Systems},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {31--68},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5103},
  doi          = {10.3233/JCS-1997-5103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Lotz97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MalkhiR97,
  author       = {Dahlia Malkhi and
                  Michael K. Reiter},
  title        = {A High-Throughput Secure Reliable Multicast Protocol},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {113--128},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5203},
  doi          = {10.3233/JCS-1997-5203},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MalkhiR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/QuisquaterJ97,
  author       = {Jean{-}Jacques Quisquater and
                  Marc Joye},
  title        = {Authentication of Sequences with the {SL2} Hash Function: Application
                  to Video Sequences},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {213--224},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5303},
  doi          = {10.3233/JCS-1997-5303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/QuisquaterJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RoscheisenW97,
  author       = {Martin R{\"{o}}scheisen and
                  Terry Winograd},
  title        = {A Network-Centric Design for Relationship-Based Security and Access
                  Control},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {249--254},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5306},
  doi          = {10.3233/JCS-1997-5306},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RoscheisenW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Sinclair97,
  author       = {Jane E. Sinclair},
  title        = {Action Systems for Security Specification},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {129--154},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5204},
  doi          = {10.3233/JCS-1997-5204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Sinclair97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SyversonRG97,
  author       = {Paul F. Syverson and
                  Michael G. Reed and
                  David M. Goldschlag},
  title        = {Private Web Browsing},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {237--248},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5305},
  doi          = {10.3233/JCS-1997-5305},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SyversonRG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VimercatiS97,
  author       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Authorization Specification and Enforcement in Federated Database
                  Systems},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {155--188},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5205},
  doi          = {10.3233/JCS-1997-5205},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VimercatiS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/WinslettCJS97,
  author       = {Marianne Winslett and
                  Neil Ching and
                  Vicki Ellen Jones and
                  Igor Slepchin},
  title        = {Using Digital Credentials on the World Wide Web},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {255--266},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5307},
  doi          = {10.3233/JCS-1997-5307},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/WinslettCJS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics