


default search action
Journal of Computer Security, Volume 4
Volume 4, Number 1, 1996
- Bruno d'Ausbourg, Christel Calas:

Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem. J. Comput. Secur. 4(1): 3-26 (1996) - A. W. Roscoe, Jim Woodcock

, Lars Wulf:
Non-interference through Determinism. 27-54 - Ueli M. Maurer, Pierre E. Schmid:

A Calculus for Security Bootstrapping in Distributed Systems. 55-80 - Azad Jiwa, Thomas Hardjono, Jennifer Seberry:

Beacons for Authentication in Distributed Systems. 81-96 - Ralf C. Hauser, Philippe A. Janson, Refik Molva

, Gene Tsudik, Els Van Herreweghen:
Robust and Secure Password and Key Change Method. 97-112
Volume 4, Number 2/3, 1996
- Shiuh-Pyng Shieh, Virgil D. Gligor:

Detecting Illicit Leakage of Information in Operating Systems. 123-148 - Paul Ammann, Richard J. Lipton, Ravi S. Sandhu:

The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. 149-166 - Dennis M. Volpano, Cynthia E. Irvine, Geoffrey Smith:

A Sound Type System for Secure Flow Analysis. 167-188 - John P. McDermott, Ravi Mukkamala:

A Performance Comparison of Five Transaction Processing Algorithms for the SINTRA Replicated-Architecture Database system. 189-228 - David Elliott Bell, Leonard J. LaPadula:

Secure Computer Systems: A Mathematical Model, Volume II. J. Comput. Secur. 4(2/3): 229-263 (1996)
Volume 4, Number 4, 1996
- Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:

The Omega Key Management Service. 267-288 - Shaw-Cheng Chuang:

Securing ATM Networks. 289-330 - Matt Bishop

:
Conspiracy and Information Flow in the Take-Grant Protection Model. 331-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














