default search action
Journal of Computer Security, Volume 1
Volume 1, Number 1, 1992
- Catherine Meadows:
Applying Formal Methods to the Analysis of a Key Management Protocol. 5-36 - John McLean:
Proving Noninterference and Functional Correctness Using Traces. 37-58 - Ravi S. Sandhu:
Expressive Power of the Schematic Protection Model. 59-98 - Pierre Bieber, Frédéric Cuppens:
A Logical View of Secure Dependencies. 99-130
Volume 1, Number 2, 1992
- Sarbari Gupta, Virgil D. Gligor:
Towards a Theory of Penetration-Resistant Systems and its Applications. 133-158 - Simon N. Foley:
Aggregation and Separation as Noninterference Properties. 159-188 - Amihai Motro:
A Unified Model for Security and Integrity in Relational Databases. 189-213
Volume 1, Number 3-4, 1992
- John C. Wray:
An Analysis of Covert Timing Channels. 219-232 - Wei-Ming Hu:
Reducing Timing Channels with Fuzzy Time. 233-254 - James W. Gray III:
Toward a Mathematical Foundation for Information. 255-294 - Joseph J. Tardo, Kannan Alagappan:
SPX: Global Authentication Using Public Key Certificates. 295-316 - Paul F. Syverson:
Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols. 317-334 - Paul Ammann, Ravi S. Sandhu:
The Extended Schematic Protection Model. 335-384 - Jeremy Jacob:
Basic Theorems About Security. 385-412
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.