Search dblp for Publications

export results for "toc:db/journals/tissec/tissec1.bht:"

 download as .bib file

@article{DBLP:journals/tissec/BergadanoCR98,
  author       = {Francesco Bergadano and
                  Bruno Crispo and
                  Giancarlo Ruffo},
  title        = {High Dictionary Compression for Proactive Password Checking},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {3--25},
  year         = {1998},
  url          = {https://doi.org/10.1145/290163.290164},
  doi          = {10.1145/290163.290164},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BergadanoCR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BertinoVFS98,
  author       = {Elisa Bertino and
                  Sabrina De Capitani di Vimercati and
                  Elena Ferrari and
                  Pierangela Samarati},
  title        = {Exception-Based Information Flow Control in Object-Oriented Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {26--65},
  year         = {1998},
  url          = {https://doi.org/10.1145/290163.290167},
  doi          = {10.1145/290163.290167},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BertinoVFS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ReiterR98,
  author       = {Michael K. Reiter and
                  Aviel D. Rubin},
  title        = {Crowds: Anonymity for Web Transactions},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {66--92},
  year         = {1998},
  url          = {https://doi.org/10.1145/290163.290168},
  doi          = {10.1145/290163.290168},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ReiterR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Sandhu98,
  author       = {Ravi S. Sandhu},
  title        = {Editorial},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {1--2},
  year         = {1998},
  url          = {https://doi.org/10.1145/290163.290166},
  doi          = {10.1145/290163.290166},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Sandhu98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SandhuC98,
  author       = {Ravi S. Sandhu and
                  Fang Chen},
  title        = {The Multilevel Relational {(MLR)} Data Model},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {93--132},
  year         = {1998},
  url          = {https://doi.org/10.1145/290163.290171},
  doi          = {10.1145/290163.290171},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SandhuC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics