Journal of Computer Security
, Volume 1
Volume 1, Number 1, 1992
Catherine Meadows
: Applying Formal Methods to the Analysis of a Key Management Protocol. 5-36
BibTeX
John McLean
: Proving Noninterference and Functional Correctness Using Traces. 37-58
BibTeX
Ravi S. Sandhu
: Expressive Power of the Schematic Protection Model. 59-98
BibTeX
Pierre Bieber
,
Frédéric Cuppens
: A Logical View of Secure Dependencies. 99-130
BibTeX
Volume 1, Number 2, 1992
Sarbari Gupta
,
Virgil D. Gligor
: Towards a Theory of Penetration-Resistant Systems and its Applications. 133-158
BibTeX
Simon N. Foley
: Aggregation and Separation as Noninterference Properties. 159-188
BibTeX
Amihai Motro
: A Unified Model for Security and Integrity in Relational Databases. 189-213
BibTeX
Volume 1, Number 3-4, 1992
1991
Security and Privacy Symposium
J. C. Wray
: An Analysis of Covert Timing Channels. 219-232
BibTeX
W.-M. Hu
: Reducing Timing Channels with Fuzzy Time. 233-254
BibTeX
James W. Gray III
: Toward a Mathematical Foundation for Information. 255-294
BibTeX
Joseph Tardo
,
K. Alagappan
: SPX: Global Authentication Using Public Key Certificates. 295-316
BibTeX
Paul F. Syverson
: Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols. 317-334
BibTeX
Paul Ammann
,
Ravi S. Sandhu
: The Extended Schematic Protection Model. 335-384
BibTeX
J. Jacob
: Basic Theorems About Security. 385-412
BibTeX
Copyright ©
Sun May 17 00:07:58 2009 by
Michael Ley
(
ley@uni-trier.de
)