Journal of Computer Security
, Volume 7
Volume 7, Number 1, 1999
Intrusion Detection
Thomas E. Daniels
,
Eugene H. Spafford
: Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities. 3-35
BibTeX
Giovanni Vigna
,
Richard A. Kemmerer
: NetSTAT: A Network-based Intrusion Detection System.
BibTeX
Carlo Blundo
,
Barbara Masucci
: A Note on the Randomness in Dynamic Threshold Schemes. 73-85
BibTeX
Volume 7, Number 2/3, 1999
CSFW 11, 1998
Gavin Lowe
: Towards a Completeness Result for Model Checking of Security Protocols.
BibTeX
A. W. Roscoe
,
Philippa J. Broadfoot
: Proving Security Protocols with Model Checkers by Data Independence Techniques.
BibTeX
F. Javier Thayer
,
Jonathan C. Herzog
,
Joshua D. Guttman
: Strand Spaces: Proving Security Protocols Correct.
BibTeX
Dennis M. Volpano
,
Geoffrey Smith
: Probabilistic Noninterference in a Concurrent Language.
BibTeX
Volume 7, Number 4, 1999
Database Security XI (1997)
, Part 1
Elisa Bertino
,
Elena Ferrari
: Secure Object Deletion and Garbage Collection in Multilevel Object Bases.
BibTeX
Ehud Gudes
,
Martin S. Olivier
,
Reind P. van de Riet
: Modeling, Specifying and Implementing Workflow Security in Cyberspace.
BibTeX
Ravi S. Sandhu
,
Venkata Bhamidipati
: Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation.
BibTeX
Copyright ©
Sun May 17 00:07:59 2009 by
Michael Ley
(
ley@uni-trier.de
)