-
1
-
-
84954412448
-
Ueps - A second generation electronic wallet
-
R.J. Anderson, Ueps - a second generation electronic wallet, in Computer Security - ESORICS 92 (1992) pp. 411-418.
-
(1992)
Computer Security - ESORICS
, vol.92
, pp. 411-418
-
-
Anderson, R.J.1
-
2
-
-
0028532579
-
Why cryptosystems fail
-
November
-
R.J. Anderson, Why cryptosystems fail, Communications of the ACM, 37(11) (November 1994) 32-40.
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
, pp. 32-40
-
-
Anderson, R.J.1
-
3
-
-
70449762596
-
A new authorization model for object-oriented databases
-
Bad Salzdetfurth, Germany August
-
E. Bertino, F. Origgi, and P. Samarati, A new authorization model for object-oriented databases, Proceedings, IFIP WG 11.3 8th International Working Conference on Database Security, Bad Salzdetfurth, Germany (August, 1994).
-
(1994)
Proceedings, IFIP WG 11.3 8th International Working Conference on Database Security
-
-
Bertino, E.1
Origgi, F.2
Samarati, P.3
-
4
-
-
0028498680
-
Security technologies
-
September/October
-
T.A. Brooks and M.M. Kaplan, Security technologies, AT&T Technical Journal 73(5) (September/October 1994) 4-8.
-
(1994)
AT&T Technical Journal
, vol.73
, Issue.5
, pp. 4-8
-
-
Brooks, T.A.1
Kaplan, M.M.2
-
5
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
October
-
D. Chaum, Security without identification: Transaction systems to make big brother obsolete, Comm. of the ACM 28(10) (October, 1985) 1030-1044.
-
(1985)
Comm. of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
6
-
-
0027005999
-
Achieving electronic privacy
-
August
-
D. Chaum, Achieving electronic privacy, Scientific American (August, 1992) pp. 96-101.
-
(1992)
Scientific American
, pp. 96-101
-
-
Chaum, D.1
-
9
-
-
85033103172
-
User-role based security enforcement mechanisms for object-oriented systems and applications, proceedings
-
Bad Salzdetfurth, Germany August
-
S.A. Demurjian, T.A. Dagget and T.C. Ting, User-role based security enforcement mechanisms for object-oriented systems and applications, Proceedings, IFIP WG 11.3 8th International Working Conference on Database Security, Bad Salzdetfurth, Germany (August, 1994).
-
(1994)
IFIP WG 11.3 8th International Working Conference on Database Security
-
-
Demurjian, S.A.1
Dagget, T.A.2
Ting, T.C.3
-
10
-
-
0004816371
-
A guide tour through mokum 2.0
-
Vrije Universiteit Amsterdam, Faculteit der Wiskunde en Informatica
-
F. Dehne and R.P. van de Riet, A guide tour through Mokum 2.0, Technical report (Vrije Universiteit Amsterdam, Faculteit der Wiskunde en Informatica, 1994).
-
(1994)
Technical Report
-
-
Dehne, F.1
Van De Riet, R.P.2
-
11
-
-
0028404874
-
A model for evaluation and administration of security in object-oriented databases
-
April
-
E.B. Fernandez, E. Gudes and H. Song, A model for evaluation and administration of security in object-oriented databases, IEEE Trans. on Knowledge and Data Engineering, 6(2) (April, 1994) 275-292.
-
(1994)
IEEE Trans. on Knowledge and Data Engineering
, vol.6
, Issue.2
, pp. 275-292
-
-
Fernandez, E.B.1
Gudes, E.2
Song, H.3
-
12
-
-
85033100372
-
User group structures in object-oriented database authorization, proceedings
-
Bad Salzdetfurth, Germany August
-
E.B. Fernandez, J. Wu and M.H. Fernandez, User group structures in object-oriented database authorization, Proceedings, IFIP WG 11.3 8th Working Conference on Database Security, Bad Salzdetfurth, Germany (August, 1994).
-
(1994)
IFIP WG 11.3 8th Working Conference on Database Security
-
-
Fernandez, E.B.1
Wu, J.2
Fernandez, M.H.3
-
13
-
-
0028533155
-
Securing cyberspace
-
November
-
Ravi Ganesan and Ravi Sandhu, Securing Cyberspace, Communication of the ACM, 37(11) (November 1994) 28-65.
-
(1994)
Communication of the ACM
, vol.37
, Issue.11
, pp. 28-65
-
-
Ganesan, R.1
Sandhu, R.2
-
14
-
-
30244558413
-
Information security issues in mobile computing
-
H.P. Eloff and S.H. von Solms (eds.) Chapman & Hall
-
T. Hardjono and J. Seberry, Information security issues in mobile computing, Information Security - the Next Decade, in H.P. Eloff and S.H. von Solms (eds.) (Chapman & Hall, 1995) pp. 289-304.
-
(1995)
Information Security - the Next Decade
, pp. 289-304
-
-
Hardjono, T.1
Seberry, J.2
-
16
-
-
30244571050
-
A context authentication service for role based access control in distribution system (CARDS)
-
H.P. Eloff and S.H. von Solms (eds.) Chapman & Hall
-
R. Holbein and S. Teufel, A context authentication service for role based access control in distribution system (CARDS), Information Security - the next Decade, in H.P. Eloff and S.H. von Solms (eds.) (Chapman & Hall, 1995) pp. 289-304.
-
(1995)
Information Security - the Next Decade
, pp. 289-304
-
-
Holbein, R.1
Teufel, S.2
-
17
-
-
30244530285
-
Security in group applications, lotus notes as a case study
-
H.P. Eloff and S.H. von Solms (eds.) Chapman & Hall
-
A. Hutchinson, Security in group applications, Lotus notes as a case study, Information Security - the Next Decade, in H.P. Eloff and S.H. von Solms (eds.) (Chapman & Hall, 1995) pp. 289-304.
-
(1995)
Information Security - the Next Decade
, pp. 289-304
-
-
Hutchinson, A.1
-
21
-
-
85033100017
-
-
Vrije University, Amsterdam, March
-
A. Junk, Security and man-machine aspects in Cyberspace - an object-oriented approach, Masters Thesis (Vrije University, 1995); also, Report IR-383 (Vrije University, Amsterdam, March, 1995).
-
(1995)
Report IR-383
-
-
-
22
-
-
85033104256
-
COST certificate management system: Structure, functions and protocols
-
San Diego February
-
N. Kapidzic and A. Davidson, COST certificate management system: Structure, functions and protocols, Proc. Internet Security Conference, San Diego (February, 1995).
-
(1995)
Proc. Internet Security Conference
-
-
Kapidzic, N.1
Davidson, A.2
-
23
-
-
30244440496
-
Security policies in object-oriented databases
-
D.L. Spooner and C. Landwehr (eds.) Elsevier
-
M.M. Larrondo Petrie, E. Gudes, M. Song, and E.B. Fernandez, Security policies in object-oriented databases, in Database Security III: Status and Prospects, in D.L. Spooner and C. Landwehr (eds.) (Elsevier, 1989) pp. 41-52.
-
(1989)
Database Security Iii: Status and Prospects
, vol.3
, pp. 41-52
-
-
Larrondo Petrie, M.M.1
Gudes, E.2
Song, M.3
Fernandez, E.B.4
-
24
-
-
30244458321
-
Functional and operational security system for open distributed environments
-
H.P. Eloff and S.H. von Solms (eds.) Chapman & Hall
-
S. Muftic, Functional and operational security system for open distributed environments, Information Security - the Next Decade, in H.P. Eloff and S.H. von Solms (eds.) (Chapman & Hall, 1995) p. 289-304.
-
(1995)
Information Security - the Next Decade
, pp. 289-304
-
-
Muftic, S.1
-
26
-
-
0009957301
-
The integration of security and integrity constraints in Mokum
-
J. Biskup, M. Morgenstern and C.E. Landwehr (eds.) IFIP, North-Holland
-
R.P. van de Riet and J. Beukering, The integration of security and integrity constraints in Mokum, in J. Biskup, M. Morgenstern and C.E. Landwehr (eds.) Database Security, VIII Status and Prospects (IFIP, North-Holland, 1994) pp. 223-246.
-
(1994)
Database Security, Viii Status and Prospects
, vol.8
, pp. 223-246
-
-
Van De Riet, R.P.1
Beukering, J.2
-
27
-
-
30244538110
-
Distributed object system security
-
H.P. Eloff and S.H. von Solms (eds.) Chapman & Hall
-
V. Varadharajan, Distributed object system security, Information Security - the Next Decade, in H.P. Eloff and S.H. von Solms (eds.) (Chapman & Hall, 1995) pp. 305-321.
-
(1995)
Information Security - the Next Decade
, pp. 305-321
-
-
Varadharajan, V.1
|