-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
Abadi, M., Burrows, M. Lampson, B., Plotkin, G., A calculus for access control in distributed systems, ACM Transactions on Programming Languages and Systems 15(4) (1993), pp. 706-734.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
0027342022
-
Composing specifications
-
Abadi, M., Lamport, L., Composing specifications, ACM Transactions on Programming Languages and Systems 15(1993), pp. 73-132.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, pp. 73-132
-
-
Abadi, M.1
Lamport, L.2
-
3
-
-
0030643343
-
A calculus for cryptographic protocols: The spi calculus
-
CCS 97, ACM
-
Abadi, M., Gordon, A. D, A calculus for cryptographic protocols: The spi calculus. In: Proc. 4th ACM Conference on Computer and Communications Security, CCS 97, ACM, 1997, pp. 36-47.
-
(1997)
Proc. 4th ACM Conference on Computer and Communications Security
, pp. 36-47
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
0031637195
-
On SDSI's linked local name spaces
-
Abadi, M., On SDSI's linked local name spaces, Journal of Computer Security 6(1998), pp. 3-22.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 3-22
-
-
Abadi, M.1
-
5
-
-
84891414146
-
Security protocols: Principles and calculi
-
Springer, Berlin etc., Berlin etc.
-
Abadi, M., Security protocols: Principles and calculi. In: Proc. Foundations of Security Analysis and Design IV, FOSAD 2006/2007, Lecture Notes in Computer Science 4677, Springer, Berlin etc., Berlin etc., 2007, pp. 1-23.
-
(2007)
Proc. Foundations of Security Analysis and Design IV, FOSAD 2006/2007, Lecture Notes in Computer Science 4677
, pp. 1-23
-
-
Abadi, M.1
-
6
-
-
0003928313
-
-
Addison-Wesley, Reading, MA, etc.
-
Abiteboul, S., Hull, R., Vianu, V., Foundation of Databases, Addison-Wesley, Reading, MA, etc., 1995.
-
(1995)
Foundation of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
7
-
-
0036510173
-
A content-based authorization model for digital libraries
-
Adam, N. R., Atluri, V., Bertino, E., Ferrari, E., A content-based authorization model for digital libraries, IEEE Transactions on Knowledge and Data Engineering 14(2) (2002), pp. 296-314.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.2
, pp. 296-314
-
-
Adam, N.R.1
Atluri, V.2
Bertino, E.3
Ferrari, E.4
-
9
-
-
0003900676
-
-
IETF RFC 3161
-
Adams, C., Cain, P., Pinkas, D., Zuccherato, R., Internet X.509 public key infrastructure time stamps protocols (TSP), 1999, IETF RFC 3161, http://www.ietf.org/rfc/rfc3161.txt.
-
(1999)
Internet X.509 Public Key Infrastructure Time Stamps Protocols (TSP)
-
-
Adams, C.1
Cain, P.2
Pinkas, D.3
Zuccherato, R.4
-
10
-
-
84956993736
-
Role-based authorization constraints specification
-
Ahn, G. J., Sandhu, R., Role-based authorization constraints specification, ACM Transactions on Information and System Security 3(4) (2000), pp. 207-226.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.J.1
Sandhu, R.2
-
11
-
-
0038613719
-
Secure mediation: Requirements, design and architecture
-
Altenschmidt, C., Biskup, J., Flegel, U., Karabulut, Y., Secure mediation: Requirements, design and architecture, Journal of Computer Security 11(2003), pp. 365-398.
-
(2003)
Journal of Computer Security
, vol.11
, pp. 365-398
-
-
Altenschmidt, C.1
Biskup, J.2
Flegel, U.3
Karabulut, Y.4
-
12
-
-
33645158447
-
Composition modeling and refinement for hierarchical hybrid systems
-
Alur, R., Grosu, R., Lee, I., Sokolsky, O., Composition modeling and refinement for hierarchical hybrid systems, Journal of Logic and Algebraic Programming 68(2006), pp. 105-128.
-
(2006)
Journal of Logic and Algebraic Programming
, vol.68
, pp. 105-128
-
-
Alur, R.1
Grosu, R.2
Lee, I.3
Sokolsky, O.4
-
15
-
-
0003482133
-
-
Intrusion. Net Books, Sparta, NJ
-
Amoroso, E., Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response, Intrusion. Net Books, Sparta, NJ, 1999.
-
(1999)
Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response
-
-
Amoroso, E.1
-
17
-
-
84976840591
-
An axiomatic approach to information flows in programs
-
Andrews, G. R., Reitman, R. P., An axiomatic approach to information flows in programs, ACM Transactions in Programming Languages and Systems 2(1) (1980), pp. 56-76.
-
(1980)
ACM Transactions in Programming Languages and Systems
, vol.2
, Issue.1
, pp. 56-76
-
-
Andrews, G.R.1
Reitman, R.P.2
-
18
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
IEEE
-
Arbaugh, W. A., Farber, D. J., Smith, J. M., A secure and reliable bootstrap architecture. In: Proc. IEEE Conference on Security and Privacy, IEEE, 1997, pp. 65-71.
-
(1997)
Proc. IEEE Conference on Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
19
-
-
84976770519
-
System/R: A relational approach to data base management
-
Astrahan, M. M., Blasgen, M. W., Chamberlin, D. D., et al., System/R: A relational approach to data base management, ACM Transactions on Database Systems 1(1976), pp. 97-137.
-
(1976)
ACM Transactions on Database Systems
, vol.1
, pp. 97-137
-
-
Astrahan, M.M.1
Blasgen, M.W.2
Chamberlin, D.D.3
-
20
-
-
84891410721
-
-
Special Issue FTCS-25 Silver Jubilee, IEEE, Los Alamitos etc.
-
Avizienis, A. (ed.), Fault-Tolerant Computing, Special Issue FTCS-25 Silver Jubilee, IEEE, Los Alamitos etc., 1995.
-
(1995)
Fault-Tolerant Computing
-
-
Avizienis, A.1
-
21
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C., Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing 1(1) (2004), pp. 11-33.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
22
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Chalmers University of Technology, Göteborg
-
Axelsson, S., Intrusion detection systems: A survey and taxonomy, Technical Report 99-15, Chalmers University of Technology, Göteborg, 2000.
-
(2000)
Technical Report 99-15
-
-
Axelsson, S.1
-
23
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson, S., The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security 3(3) (2000), pp. 186-205.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
24
-
-
0003907293
-
-
Macmillan Technical Publishing, Indianapolis
-
Bace, R. G.., Intrusion Detection, Macmillan Technical Publishing, Indianapolis, 2000.
-
(2000)
Intrusion Detection
-
-
Bace, R.G.1
-
25
-
-
35048854169
-
A general theorem for secure reactive systems
-
TCC 2004, Lecture Notes in Computer Science 2951, Springer, Berlin etc.
-
Backes, M., Pfitzmann, B., Waidner, M., A general theorem for secure reactive systems. In: 1st Theory of Cryptography Conference, TCC 2004, Lecture Notes in Computer Science 2951, Springer, Berlin etc., 2004, pp. 336-354.
-
(2004)
1st Theory of Cryptography Conference
, pp. 336-354
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
26
-
-
19744374538
-
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library
-
Backes, M., Pfitzmann, B., Waidner, M., Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library, International Journal of Information Security 4(3) (2005), pp. 135-154.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 135-154
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
27
-
-
24344472288
-
Relating symbolic and cryptographic secrecy
-
Backes, M., Pfitzmann, B., Relating symbolic and cryptographic secrecy, IEEE Transactions on Dependable and Secure Computing 2(2) (2005), pp. 109-123.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.2
, pp. 109-123
-
-
Backes, M.1
Pfitzmann, B.2
-
28
-
-
33750265393
-
Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes
-
ESORICS 2006, Lecture Notes in Computer Science 4189, Springer, Berlin etc.
-
Backes, M., Pfitzmann, B., Waidner, M., Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes. In: Proc. 11th European Symposium on Research in Computer Security, ESORICS 2006, Lecture Notes in Computer Science 4189, Springer, Berlin etc., 2006, pp. 404-423.
-
(2006)
Proc. 11th European Symposium on Research in Computer Security
, pp. 404-423
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
29
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
Bacon, J., Moody, K., Yao, W., A model of OASIS role-based access control and its support for active security, ACM Transactions on Information and System Security 5(4) (2002), pp. 492-540.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
30
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
Barker, S., Stuckey, P. J., Flexible access control policy specification with constraint logic programming, ACM Transactions on Information and System Security 6(4) (2003), pp. 501-546.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.J.2
-
31
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
Bass, T., Intrusion detection systems and multisensor data fusion, Communications of the ACM 43(4) (2000), pp. 99-105..
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
33
-
-
35248823014
-
-
2nd edition, Springer, Berlin etc.
-
Bauer, F. L., Wössner, H., Algorithmische Sprache und Programmentwicklung, 2nd edition, Springer, Berlin etc., 1984.
-
(1984)
Algorithmische Sprache und Programmentwicklung
-
-
Bauer, F.L.1
Wössner, H.2
-
34
-
-
0024133011
-
A generalization of Hellman's extension to Shannon's approach to cryptrography
-
Beauchemin, P., Brassard, G., A generalization of Hellman's extension to Shannon's approach to cryptrography, Journal of Cryptology 1(1988), pp. 129-131.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 129-131
-
-
Beauchemin, P.1
Brassard, G.2
-
35
-
-
33746365751
-
Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority
-
Beaver, D., Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority, Journal of Cryptology 4(2) (1991), pp. 75-122.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
36
-
-
0003400251
-
-
MITRE Corporation, Bedford, MA
-
Bell, D. E., LaPadula, L. J., Secure Computer Systems: Mathematical Foundations and Model, MITRE Corporation, Bedford, MA, 1974.
-
(1974)
Secure Computer Systems: Mathematical Foundations and Model
-
-
Bell, D.E.1
LaPadula, L.J.2
-
37
-
-
49049100147
-
Secure computer systems: A mathematical model
-
Reprinted, in
-
Bell, D. E., LaPadula, L. J., Secure computer systems: A mathematical model, Volume II. Reprinted in: Journal of Computer Security 4 (2 /3) (1996), pp. 229-263.
-
(1996)
Journal of Computer Security
, vol.2-4
, Issue.2-3
, pp. 229-263
-
-
Bell, D.E.1
LaPadula, L.J.2
-
38
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
Lecture Notes in Computer Science 435, Springer, Berlin etc.
-
Bellare, M., Micali, S., Non-interactive oblivious transfer and applications. In: Proc. Crypto 89, Lecture Notes in Computer Science 435, Springer, Berlin etc., 1989, pp. 547-557.
-
(1989)
Proc. Crypto 89
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
39
-
-
84983104598
-
On defining proofs of knowledge
-
Springer, Berlin etc.
-
Bellare, M., Goldreich, O., On defining proofs of knowledge. In: Crypto 92, Lecture Notes in Computer Science 740, Springer, Berlin etc., pp. 390-420.
-
Crypto 92, Lecture Notes in Computer Science 740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
40
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Bellare, M., Kilian, J., Rogaway, P., The security of the cipher block chaining message authentication code, Journal of Computer and System Sciences 61(3) (2000), pp. 362-399.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
43
-
-
0030732547
-
An extended authorization model for relational databases
-
Bertino, E., Samarati, P., Jajodia, S., An extended authorization model for relational databases, IEEE Transactions on Knowledge and Data Engineering 9(1) (1997), pp. 85-101.
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, Issue.1
, pp. 85-101
-
-
Bertino, E.1
Samarati, P.2
Jajodia, S.3
-
44
-
-
84958777954
-
An authorization model and its formal semantics
-
ESORICS 1998, Sept.1998, Lecture Notes in Computer Science 1485, Springer, Berlin etc.
-
Bertino, E., Buccafurri, F., Ferrari, E., Rullo, P., An authorization model and its formal semantics. In: Proc. 5th European Symposium on Research in Computer Security, ESORICS 1998, Sept.1998, Lecture Notes in Computer Science 1485, Springer, Berlin etc., 1998, pp. 127-142.
-
(1998)
Proc. 5th European Symposium on Research in Computer Security
, pp. 127-142
-
-
Bertino, E.1
Buccafurri, F.2
Ferrari, E.3
Rullo, P.4
-
45
-
-
0033725849
-
A logic-based approach for enforcing access control
-
Bertino, E., Buccafurri, F., Ferrari, E., Rullo, P., A logic-based approach for enforcing access control, Journal of Computer Security 8(2000), pp. 109-139.
-
(2000)
Journal of Computer Security
, vol.8
, pp. 109-139
-
-
Bertino, E.1
Buccafurri, F.2
Ferrari, E.3
Rullo, P.4
-
46
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., Atluri, V., The specification and enforcement of authorization constraints in workflow management systems, ACM Transactions on Information and System Security 2(1) (1999), pp. 65-104.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
47
-
-
84995455083
-
A nested transaction model for multilevel secure database management system
-
Bertino, E., Catania, B., Ferrari, E., A nested transaction model for multilevel secure database management system, ACM Transactions on Information and System Security 4(4) (2001), pp. 321-370.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.4
, pp. 321-370
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
-
48
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
Bertino, E., Bonatti, PA., Ferrari, E., TRBAC: A temporal role-based access control model, ACM Transactions on Information and System Security 4(3) (2001), pp. 191-233.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
49
-
-
0041524664
-
A logical framework for reasoning about access control models
-
Bertino, E., Catania, B., Ferrari, E., Perlasca, P., A logical framework for reasoning about access control models, ACM Transactions on Information and System Security 6(1) (2003), pp. 71-127.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
50
-
-
3142676730
-
Trust-χ: A peer-to-peer framework for trust establishment
-
Bertino, E., Ferrari, E., Squicciarini, A. C., Trust-χ: A peer-to-peer framework for trust establishment, IEEE Transactions on Knowledge and Data Management 16(7) (2004), pp. 827-842.
-
(2004)
IEEE Transactions on Knowledge and Data Management
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
51
-
-
19944380112
-
Database security - Concepts, approaches and challenges
-
Bertino, E., Sandhu, R., Database security - concepts, approaches and challenges, IEEE Transactions on Dependable and Secure Computing 2(1) (2005), pp. 2-19.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.1
, pp. 2-19
-
-
Bertino, E.1
Sandhu, R.2
-
52
-
-
0003723775
-
-
Bibliographisches Institut, Mannheim etc.
-
Beth, T, Jungnickel, D., Lenz, H., Design Theory, Bibliographisches Institut, Mannheim etc., 1985.
-
(1985)
Design Theory
-
-
Beth, T.1
Jungnickel, D.2
Lenz, H.3
-
53
-
-
0003400255
-
Integrity considerations for secure computer systems
-
MITRE Corporation, Bedford, MA
-
Biba, K. J., Integrity considerations for secure computer systems, Technical Report ESDTR-76-372 (MTR-3153), MITRE Corporation, Bedford, MA, 1977.
-
(1977)
Technical Report ESDTR-76-372 (MTR-3153)
-
-
Biba, K.J.1
-
54
-
-
84974754345
-
A logical view of secure dependencies
-
Bieber, P., Cuppens, F., A logical view of secure dependencies, Journal of Computer Security 1(1) (1992), pp. 99-130.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 99-130
-
-
Bieber, P.1
Cuppens, F.2
-
56
-
-
0030376097
-
Conspiracy and information flow in the take-grant protection model
-
Bishop, M., Conspiracy and information flow in the take-grant protection model, Journal of Computer Security 4(1996), pp. 331-359.
-
(1996)
Journal of Computer Security
, vol.4
, pp. 331-359
-
-
Bishop, M.1
-
58
-
-
0021510318
-
Some variants of the take-grant protection model
-
Biskup, J., Some variants of the take-grant protection model, Information Processing Letters 19(1984), pp. 151-156.
-
(1984)
Information Processing Letters
, vol.19
, pp. 151-156
-
-
Biskup, J.1
-
59
-
-
0024135278
-
The personal model of data
-
Biskup, J., Brüggemann, H. H., The personal model of data, Computers & Security 7(6) (1988), pp. 575-597.
-
(1988)
Computers & Security
, vol.7
, Issue.6
, pp. 575-597
-
-
Biskup, J.1
Brüggemann, H.H.2
-
60
-
-
84891410474
-
Privacy respecting permissions and rights
-
Landwehr, C. E. ed., Elsevier Science North Holland, Amsterdam etc.
-
Biskup, J., Privacy respecting permissions and rights. In: Landwehr, C. E. (ed.), Database Security: Status and Prospects, Elsevier Science (North Holland), Amsterdam etc., 1988, pp. 173-185.
-
(1988)
Database Security: Status and Prospects
, pp. 173-185
-
-
Biskup, J.1
-
62
-
-
84891453823
-
Sicherheit von IT-Systemen als "sogar wenn - Sonst nichts - Eigenschaft"
-
Weck, G., Horster, P. eds., VIS 93, DuD Fachbeiträge 16, Vieweg, Wiesbaden
-
Biskup, J., Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft". In: Weck, G., Horster, P. (eds.), Proc. GI-Fachtagung Verläßliche Informationssysteme, VIS 93, DuD Fachbeiträge 16, Vieweg, Wiesbaden, 1993, pp. 239-254.
-
(1993)
Proc. GI-Fachtagung Verläßliche Informationssysteme
, pp. 239-254
-
-
Biskup, J.1
-
63
-
-
0028016985
-
About the enforcement of state dependent security specifications
-
North-Holland
-
Biskup, J., Eckert, C., About the enforcement of state dependent security specifications. In: Proc. DBSec 1993, Database Security, VII: Status and Prospects, North-Holland, 1994, pp. 3-17.
-
(1994)
Proc. DBSec 1993, Database Security, VII: Status and Prospects
, pp. 3-17
-
-
Biskup, J.1
Eckert, C.2
-
64
-
-
0028585034
-
Reflections on security of database and datatransfer systems in health care
-
Brunnstein, K., Raubold, E. eds., Elsevier Science North Holland, Amsterdam etc.
-
Biskup, J., Bleumer, G., Reflections on security of database and datatransfer systems in health care. In: Brunnstein, K., Raubold, E. (eds.), Proc. 13th World Computer Congress 94, Volume 2, Elsevier Science (North Holland), Amsterdam etc., 1994, pp. 549-556.
-
(1994)
Proc. 13th World Computer Congress 94
, vol.2
, pp. 549-556
-
-
Biskup, J.1
Bleumer, G.2
-
65
-
-
0005060120
-
Technical enforcement of informational assurances
-
Jajodia, S. ed., Kluwer, Boston etc.
-
Biskup, J., Technical enforcement of informational assurances. In: Jajodia, S. (ed.), Database Security XXII: Status and Prospects, Kluwer, Boston etc., 1999, pp. 17-40.
-
(1999)
Database Security XXII: Status and Prospects
, pp. 17-40
-
-
Biskup, J.1
-
66
-
-
0034174093
-
For unknown secrecies refusal is better than lying
-
Biskup, J., For unknown secrecies refusal is better than lying, Data & Knowledge Engineering 33(2000), pp. 1-23.
-
(2000)
Data & Knowledge Engineering
, vol.33
, pp. 1-23
-
-
Biskup, J.1
-
67
-
-
84944184545
-
Transaction-based pseudonyms in audit data for privacy respecting intrusion detection
-
RAID 2000, Lecture Notes in Computer Science 1907, Springer, Berlin etc.
-
Biskup, J., Flegel, U., Transaction-based pseudonyms in audit data for privacy respecting intrusion detection. In: Proc. 3rd International Symposium on Recent Advances in Intrusion Detection, RAID 2000, Lecture Notes in Computer Science 1907, Springer, Berlin etc., 2000, pp. 28-48.
-
(2000)
Proc. 3rd International Symposium on Recent Advances in Intrusion Detection
, pp. 28-48
-
-
Biskup, J.1
Flegel, U.2
-
68
-
-
84862620665
-
On pseudonymization of audit data for intrusion detection
-
PET 2000, Lecture Notes in Computer Science 2009, Springer, Berlin etc.
-
Biskup, J., Flegel, U., On pseudonymization of audit data for intrusion detection. In: Proc. 1st International Symposium on Privacy Enhancing Technologies, PET 2000, Lecture Notes in Computer Science 2009, Springer, Berlin etc., 2000, pp. 161-180.
-
(2000)
Proc. 1st International Symposium on Privacy Enhancing Technologies
, pp. 161-180
-
-
Biskup, J.1
Flegel, U.2
-
69
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
Biskup, J., Bonatti, P. A., Lying versus refusal for known potential secrets, Data & Knowledge Engineering 38(2001), pp. 199-222.
-
(2001)
Data & Knowledge Engineering
, vol.38
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.A.2
-
70
-
-
84891382785
-
State-dependent security decisions for distributed objectsystems
-
Kluwer
-
Biskup, J., Leineweber, T., State-dependent security decisions for distributed objectsystems. In: Proc. DBSec 2001, Database and Application Security XV, Kluwer, 2002, pp. 105-118.
-
(2002)
Proc. DBSec 2001, Database and Application Security
, vol.15
, pp. 105-118
-
-
Biskup, J.1
Leineweber, T.2
-
71
-
-
84902439801
-
Administration rights in the SDSD-System
-
Kluwer
-
Biskup, J., Leineweber, T., Parthe, J., Administration rights in the SDSD-System. In: Data and Applications Security XVII: Status and Prospects, Kluwer, 2004, pp. 149-162.
-
(2004)
Data and Applications Security XVII: Status and Prospects
, pp. 149-162
-
-
Biskup, J.1
Leineweber, T.2
Parthe, J.3
-
72
-
-
84904350804
-
A hybrid PKI model: Application to secure mediation
-
Gudes, E., Shenoi, S. eds., Kluwer, Boston etc.
-
Biskup, J., Karabulut, Y., A hybrid PKI model: Application to secure mediation. In: Gudes, E., Shenoi, S. (eds.), Research Directions in Data and Applications Security, Kluwer, Boston etc., 2003, pp. 271-282.
-
(2003)
Research Directions in Data and Applications Security
, pp. 271-282
-
-
Biskup, J.1
Karabulut, Y.2
-
73
-
-
84882741913
-
Mediating between strangers: A trust management based approach
-
Gaithersburg, MD, USA, April
-
Biskup, J., Karabulut, Y., Mediating between strangers: A trust management based approach. In: Proc. 2nd Annual PKI Research Workshop, Gaithersburg, MD, USA, April 2003, pp. 80-95.
-
(2003)
Proc. 2nd Annual PKI Research Workshop
, pp. 80-95
-
-
Biskup, J.1
Karabulut, Y.2
-
74
-
-
0347756656
-
Controlled query evaluation for known policies by combining lying and refusal
-
Biskup, J., Bonatti, P. A., Controlled query evaluation for known policies by combining lying and refusal, Annals of Mathematics and Artificial Intelligence 40(2004), pp. 37-62.
-
(2004)
Annals of Mathematics and Artificial Intelligence
, vol.40
, pp. 37-62
-
-
Biskup, J.1
Bonatti, P.A.2
-
75
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Biskup, J., Bonatti, P. A., Controlled query evaluation for enforcing confidentiality in complete information systems, International Journal of Information Security 3(1) (2004), pp. 14-27.
-
(2004)
International Journal of Information Security
, vol.3
, Issue.1
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
76
-
-
4143055831
-
Towards a credential-based implementation of compound access control policies
-
SACMAT 04, Yorktown Heights
-
Biskup, J., Wortmann, S., Towards a credential-based implementation of compound access control policies. In: Proc. 9th ACM Symposium on Access Control Models and Technologies, SACMAT 04, Yorktown Heights, 2004, pp. 31-40.
-
(2004)
Proc. 9th ACM Symposium on Access Control Models and Technologies
, pp. 31-40
-
-
Biskup, J.1
Wortmann, S.2
-
77
-
-
74549139700
-
Optimistic anonymous participation in inter-organizational workflow instances
-
ICISS 2006, Lecture Notes in Computer Science 4332, Springer, Berlin etc.
-
Biskup, J., Parthe, J., Optimistic anonymous participation in inter-organizational workflow instances. In: Proc. 2nd International Conference on Information Systems Security, ICISS 2006, Lecture Notes in Computer Science 4332, Springer, Berlin etc., 2006, pp. 86-100.
-
(2006)
Proc. 2nd International Conference on Information Systems Security
, pp. 86-100
-
-
Biskup, J.1
Parthe, J.2
-
78
-
-
34547684253
-
Controlled query evaluation with open queries for a decidable relational submodel
-
Biskup, J., Bonatti, P. A., Controlled query evaluation with open queries for a decidable relational submodel, Annals of Mathematics and Artificial Intelligence 50(2007), pp. 39-77.
-
(2007)
Annals of Mathematics and Artificial Intelligence
, vol.50
, pp. 39-77
-
-
Biskup, J.1
Bonatti, P.A.2
-
79
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
Biskup, J., Embley, D. W., Lochner, J.-H., Reducing inference control to access control for normalized database schemas, Information Processing Letters 106(2008), pp. 8-12.
-
(2008)
Information Processing Letters
, vol.106
, pp. 8-12
-
-
Biskup, J.1
Embley, D.W.2
Lochner, J.-H.3
-
80
-
-
38149019240
-
Enforcing confidentiality in relational databases by reducing inference control to access control
-
ISC 07, Lecture Notes in Computer Science 4779, Springer, Berlin etc.
-
Biskup, J., Lochner, J.-H., Enforcing confidentiality in relational databases by reducing inference control to access control. In: Information Security Conference, ISC 07, Lecture Notes in Computer Science 4779, Springer, Berlin etc., 2007, pp. 407-422.
-
(2007)
Information Security Conference
, pp. 407-422
-
-
Biskup, J.1
Lochner, J.-H.2
-
81
-
-
44249126774
-
Keeping secrets in incomplete databases
-
Biskup, J., Weibert. T., Keeping secrets in incomplete databases, International Journal of Information Security 7(3) (2008), pp. 199-217.
-
(2008)
International Journal of Information Security
, vol.7
, Issue.3
, pp. 199-217
-
-
Biskup, J.1
Weibert, T.2
-
82
-
-
48249156214
-
Preprocessing for controlled query evaluation with availability policy
-
Biskup, J., Wiese, L., Preprocessing for controlled query evaluation with availability policy, Journal of Computer Security 16(4) (2008), pp. 477-494.
-
(2008)
Journal of Computer Security
, vol.16
, Issue.4
, pp. 477-494
-
-
Biskup, J.1
Wiese, L.2
-
84
-
-
0004260840
-
-
Cambridge University Press, Cambridge
-
Blackburn, P., Rijke, M., Venema, Y., Modal Logic, Cambridge University Press, Cambridge, 2001.
-
(2001)
Modal Logic
-
-
Blackburn, P.1
Rijke, M.2
Venema, Y.3
-
87
-
-
0004297283
-
-
Addison-Wesley, Reading, MA, etc.
-
Blakley, B., CORBA Security: An Introduction to Safe Computing with Objects, Addison-Wesley, Reading, MA, etc., 2000.
-
(2000)
CORBA Security: An Introduction to Safe Computing with Objects
-
-
Blakley, B.1
-
88
-
-
0029700344
-
Decentralized trust management
-
Blaze, M., Feigenbaum, J., Ioannindis, J., Keromytis, A. D., Decentralized trust management. In: Proc. IEEE Symposium on Security and Privacy, IEEE Computer Society, 1996, pp. 164-173.
-
(1996)
Proc. IEEE Symposium on Security and Privacy, IEEE Computer Society
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannindis, J.3
Keromytis, A.D.4
-
89
-
-
0004078695
-
-
RFC 2704, IETF
-
Blaze, M., Feigenbaum, J., Keromytis, A. D., The KeyNote trust management system version 2, RFC 2704, IETF, 1999.
-
(1999)
The KeyNote Trust Management System Version 2
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
90
-
-
20544431698
-
Coin flipping by telephone
-
University of California Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04
-
Blum, M., Coin flipping by telephone. In: Proc. Crypto 81, University of California Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04, 1982, pp. 11-15.
-
(1982)
Proc. Crypto 81
, pp. 11-15
-
-
Blum, M.1
-
91
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudorandom bits
-
Blum, M., Micali, S., How to generate cryptographically strong sequences of pseudorandom bits, SIAM Journal on Computing 13(1984), pp. 850-864.
-
(1984)
SIAM Journal on Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
92
-
-
0026383119
-
Non-interactive zero-knowledge proof systems
-
Blum, M., De Santis, A., Micali, S., Persiano, G., Non-interactive zero-knowledge proof systems, SIAM Journal on Computing 20(6) (1991), pp. 1084-1118.
-
(1991)
SIAM Journal on Computing
, vol.20
, Issue.6
, pp. 1084-1118
-
-
Blum, M.1
De Santis, A.2
Micali, S.3
Persiano, G.4
-
93
-
-
0029324246
-
Foundations of secure deductive databases
-
Bonatti, P. A., Kraus, S., Subrahmanian, V. S., Foundations of secure deductive databases, IEEE Transactions on Knowledge and Data Engineering 7(3) (1995), pp. 406-422.
-
(1995)
IEEE Transactions on Knowledge and Data Engineering
, vol.7
, Issue.3
, pp. 406-422
-
-
Bonatti, P.A.1
Kraus, S.2
Subrahmanian, V.S.3
-
94
-
-
85025424440
-
An algebra for composing access control policies
-
Bonatti, P. A., De Capitani di Vimercati, S., Samarati, P., An algebra for composing access control policies, ACM Transactions on Information and System Security 5(1) (2002), pp. 1-35.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.A.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
95
-
-
0036311802
-
A uniform framework for regulating service access and information release on the web
-
Bonatti, P. A., Samarati, P., A uniform framework for regulating service access and information release on the web, Journal of Computer Security 10(3) (2002), pp. 241-272.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.A.1
Samarati, P.2
-
96
-
-
26444484308
-
Logics for authorization and security
-
Springer, Berlin etc.
-
Bonatti, P. A., Samarati, P., Logics for authorization and security. In: Logics for Emerging Applications of Databases [outcome of a Dagstuhl seminar], Springer, Berlin etc., 2003, pp. 277-323.
-
(2003)
Logics for Emerging Applications of Databases [outcome of a Dagstuhl seminar]
, pp. 277-323
-
-
Bonatti, P.A.1
Samarati, P.2
-
97
-
-
10044297649
-
-
Springer, New York
-
Bolle, R. M., Connell, J. H., Pankanti, Sh., Ratha, N. K., Senior, A. W., Guide to Biometrics, Springer, New York, 2003.
-
(2003)
Guide to Biometrics
-
-
Bolle, R.M.1
Connell, J.H.2
Pankanti, Sh.3
Ratha, N.K.4
Senior, A.W.5
-
98
-
-
0004276026
-
-
Springer, Berlin etc.
-
Börger, E., Grädel, E., Gurewich, Y., The Classical Decision Problem, Springer, Berlin etc., 1997.
-
(1997)
The Classical Decision Problem
-
-
Börger, E.1
Grädel, E.2
Gurewich, Y.3
-
99
-
-
84995466560
-
-
Elsevier, Amsterdam etc.
-
Brachman, R. J., Leveques, H. J., Knowledge Representation and Reasoning, Elsevier, Amsterdam etc., 2004.
-
(2004)
Knowledge Representation and Reasoning
-
-
Brachman, R.J.1
Leveques, H.J.2
-
100
-
-
84867248592
-
Untraceable off-line cash in wallets with observers (extended abstract)
-
Lecture Notes in Computer Science 773, Springer, Berlin etc.
-
Brands, S. A., Untraceable off-line cash in wallets with observers (extended abstract). In: Proc. Crypto 93, Lecture Notes in Computer Science 773, Springer, Berlin etc., 1994, pp. 302-318.
-
(1994)
Proc. Crypto 93
, pp. 302-318
-
-
Brands, S.A.1
-
102
-
-
0024663219
-
The Chinese wall security policy
-
Oakland
-
Brewer, D. F. C., Nash, M. J., The Chinese Wall security policy. In: Proc. IEEE Symposium on Security and Privacy, 1989, Oakland, pp. 206-214.
-
(1989)
Proc. IEEE Symposium on Security and Privacy
, pp. 206-214
-
-
Brewer, D.F.C.1
Nash, M.J.2
-
104
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
Brickell, E., Davenport, D., On the classification of ideal secret sharing schemes, Journal of Cryptology 4(1991), pp. 123-134.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 123-134
-
-
Brickell, E.1
Davenport, D.2
-
105
-
-
14844295011
-
Direct anonymous attestation
-
CCS 04
-
Brickell, E., Camenisch, J., Chen, L. Direct anonymous attestation. In: Proc. 11th ACM Conference on Computer and Communications Security, CCS 04, pp. 132-145.
-
Proc. 11th ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
106
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
Brodsky, A., Farkas, C., Jajodia, S., Secure databases: Constraints, inference channels, and monitoring disclosures, IEEE Transactions on Knowledge and Data Engineering 12(6) (2000), pp. 900-919.
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
107
-
-
34547248279
-
Quantum cryptography: A survey
-
Article 6
-
Bruss, D., Erdelyi, G., Meyer, T., Riege, T., Rothe, J., Quantum cryptography: A survey, ACM Computing Surveys 39(2) (2007), Article 6 (27 pages).
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.2
, pp. 27
-
-
Bruss, D.1
Erdelyi, G.2
Meyer, T.3
Riege, T.4
Rothe, J.5
-
110
-
-
84891384628
-
-
Bundesverfassungsgericht, Bundesanzeiger 35, 241a, see
-
Bundesverfassungsgericht, Urteil vom 15. Dezember 1983 zum Volkszählungsgesetz 1983, Bundesanzeiger 35, 241a, 1983 (see http://www.datenschutz-berlin. de/sonstige/volksz.html).
-
(1983)
Urteil Vom 15. Dezember 1983 zum Volkszählungsgesetz 1983
-
-
-
111
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R. M., A logic of authentication, ACM Transactions on Computer Systems 8(1) (1990), pp. 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
112
-
-
37349093278
-
Privacy enhanced intrusion detection
-
Addison-Wesley, Munich etc.
-
Büschges, R., Kesdogan, D., Privacy enhanced intrusion detection. In: Multilateral Security in Communications, Addison-Wesley, Munich etc., 1999, pp. 187-204.
-
(1999)
Multilateral Security in Communications
, pp. 187-204
-
-
Büschges, R.1
Kesdogan, D.2
-
113
-
-
57049129588
-
-
Lecture Notes in Computer Science 4157, Springer, Berlin etc.
-
Butler, M., Jones, C., Romanovsky, A., Troubitsyna, E. (eds.), Rigorous Development of Complex Fault-Tolerant Systems, Lecture Notes in Computer Science 4157, Springer, Berlin etc., 2006.
-
(2006)
Rigorous Development of Complex Fault-Tolerant Systems
-
-
Butler, M.1
Jones, C.2
Romanovsky, A.3
Troubitsyna, E.4
-
114
-
-
35048847167
-
Better privacy for trusted computing platforms
-
ESORICS 04, Lecture Notes in Computer Science 3193, Springer, Berlin etc.
-
Camenisch, J., Better privacy for trusted computing platforms. In: Proc. 9th European Symposium on Research in Computer Security, ESORICS 04, Lecture Notes in Computer Science 3193, Springer, Berlin etc., 2004, pp. 73-88.
-
(2004)
Proc. 9th European Symposium on Research in Computer Security
, pp. 73-88
-
-
Camenisch, J.1
-
115
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R., Security and composition of multiparty cryptographic protocols, Journal of Cryptology 13(2000), pp. 143-202.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 143-202
-
-
Canetti, R.1
-
116
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
FOCS
-
Canetti, R., Universally composable security: A new paradigm for cryptographic protocols. In: 42nd IEEE Symposium on Foundations of Computer Science, FOCS 2001, pp. 136-145.
-
(2001)
42nd IEEE Symposium on Foundations of Computer Science
, pp. 136-145
-
-
Canetti, R.1
-
117
-
-
38049064364
-
Universally composable security with global setup
-
TCC 2007, Lecture Notes in Computer Science 4392, Springer, Berlin etc.
-
Canetti, R., Dodis, Y., Pass, R., Walfish, S., Universally composable security with global setup. In: 4th Theory of Cryptography Conference, TCC 2007, Lecture Notes in Computer Science 4392, Springer, Berlin etc., 2007, pp. 61-85.
-
(2007)
4th Theory of Cryptography Conference
, pp. 61-85
-
-
Canetti, R.1
Dodis, Y.2
Pass, R.3
Walfish, S.4
-
118
-
-
0004190705
-
-
Addison-Wesley, Wokingham etc.
-
Castano, S., Fugini, M., Martella, G., Samarati, P., Database Security, Addison-Wesley, Wokingham etc., 1995.
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
120
-
-
0020915882
-
Blind signatures for untraceable payments
-
Plenum, New York
-
Chaum, D., Blind signatures for untraceable payments. In: Proc. Crypto 82, Plenum, New York, 1983, pp. 199-203.
-
(1983)
Proc. Crypto 82
, pp. 199-203
-
-
Chaum, D.1
-
121
-
-
0004210998
-
-
O'Reilly, Cambridge etc.
-
Chapman, D. B., Zwickey, E. D., Building Internet Firewalls, O'Reilly, Cambridge etc., 1995.
-
(1995)
Building Internet Firewalls
-
-
Chapman, D.B.1
Zwickey, E.D.2
-
122
-
-
0019532104
-
Untraceable electronic mail, return adresses, and digital pseudonyms
-
Chaum, D., Untraceable electronic mail, return adresses, and digital pseudonyms, Communications of the ACM 24(2) (1981), pp. 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
123
-
-
0022145479
-
Security without identification: Transaction systems to make Big Brother obsolete
-
Chaum, D., Security without identification: Transaction systems to make Big Brother obsolete, Communications of the ACM 28(10) (1985), pp. 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
124
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D., The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology 1(1) (1988), pp. 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
125
-
-
0010252194
-
Undeniable signatures
-
Lecture Notes in Computer Science 435, Springer, Berlin etc.
-
Chaum, D., van Antwerpen, H., Undeniable signatures. In: Proc. Crypto 89, Lecture Notes in Computer Science 435, Springer, Berlin etc., 1990, pp. 212-216.
-
(1990)
Proc. Crypto 89
, pp. 212-216
-
-
Chaum, D.1
Van Antwerpen, H.2
-
126
-
-
85043778396
-
Zero-knowledge undeniable signatures
-
Lecture Notes in Computer Science 473, Springer, Berlin etc.
-
Chaum, D., Zero-knowledge undeniable signatures. In: Proc. Eurocrypt 90, Lecture Notes in Computer Science 473, Springer, Berlin etc., 1991, pp. 458-464.
-
(1991)
Proc. Eurocrypt 90
, pp. 458-464
-
-
Chaum, D.1
-
127
-
-
84947955350
-
Cryptographically strong undeniable signatures unconditionally secure for the signer
-
Lecture Notes in Computer Science 576, Springer, Berlin etc.
-
Chaum, D., van Heijst, E., Pfitzmann. B., Cryptographically strong undeniable signatures unconditionally secure for the signer. In: Proc. Crypto 91, Lecture Notes in Computer Science 576, Springer, Berlin etc., 1992, pp. 470-484.
-
(1992)
Proc. Crypto 91
, pp. 470-484
-
-
Chaum, D.1
Van Heijst, E.2
Pfitzmann, B.3
-
128
-
-
85024290278
-
Group signatures
-
Lecture Notes in Computer Science 547, Springer, Berlin etc.
-
Chaum, D., van Heijst, E., Group signatures. In: Proc. Eurocrypt 91, Lecture Notes in Computer Science 547, Springer, Berlin etc., 1991, pp. 257-265.
-
(1991)
Proc. Eurocrypt 91
, pp. 257-265
-
-
Chaum, D.1
Van Heijst, E.2
-
129
-
-
85001025766
-
Wallet databases with observers
-
Lecture Notes in Computer Science 740, Springer, Berlin etc.
-
Chaum, D., Pedersen, T. P., Wallet databases with observers. In: Proc. Crypto 92, Lecture Notes in Computer Science 740, Springer, Berlin etc., 1993, pp. 89-105.
-
(1993)
Proc. Crypto 92
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
130
-
-
84948980067
-
New group signature schemes
-
Lecture Notes in Computer Science 950, Springer, Berlin etc.
-
Chen, L., Pedersen, T. P., New group signature schemes. In: Proc. Eurocrypt 94, Lecture Notes in Computer Science 950, Springer, Berlin etc., 1995, pp. 171-181.
-
(1995)
Proc. Eurocrypt 94
, pp. 171-181
-
-
Chen, L.1
Pedersen, T.P.2
-
131
-
-
0003437009
-
-
Addison-Wesley, Reading, MA, etc.
-
Cheswick, W. R., Bellovin, S. M., Firewalls and Internet Security, Addison-Wesley, Reading, MA, etc., 1994.
-
(1994)
Firewalls and Internet Security
-
-
Cheswick, W.R.1
Bellovin, S.M.2
-
132
-
-
0017943805
-
Security in statistical databases for queries with small counts
-
Chin, F. Y., Security in statistical databases for queries with small counts, ACM Transactions on Database Systems 3(1) (1978), pp. 92-104.
-
(1978)
ACM Transactions on Database Systems
, vol.3
, Issue.1
, pp. 92-104
-
-
Chin, F.Y.1
-
133
-
-
0020205885
-
Auditing and inference control in statistical databases
-
Chin, F. Y., Özsoyoglu, G., Auditing and inference control in statistical databases, IEEE Transactions on Software Engineering 8(6) (1982), pp. 574-582.
-
(1982)
IEEE Transactions on Software Engineering
, vol.8
, Issue.6
, pp. 574-582
-
-
Chin, F.Y.1
Özsoyoglu, G.2
-
134
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
Chor, B., Goldwasser, S., Micali, S., Awerbuch, B., Verifiable secret sharing and achieving simultaneity in the presence of faults. In: 26th IEEE Symposium on Foundations of Computer Science, 1985, pp. 383-395.
-
(1985)
26th IEEE Symposium on Foundations of Computer Science
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
135
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
Oakland
-
Clark, D. D., Wilson, D. R., A comparison of commercial and military computer security policies. In: Proc. IEEE Symposium on Security and Privacy, 1987, Oakland, pp. 184-194.
-
(1987)
Proc. IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
136
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Clarke, D. E., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., Rivest, R. L., Certificate chain discovery in SPKI/SDSI, Journal of Computer Security 9(4) (2001), pp. 285-322.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.E.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
137
-
-
0014797273
-
A relational model of data for large shared data banks
-
Codd, E. F., A relational model of data for large shared data banks, Communications of the ACM 13(1970), pp. 377-387.
-
(1970)
Communications of the ACM
, vol.13
, pp. 377-387
-
-
Codd, E.F.1
-
138
-
-
8344220516
-
Towards web service access control
-
Coetzee, M., Eloff, J. H. P., Towards web service access control, Computers & Security 23(7) (2004), 559-570.
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 559-570
-
-
Coetzee, M.1
Eloff, J.H.P.2
-
141
-
-
0003765587
-
-
Common Criteria Editorial Board, Version 1.0, Jan. 1996; Version 2, May, see
-
Common Criteria Editorial Board, Common Criteria for Information Technology Security Evaluation, Version 1.0, Jan. 1996; Version 2, May 1998 (see http://csrc.nist.gov/cc).
-
(1998)
Common Criteria for Information Technology Security Evaluation
-
-
-
142
-
-
0028428941
-
The Data Encryption Standard (DES) and its strength against attacks
-
Coppersmith, D., The Data Encryption Standard (DES) and its strength against attacks, IBM Journal of Research and Development 38(3) (1994), pp. 243-250.
-
(1994)
IBM Journal of Research and Development
, vol.38
, Issue.3
, pp. 243-250
-
-
Coppersmith, D.1
-
143
-
-
0003676114
-
-
4th edition, Addison-Wesley, Wokingham
-
Coulouris, G., Dollimore, J., Kindberg, T., Distributed Systems: Concepts and Design, 4th edition, Addison-Wesley, Wokingham, 2004.
-
(2004)
Distributed Systems: Concepts and Design
-
-
Coulouris, G.1
Dollimore, J.2
Kindberg, T.3
-
144
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Lecture Notes in Computer Science 839, Springer, Berlin etc.
-
Cramer, R., Damgard, I., Schoenmakers, B., Proofs of partial knowledge and simplified design of witness hiding protocols. In: Proc. Crypto 94, Lecture Notes in Computer Science 839, Springer, Berlin etc., 1994, pp. 174-187.
-
(1994)
Proc. Crypto 94
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
145
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Lecture Notes in Computer Science 2045, Springer, Berlin etc.
-
Cramer, R., Damgard, I., Nielsen, J. B., Multiparty computation from threshold homomorphic encryption. In: Proc. Eurocrypt 01, Lecture Notes in Computer Science 2045, Springer, Berlin etc., 2001, pp. 280-300.
-
(2001)
Proc. Eurocrypt 01
, pp. 280-300
-
-
Cramer, R.1
Damgard, I.2
Nielsen, J.B.3
-
147
-
-
0033100756
-
Logical foundation of multilevel databases
-
Cuppens, F., Gabillon, A., Logical foundation of multilevel databases, Data & Knowledge Engineering 29(1999), pp. 259-291.
-
(1999)
Data & Knowledge Engineering
, vol.29
, pp. 259-291
-
-
Cuppens, F.1
Gabillon, A.2
-
148
-
-
0035342199
-
Cover story management
-
Cuppens, F., Gabillon, A., Cover story management, Data & Knowledge Engineering 37(2001), pp. 177-201.
-
(2001)
Data & Knowledge Engineering
, vol.37
, pp. 177-201
-
-
Cuppens, F.1
Gabillon, A.2
-
149
-
-
84981199109
-
A design principle for hash functions
-
Lecture Notes in Computer Science 435, Springer, Berlin etc.
-
Damgard, I., A design principle for hash functions. In: Proc. Crypto 89, Lecture Notes in Computer Science 435, Springer, Berlin etc., 1990, pp. 416-227.
-
(1990)
Proc. Crypto 89
, pp. 416-227
-
-
Damgard, I.1
-
150
-
-
33745545274
-
On the existence of statistically hiding bit commitment schemes and fail-stop signatures
-
Damgard, I., Pedersen, T. P., Pfitzmann, B., On the existence of statistically hiding bit commitment schemes and fail-stop signatures, Journal of Cryptology 10(3) (1997), pp. 163-194.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.3
, pp. 163-194
-
-
Damgard, I.1
Pedersen, T.P.2
Pfitzmann, B.3
-
151
-
-
35248844164
-
Universally composable efficient multiparty computation from threshold homomorphic encryption
-
Damgard, I., Nielsen, J. B., Universally composable efficient multiparty computation from threshold homomorphic encryption. In: Proc. Crypto 03, pp. 247-264.
-
Proc. Crypto 03
, pp. 247-264
-
-
Damgard, I.1
Nielsen, J.B.2
-
152
-
-
0004154170
-
-
8th edition, Addison-Wesley, Reading, MA, etc.
-
Date, C. J., An Introduction to Database Systems, 8th edition, Addison-Wesley, Reading, MA, etc., 2004.
-
(2004)
An Introduction to Database Systems
-
-
Date, C.J.1
-
153
-
-
0004189288
-
-
2nd edition, Wiley, Chichester etc.
-
Davis, D. W., Price, W. L., Security for Computer Networks, 2nd edition, Wiley, Chichester etc., 1989.
-
(1989)
Security for Computer Networks
-
-
Davis, D.W.1
Price, W.L.2
-
154
-
-
0032690110
-
Minimal data upgrading to prevent inference and association attacks
-
Dawson, S., De Capitani di Vimercati, S., Lincoln, P., Samarati, P., Minimal data upgrading to prevent inference and association attacks. In: ACM Symposium on Principles of Database Systems, 1999, pp. 114-125.
-
(1999)
ACM Symposium on Principles of Database Systems
, pp. 114-125
-
-
Dawson, S.1
De Capitani Di Vimercati, S.2
Lincoln, P.3
Samarati, P.4
-
155
-
-
84891376611
-
Specification and enforcement of classification and inference constraints
-
Dawson, S., De Capitani di Vimercati, S., Samarati, P., Specification and enforcement of classification and inference constraints. In: Proc. IEEE Symposium on Security and Privacy 1999, pp. 181-195.
-
Proc. IEEE Symposium on Security and Privacy 1999
, pp. 181-195
-
-
Dawson, S.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
156
-
-
0003753233
-
-
Springer, Berlin etc.
-
Daemen, J., Rijmen, V., The Design of Rijndael: AES - The Advanced Encryption Standard, Springer, Berlin etc., 2002.
-
(2002)
The Design of Rijndael: AES - The Advanced Encryption Standard
-
-
Daemen, J.1
Rijmen, V.2
-
157
-
-
0033293396
-
Towards a taxonony of intrusion-detection systems
-
Debar, H., Dacier, M., Wespi, A., Towards a taxonony of intrusion-detection systems, Computer Networks 31(1999), pp. 805-822.
-
(1999)
Computer Networks
, vol.31
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
158
-
-
24644431553
-
Policies, models, and languages for access control
-
DNIS 2005, Aizu, Japan, Lecture Notes in Computer Science 3433, Springer, Berlin etc.
-
De Capitani di Vimercati, S., Samarati, P., Jajodia, S., Policies, models, and languages for access control. In: Proc. 4th Workshop on Databases in Networked Information Systems, DNIS 2005, Aizu, Japan, Lecture Notes in Computer Science 3433, Springer, Berlin etc., 2005, pp. 225-237.
-
(2005)
Proc. 4th Workshop on Databases in Networked Information Systems
, pp. 225-237
-
-
De Capitani Di Vimercati, S.1
Samarati, P.2
Jajodia, S.3
-
159
-
-
2342639859
-
-
Springer, Berlin etc.
-
Delfs, H., Knebl, H., Introduction to Cryptography: Principles and Applications, Springer, Berlin etc., 2002.
-
(2002)
Introduction to Cryptography: Principles and Applications
-
-
Delfs, H.1
Knebl, H.2
-
160
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D. E., A lattice model of secure information flow, Communications of the ACM 19(5) (1976), pp. 236-243.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
161
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D. E., Denning, P. J., Certification of programs for secure information flow, Communications of the ACM 20(7) (1977), pp. 504-513.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
162
-
-
0018442066
-
The tracker: A threat to statistical database security
-
Denning, D. E., Denning, P. J., Schwartz, M. D., The tracker: A threat to statistical database security, ACM Transactions on Database Systems 4(1) (1979), pp. 76-96.
-
(1979)
ACM Transactions on Database Systems
, vol.4
, Issue.1
, pp. 76-96
-
-
Denning, D.E.1
Denning, P.J.2
Schwartz, M.D.3
-
163
-
-
0004238984
-
-
Addison-Wesley, Reading, MA, etc.
-
Denning, D. E., Cryptography and Data Security, Addison-Wesley, Reading, MA, etc., 1982.
-
(1982)
Cryptography and Data Security
-
-
Denning, D.E.1
-
164
-
-
0020779363
-
Inference controls for statistical databases
-
Denning, D. E., Schlörer, J., Inference controls for statistical databases, IEEE Computer 16(7) (1983), pp. 69-82.
-
(1983)
IEEE Computer
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.E.1
Schlörer, J.2
-
166
-
-
0023292280
-
Views for multilevel database security
-
Denning, D. E., Akl, S., Heckman, M., Lunt, T., Morgenstern, M., Neumann, P., Schell, R., Views for multilevel database security, IEEE Transactions on Software Engineering 13(2) (1987), pp. 129-140.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 129-140
-
-
Denning, D.E.1
Akl, S.2
Heckman, M.3
Lunt, T.4
Morgenstern, M.5
Neumann, P.6
Schell, R.7
-
168
-
-
84874159348
-
APES - Anonymity and privacy in electronic services
-
Diaz, C., Claessens, J., Preneel, B., APES - Anonymity and privacy in electronic services, Datenschutz und Datensicherheit (DuD) 27(2003), pp. 143-145.
-
(2003)
Datenschutz und Datensicherheit (DuD)
, vol.27
, pp. 143-145
-
-
Diaz, C.1
Claessens, J.2
Preneel, B.3
-
169
-
-
84891430278
-
-
Technical reports, K. U. Leuven
-
Diaz, C., Claessens, J., Preneel, B., et al., Anonymity and Privacy in Electronic Services (APES), Technical reports, K. U. Leuven, 2001-2002.
-
(2001)
Anonymity and Privacy in Electronic Services (APES)
-
-
Diaz, C.1
Claessens, J.2
Preneel, B.3
-
170
-
-
84891457670
-
The concept of secure information processing systems and their basic functions
-
Espoo Helsinki, Finland
-
Dierstein, R., The concept of secure information processing systems and their basic functions. In: Proc. IFIP/SEC 90, Espoo (Helsinki), Finland.
-
Proc. IFIP/SEC 90
-
-
Dierstein, R.1
-
171
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., Hellman, M. E., New directions in cryptography, IEEE Transactions on Information Theory IT-22 (6) (1976), pp. 644-654.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
172
-
-
0020254967
-
Protection in the OSKAR operating system - Goals, concepts, consequences
-
Oakland
-
Dittrich, K. R., Hug, K., Kammerer, P., Lienert, D., Mau, H., Wachsmuth, K., Protection in the OSKAR operating system - goals, concepts, consequences. In: Proc. IEEE Symposium on Security and Privacy, Oakland, 1982, pp. 46-56.
-
(1982)
Proc. IEEE Symposium on Security and Privacy
, pp. 46-56
-
-
Dittrich, K.R.1
Hug, K.2
Kammerer, P.3
Lienert, D.4
Mau, H.5
Wachsmuth, K.6
-
173
-
-
0005268716
-
Cryptanalysis of MD4
-
Dobbertin, H., Cryptanalysis of MD4, Journal of Cryptology 11(1998), pp. 253-271.
-
(1998)
Journal of Cryptology
, vol.11
, pp. 253-271
-
-
Dobbertin, H.1
-
174
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., Yao, A. C., On the security of public key protocols, IEEE Transactions on Information Theory 29(2) (1983), pp. 198-208.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
175
-
-
0011586610
-
Xor-trees for efficient anonymous multicast and reception
-
Dolev, S., Ostrovsky, R., Xor-trees for efficient anonymous multicast and reception, ACM Transactions on Information and System Security 3(2) (2000), pp. 63-84.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 63-84
-
-
Dolev, S.1
Ostrovsky, R.2
-
176
-
-
84949438251
-
Advances in inference control in statistical databases: An overview
-
Lecture Notes in Computer Science 2316, Springer, Berlin etc.
-
Domingo-Ferrer, J., Advances in inference control in statistical databases: An overview. In: Proc. Inference Control in Statistical Databases, Lecture Notes in Computer Science 2316, Springer, Berlin etc., 2002, pp. 1-7.
-
(2002)
Proc. Inference Control in Statistical Databases
, pp. 1-7
-
-
Domingo-Ferrer, J.1
-
177
-
-
0242496951
-
Secure multiparty computation problems and their applications: A review and open problems
-
ACM
-
Du, W., Atallah, M. J., Secure multiparty computation problems and their applications: A review and open problems. In: Proc. New Security Paradigms Workshop 2001, ACM, 2001, pp. 13-22.
-
(2001)
Proc. New Security Paradigms Workshop 2001
, pp. 13-22
-
-
Du, W.1
Atallah, M.J.2
-
179
-
-
0004231561
-
-
Springer, Berlin etc.
-
Ebbinghaus, H.-D., Flum, J., Finite Model Theory, Springer, Berlin etc., 1995.
-
(1995)
Finite Model Theory
-
-
Ebbinghaus, H.-D.1
Flum, J.2
-
181
-
-
0036090387
-
STATL: An attack language for statebased intrusion detection
-
Eckmann, S. T., Vigna, G.., Kemmerer, R. A., STATL: An attack language for statebased intrusion detection, Journal of Computer Security 10 (1-2) (2002), pp. 71-104.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
183
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithm
-
ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithm, IEEE Transactions on Information Theory 31(1985), pp. 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
184
-
-
0003546303
-
-
July 1999
-
Ellison, C. M., Frantz, B., Lampson, B., Rivest, R. L., Thomas, B. M., Ylonen, T., Simple public key certificate, http://world.std.com/~cme/html/sdsi. html, July 1999.
-
Simple Public Key Certificate
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.L.4
Thomas, B.M.5
Ylonen, T.6
-
185
-
-
0003593599
-
-
Internet RFC 2693, September
-
Ellison, C. M., Frantz, B., Lampson, B., Rivest, R. L., Thomas, B. M., Ylonen, T., SPKI certificate theory, http://world.std.com/~cme/html/spki.html, Internet RFC 2693, September 1999.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.L.4
Thomas, B.M.5
Ylonen, T.6
-
186
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public key infrastructure
-
Ellison, C. M., Schneier, B., Ten risks of PKI: What you're not being told about public key infrastructure, Journal of Computer Security 16(1) (2000), pp. 1-7.
-
(2000)
Journal of Computer Security
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.M.1
Schneier, B.2
-
187
-
-
3142521758
-
Public-key support for group collaboration
-
Ellison, C. M., Dohrmann, D., Public-key support for group collaboration, ACM Transactions on Information and System Security 6(4) (2003), pp. 547-565.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 547-565
-
-
Ellison, C.M.1
Dohrmann, D.2
-
188
-
-
0004092884
-
-
3rd edition, Addison-Wesley, Reading, MA, etc
-
Elmasri, R., Navathe, S. B., Fundamentals of Database Systems, 3rd edition, Addison-Wesley, Reading, MA, etc, 2000.
-
(2000)
Fundamentals of Database Systems
-
-
Elmasri, R.1
Navathe, S.B.2
-
189
-
-
0027680124
-
A comparative framework for risk analysis methods
-
Eloff, J. H. P., Labuschagne, L., Badenhorst, K. P., A comparative framework for risk analysis methods, Computers & Security 12(6) (1993), pp. 597-603.
-
(1993)
Computers & Security
, vol.12
, Issue.6
, pp. 597-603
-
-
Eloff, J.H.P.1
Labuschagne, L.2
Badenhorst, K.P.3
-
190
-
-
33750477656
-
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties
-
Escobar, S., Meadows, M., Meseguer, J., A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties, Theoretical Computer Science 367 (1-2) (2006), pp. 162-202.
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 162-202
-
-
Escobar, S.1
Meadows, M.2
Meseguer, J.3
-
195
-
-
33845223165
-
Protocol for signing contracts
-
University of California Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04
-
Even, S., Protocol for signing contracts. In: Proc. Crypto 81, University of California Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04, 1982, pp. 148-153.
-
(1982)
Proc. Crypto 81
, pp. 148-153
-
-
Even, S.1
-
196
-
-
0016081585
-
Capability-based addressing
-
Fabry, R. S., Capability-based addressing, Communications of the ACM 17(7) (1974), pp. 403-412.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 403-412
-
-
Fabry, R.S.1
-
197
-
-
0018008817
-
On an authorization mechanism
-
Fagin, R., On an authorization mechanism, ACM Transactions on Database Systems 3(3) (1978), pp. 310-319.
-
(1978)
ACM Transactions on Database Systems
, vol.3
, Issue.3
, pp. 310-319
-
-
Fagin, R.1
-
198
-
-
0003730235
-
-
MIT Press, Cambridge, MA
-
Fagin, R., Halpern, J. Y., Moses, Y., Vardi, M. Y., Reasoning About Knowledge, MIT Press, Cambridge, MA, 1995.
-
(1995)
Reasoning About Knowledge
-
-
Fagin, R.1
Halpern, J.Y.2
Moses, Y.3
Vardi, M.Y.4
-
199
-
-
12244265258
-
The inference problem: A survey
-
Farkas, C., Jajodia, S., The inference problem: A survey, ACM SIGKDD Explorations Newsletter 4(2) (2002), pp. 6-11.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
200
-
-
0024135240
-
Zero-knowledge proofs of identity
-
Feige, U., Fiat, A., Shamir, A., Zero-knowledge proofs of identity, Journal of Cryptology 1(1988), pp. 77-94.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
201
-
-
0001820140
-
Cryptography and computer privacy
-
Feistel, H., Cryptography and computer privacy, Scientific American 228(5) (1973), pp. 15-23.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
202
-
-
0003421261
-
-
Wiley, New York, 1968 and
-
Feller, W., An Introduction to Probability Theory and Its Applications, Volumes 1 and 2, Wiley, New York, 1968 and 1971.
-
(1971)
An Introduction to Probability Theory and its Applications
, vol.1-2
-
-
Feller, W.1
-
203
-
-
84959022836
-
Extensions of single-term coins
-
Lecture Notes in Computer Science 773, Springer, Berlin etc.
-
Ferguson, N., Extensions of single-term coins. In: Proc. Crypto 93, Lecture Notes in Computer Science 773, Springer, Berlin etc., 1994, pp. 292-301.
-
(1994)
Proc. Crypto 93
, pp. 292-301
-
-
Ferguson, N.1
-
204
-
-
84992227458
-
Proposed NIST standard for rolebased access control
-
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, R., Proposed NIST standard for rolebased access control, ACM Transactions on Information and System Security 4(3) (2001), pp. 224-274.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, R.4
-
205
-
-
0036706546
-
An authorization system for digital libraries
-
Ferrari, E., Adam, N. R., Atluri, V., Bertino, E., Capuozzo, U., An authorization system for digital libraries, The VLDB Journal 11(2002), pp. 58-67.
-
(2002)
The VLDB Journal
, vol.11
, pp. 58-67
-
-
Ferrari, E.1
Adam, N.R.2
Atluri, V.3
Bertino, E.4
Capuozzo, U.5
-
206
-
-
0015641828
-
On the advantages of tagged architecture
-
Feustel, E. A., On the advantages of tagged architecture, IEEE Transactions on Computers C-22 (7) (1973), pp. 644-656.
-
(1973)
IEEE Transactions on Computers
, vol.C-22
, Issue.7
, pp. 644-656
-
-
Feustel, E.A.1
-
207
-
-
84891452137
-
Informationelle Garantien für das Zeitalter der Informationstechnik
-
Tinnefeld, M.-T., Philipps, L., Weis, K. eds., Oldenbourg, Munich/Vienna
-
Fiedler, H., Informationelle Garantien für das Zeitalter der Informationstechnik. In: Tinnefeld, M.-T., Philipps, L., Weis, K. (eds.), Institutionen und der Einzelne im Zeitalter der Informationstechnik, Oldenbourg, Munich/Vienna, 1994, pp. 147-158.
-
(1994)
Institutionen und der Einzelne im Zeitalter der Informationstechnik
, pp. 147-158
-
-
Fiedler, H.1
-
208
-
-
84944030615
-
Pseudonymizing UNIX log files
-
InfraSec 2002, Lecture Notes in Computer Science 2437, Springer, Berlin etc.
-
Flegel, U., Pseudonymizing UNIX log files. In: Proc. Infrastructure Security Conference, InfraSec 2002, Lecture Notes in Computer Science 2437, Springer, Berlin etc., 2002, pp. 162-179.
-
(2002)
Proc. Infrastructure Security Conference
, pp. 162-179
-
-
Flegel, U.1
-
209
-
-
33746646762
-
Requirements of information reductions for cooperating intrusion detection agents
-
ETRIX 2006, Lecture Notes in Computer Science 3995, Springer, Berlin etc.
-
Flegel, U., Biskup, J., Requirements of information reductions for cooperating intrusion detection agents. In: Proc. International Conference on Emerging Trends in Information and Communication Security, ETRIX 2006, Lecture Notes in Computer Science 3995, Springer, Berlin etc., 2006, pp. 466-480.
-
(2006)
Proc. International Conference on Emerging Trends in Information and Communication Security
, pp. 466-480
-
-
Flegel, U.1
Biskup, J.2
-
211
-
-
84974776068
-
A classification of security properties for process algebras
-
Focardi, R., Gorrieri, R., A classification of security properties for process algebras, Journal of Computer Security 3(1) (1995), pp. 5-33.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
212
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
Focardi, R., Gorrieri, R., eds., Lecture Notes in Computer Science 2171, Springer, Berlin etc.
-
Focardi, R., Gorrieri, R., Classification of security properties (Part I: information flow). In: Focardi, R., Gorrieri, R., (eds.), Foundations of Security Analysis and Design, Lecture Notes in Computer Science 2171, Springer, Berlin etc., 2001, pp. 331-396.
-
(2001)
Foundations of Security Analysis and Design
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
213
-
-
0023241098
-
A universal theory of information flow
-
Oakland
-
Foley, S. N., A universal theory of information flow. In: IEEE Sympsoum on Security and Privacy, Oakland, 1987, pp. 116-122.
-
(1987)
IEEE Sympsoum on Security and Privacy
, pp. 116-122
-
-
Foley, S.N.1
-
214
-
-
0029716418
-
A sense of self for Unix processes
-
Forrest, S., Hofmayr, S. A., Longstaff, T. A., A sense of self for Unix processes. In: Proc. IEEE Symposium on Security and Privacy, 1996, pp. 120-128.
-
(1996)
Proc. IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmayr, S.A.2
Longstaff, T.A.3
-
216
-
-
0003991982
-
-
2nd edition, O'Reilly, Sebastopol, CA, etc.
-
Garfinkel, S., Spafford, G., Practical UNIX and Internet Security, 2nd edition, O'Reilly, Sebastopol, CA, etc., 1996.
-
(1996)
Practical UNIX and Internet Security
-
-
Garfinkel, S.1
Spafford, G.2
-
217
-
-
0004257127
-
-
2nd edition, Cambridge University Press, Cambridge
-
Gathen, J. von zur, Gerhard, J., Modern Computer Algebra, 2nd edition, Cambridge University Press, Cambridge, 2003.
-
(2003)
Modern Computer Algebra
-
-
Von Gathen, J.Z.1
Gerhard, J.2
-
219
-
-
0016038540
-
Codes which detect deception
-
Gilbert, E. N., MacWilliams, F. J., Sloane, N. J. A., Codes which detect deception, Bell System Technical Journal 53(3) (1974), pp. 405-424.
-
(1974)
Bell System Technical Journal
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.N.1
MacWilliams, F.J.2
Sloane, N.J.A.3
-
220
-
-
85028838274
-
On the cryptographic applications of random functions
-
Springer, Berlin etc.
-
Goldreich, O., Goldwasser, S., Micali, S., On the cryptographic applications of random functions. In: Proc. Crypto 84, Lecture Notes in Computer Science 263, Springer, Berlin etc., pp. 276-288.
-
Proc. Crypto 84, Lecture Notes in Computer Science 263
, pp. 276-288
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
221
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S., How to construct random functions, Journal of the ACM 33(1986), pp. 792-807.
-
(1986)
Journal of the ACM
, vol.33
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
222
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Wigderson, A., How to play any mental game - a completeness theorem for protocols with honest majority. In: Proc. 19th ACM Symposium on the Theory of Computing, 1987, pp. 218-229.
-
(1987)
Proc. 19th ACM Symposium on the Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
223
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
Goldreich, O., Micali, S., Wigderson, A., Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems, Journal of the ACM 38(3) (1991), pp. 691-729.
-
(1991)
Journal of the ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
224
-
-
0027797493
-
On the existence of pseudorandom generators
-
Goldreich, O., Krawcyzk, H., Luby, M., On the existence of pseudorandom generators, SIAM Journal on Computing 22(1993), pp. 1163-1175.
-
(1993)
SIAM Journal on Computing
, vol.22
, pp. 1163-1175
-
-
Goldreich, O.1
Krawcyzk, H.2
Luby, M.3
-
225
-
-
0028676264
-
Definitions and properties of zero-knowledge proof systems
-
Goldreich, O., Oren, Y., Definitions and properties of zero-knowledge proof systems, Journal of Cryptography 7(1) (1994), pp. 1-32.
-
(1994)
Journal of Cryptography
, vol.7
, Issue.1
, pp. 1-32
-
-
Goldreich, O.1
Oren, Y.2
-
227
-
-
0141610193
-
Cryptography and cryptographic protocols
-
Goldreich, O., Cryptography and cryptographic protocols, Distributed Computing 16(2003), pp. 177-199.
-
(2003)
Distributed Computing
, vol.16
, pp. 177-199
-
-
Goldreich, O.1
-
230
-
-
0005063385
-
Onion routing
-
Goldschlag, D. M., Reed, M. G., Syverson, P. F., Onion routing, Communications of the ACM 42(2) (1999), pp. 39-41.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
231
-
-
0021409284
-
Probabilistic encryption
-
Goldwasser, S., Micali, S., Probabilistic encryption, Journal of Computer and System Science 28(1984), pp. 270-299.
-
(1984)
Journal of Computer and System Science
, vol.28
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
232
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S. Rivest, R. L., A digital signature scheme secure against adaptive chosen-message attacks, SIAM Journal on Computing 17(2) (1988), pp. 281-308.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
233
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., Micali, S. Rackoff, C., The knowledge complexity of interactive proof systems, SIAM Journal on Computing 18(1) (1989), pp. 186-207.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-207
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
234
-
-
0004256091
-
-
1st edition, Wiley, Chichester, 1999; 2nd edition
-
Gollmann, D., Computer Security, 1st edition, Wiley, Chichester, 1999; 2nd edition, 2006.
-
(2006)
Computer Security
-
-
Gollmann, D.1
-
235
-
-
84889800114
-
-
Springer, New York
-
Goloubeva, O., Rebaudengo, M., Rorda, M. S., Violante, M., Software-Implemented Hardware Fault Tolerance, Springer, New York, 2006.
-
(2006)
Software-Implemented Hardware Fault Tolerance
-
-
Goloubeva, O.1
Rebaudengo, M.2
Rorda, M.S.3
Violante, M.4
-
236
-
-
33749417211
-
-
Chapter 4 of JDK 1.4.2
-
Gong, L., Java2 platform security architecture, Chapter 4 of JDK 1.4.2, http://java.sun. com/j2se/1.4.2/docs/guide/security/spec/security-spec. doc4.html, 1997-2002.
-
(1997)
Java2 Platform Security Architecture
-
-
Gong, L.1
-
237
-
-
0020299523
-
Security policies and security models
-
Oakland
-
Goguen, J. A., Mesequer, J., Security policies and security models. In: Proc. IEEE Symposium on Security and Privacy, 1982, Oakland, pp. 11-20.
-
(1982)
Proc. IEEE Symposium on Security and Privacy
, pp. 11-20
-
-
Goguen, J.A.1
Mesequer, J.2
-
238
-
-
0021177508
-
Unwinding and inference control
-
Oakland
-
Goguen, J. A., Mesequer, J., Unwinding and inference control. In: Proc. IEEE Symposium on Security and Privacy, 1984, Oakland, pp. 75-86.
-
(1984)
Proc. IEEE Symposium on Security and Privacy
, pp. 75-86
-
-
Goguen, J.A.1
Mesequer, J.2
-
239
-
-
0026157130
-
Toward a mathematical foundation for information flow properties
-
Oakland
-
Gray, J. W., III, Toward a mathematical foundation for information flow properties. In: Proc. IEEE Symposium on Security and Privacy, Oakland, 1991, pp. 21-34.
-
(1991)
Proc. IEEE Symposium on Security and Privacy
, pp. 21-34
-
-
Gray III, J.W.1
-
241
-
-
84976657250
-
An authorization mechanism for relational database systems
-
Griffiths, P. P., Wade, B. W., An authorization mechanism for relational database systems, ACM Transactions on Database Systems 1(3) (1976), pp. 242-255.
-
(1976)
ACM Transactions on Database Systems
, vol.1
, Issue.3
, pp. 242-255
-
-
Griffiths, P.P.1
Wade, B.W.2
-
242
-
-
0003442184
-
-
3rd edition, Addison-Wesley, Reading, MA, etc.
-
Grimaldi, R. P., Discrete and Combinatorial Mathematics, 3rd edition, Addison-Wesley, Reading, MA, etc., 1994.
-
(1994)
Discrete and Combinatorial Mathematics
-
-
Grimaldi, R.P.1
-
243
-
-
84891431186
-
Vertrauenswürdiges Booten als Grundlage authentischer Basissysteme
-
VIS 91, Informatik-Fachberichte 271, Springer, Berlin etc.
-
Groß, M., Vertrauenswürdiges Booten als Grundlage authentischer Basissysteme. In: Proc. GI-Fachtagung Verläßliche Informationssysteme, VIS 91, Informatik-Fachberichte 271, Springer, Berlin etc., pp. 190-207.
-
Proc. GI-Fachtagung Verläßliche Informationssysteme
, pp. 190-207
-
-
Groß, M.1
-
244
-
-
0023292465
-
Extending the noninterference version of MLS for SAT
-
Haigh, J. T., Young, W. D., Extending the noninterference version of MLS for SAT, IEEE Transactions on Software Engineering 13(2) (1987), pp. 141-150.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 141-150
-
-
Haigh, J.T.1
Young, W.D.2
-
245
-
-
0037519332
-
Practical and provably-secure commitment schemes from collision-free hashing
-
Springer, Berlin etc.
-
Halevi, S., Micali, S., Practical and provably-secure commitment schemes from collision-free hashing. In: Proc. Crypto 96, Lecture Notes in Computer Science 1109, Springer, Berlin etc., 1996, pp. 201-215.
-
(1996)
Proc. Crypto 96, Lecture Notes in Computer Science 1109
, pp. 201-215
-
-
Halevi, S.1
Micali, S.2
-
246
-
-
0035067717
-
A logic for SDSI's linked local name spaces
-
Halpern, J. Y., van der Meyden, R., A logic for SDSI's linked local name spaces, Journal of Computer Security 9(2001), pp. 105-142.
-
(2001)
Journal of Computer Security
, vol.9
, pp. 105-142
-
-
Halpern, J.Y.1
Van Der Meyden, R.2
-
248
-
-
11244267013
-
-
Springer, New York etc.
-
Hankerson, D., Menezes, A., Vanstone, S., Guide to Elliptic Curve Cryptography, Springer, New York etc., 2004.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
249
-
-
24944472289
-
On robust combiners for oblivious transfer and other primitives
-
Springer; Berlin etc.
-
Harnik, D., Kilian, J., Naor, M., Reingold, O., Rosen, A., On robust combiners for oblivious transfer and other primitives. In: Proc. Eurocrypt 05, Lecture Notes in Computer Science 3494, Springer; Berlin etc., 2005, pp. 96-113.
-
(2005)
Proc. Eurocrypt 05, Lecture Notes in Computer Science 3494
, pp. 96-113
-
-
Harnik, D.1
Kilian, J.2
Naor, M.3
Reingold, O.4
Rosen, A.5
-
250
-
-
0016984825
-
Protection in operating systems
-
Harrison, M. A., Ruzzo, W. L., Ullman, J. D., Protection in operating systems, Communications of the ACM 19(8) (1976), pp. 461-471.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
251
-
-
0009442659
-
Monotonic protection systems
-
DeMillo, R. A., et al. eds., Academic Press, New York
-
Harrison, M. A., Ruzzo, W. L., Monotonic protection systems. In: DeMillo, R. A., et al. (eds.), Foundations of Secure Computation, Academic Press, New York, 1978, pp. 337-365.
-
(1978)
Foundations of Secure Computation
, pp. 337-365
-
-
Harrison, M.A.1
Ruzzo, W.L.2
-
252
-
-
84891449292
-
-
German National Research Center for Computer Science GMD
-
Härtig, H., Kühnhäuser, W. E., Kowalski, O. C., Lux, W., Reck, W., Streich, H., Goos, G.., Architecture of the BirliX operating system, German National Research Center for Computer Science (GMD), 1990.
-
(1990)
Architecture of the BirliX Operating System
-
-
Härtig, H.1
Kühnhäuser, W.E.2
Kowalski, O.C.3
Lux, W.4
Reck, W.5
Streich, H.6
Goos, G.7
-
253
-
-
0011356981
-
The BirliX security architecture
-
Härtig, H., Kowalski, O. C., Kühnhauser, W. E., The BirliX security architecture, Journal of Computer Security 2(1993), pp. 5-22.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 5-22
-
-
Härtig, H.1
Kowalski, O.C.2
Kühnhauser, W.E.3
-
254
-
-
0004302191
-
-
3rd edition, Morgan Kaufmann, San Francisco
-
Hennessy, J. L., Patterson, D. A., Computer Architecture: A Quantitative Approach, 3rd edition, Morgan Kaufmann, San Francisco, 2003.
-
(2003)
Computer Architecture: A Quantitative Approach
-
-
Hennessy, J.L.1
Patterson, D.A.2
-
255
-
-
4444341241
-
Content-triggered trust negotation
-
Hess, A., Holt, L., Jacobson, J., Seamons, K., Content-triggered trust negotation, ACM Transactions on Information and System Security 7(3) (2004), pp. 428-456.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
, pp. 428-456
-
-
Hess, A.1
Holt, L.2
Jacobson, J.3
Seamons, K.4
-
256
-
-
0003728153
-
-
Marcel Dekker, New York
-
Hoffman, D. G., Leonard, D. A., Lindner, C. C., Phelps, K. T., Rodger, C. A., Wall, J. R., Coding Theory: The Essentials, Marcel Dekker, New York, 1991.
-
(1991)
Coding Theory: The Essentials
-
-
Hoffman, D.G.1
Leonard, D.A.2
Lindner, C.C.3
Phelps, K.T.4
Rodger, C.A.5
Wall, J.R.6
-
258
-
-
0003620778
-
-
2nd edition, Addison-Wesley, Reading, MA, etc.
-
Hopcroft, J. E., Motwani, R., Ullman, J. D., Introduction into Automata Theory, Languages, and Computation, 2nd edition, Addison-Wesley, Reading, MA, etc., 2001.
-
(2001)
Introduction Into Automata Theory, Languages, and Computation
-
-
Hopcroft, J.E.1
Motwani, R.2
Ullman, J.D.3
-
259
-
-
85159659045
-
A formal semantics for SPKI
-
ESORICS 2000, Lecture Notes in Computer Science 1895, Springer, Berlin etc.
-
Howell, J., Kotz, D., A formal semantics for SPKI. In: Proc. 6th European Symposium on Research in Computer Security, ESORICS 2000, Lecture Notes in Computer Science 1895, Springer, Berlin etc., 2004, pp. 140-158.
-
(2004)
Proc. 6th European Symposium on Research in Computer Security
, pp. 140-158
-
-
Howell, J.1
Kotz, D.2
-
260
-
-
2842517149
-
-
Academic Press, New York etc.
-
Hsiao, D. K., Kerr, D. S., Madnick, S. E., Computer Security, Academic Press, New York etc., 1979.
-
(1979)
Computer Security
-
-
Hsiao, D.K.1
Kerr, D.S.2
Madnick, S.E.3
-
261
-
-
0033293621
-
A large scale distributed intrusion detection framework based on attack strategy analysis
-
Huang, M.-Y., Jasper, R. J., Wicks, T. M., A large scale distributed intrusion detection framework based on attack strategy analysis, Computer Networks 31 (23-24) (1999), pp. 2465-2475.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2465-2475
-
-
Huang, M.-Y.1
Jasper, R.J.2
Wicks, T.M.3
-
262
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
Hughes, D., Shmatikov, V., Information hiding, anonymity and privacy: A modular approach, Journal of Computer Security 12(2004), pp. 3-36.
-
(2004)
Journal of Computer Security
, vol.12
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
263
-
-
0037244227
-
A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment
-
Iheagwara, C., Blyth, A., Singhal, M., A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment, Journal of Computer Security 11(2003), pp. 1-33.
-
(2003)
Journal of Computer Security
, vol.11
, pp. 1-33
-
-
Iheagwara, C.1
Blyth, A.2
Singhal, M.3
-
264
-
-
0027150412
-
USTAT: A real-time intrusion detection system for Unix
-
Ilgun, K., USTAT: a real-time intrusion detection system for Unix. In: Proc. IEEE Symposium on Security and Privacy, 1993, pp. 16-29.
-
(1993)
Proc. IEEE Symposium on Security and Privacy
, pp. 16-29
-
-
Ilgun, K.1
-
265
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Ilgun, K., Kemmerer, R. A., Porras, P. A., State transition analysis: A rule-based intrusion detection approach, IEEE Transactions on Software Engineering 21(3) (1995), pp. 181-199.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
266
-
-
0004228472
-
-
ISHTAR Consortium, Studies in Health Technology and Informatics 66, IOS Press, Amsterdam etc.
-
ISHTAR Consortium, Implementing Secure Healthcare Telematics Applications in Europe, Studies in Health Technology and Informatics 66, IOS Press, Amsterdam etc., 2001.
-
(2001)
Implementing Secure Healthcare Telematics Applications in Europe
-
-
-
267
-
-
84891423099
-
-
ISO International Organization for Standardization, IEC International Electrotechnical Commission: Joint Technical Committee ISO/IEC JTC 1 on Information Technology, ISO/IEC FCD 9075
-
ISO (International Organization for Standardization), IEC (International Electrotechnical Commission): Joint Technical Committee ISO/IEC JTC 1 on Information Technology, Database Language SQL (final committee draft for 4th edition), ISO/IEC FCD 9075, 1997.
-
(1997)
Database Language SQL (final Committee Draft for 4th edition)
-
-
-
270
-
-
0027289776
-
Multiple assignment schemes for secret sharing
-
Ito, M., Saito, A., Nishizeki, T., Multiple assignment schemes for secret sharing, Journal of Cryptology 6(1993), pp. 15-20.
-
(1993)
Journal of Cryptology
, vol.6
, pp. 15-20
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
272
-
-
85006937063
-
Practical safety in flexible access control models
-
Jaeger, T., Tidswell, J. E., Practical safety in flexible access control models, ACM Transactions on Information and System Security 4(2) (2001), pp. 158-190.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.2
, pp. 158-190
-
-
Jaeger, T.1
Tidswell, J.E.2
-
274
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
May
-
Jajodia, S., Samarati, P., Subrahmanian, V. S., Bertino, E., A unified framework for enforcing multiple access control policies. In: Proc. ACM SIGMOD Int. Conference on Management of Data, May 1997, pp. 474-485.
-
(1997)
Proc. ACM SIGMOD Int. Conference on Management of Data
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
275
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia, S., Samarati, P., Sapino, M. L., Subrahmanian, V. S., Flexible support for multiple access control policies, ACM Transactions on Database Systems 26(2) (2001), pp. 214-260.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
276
-
-
0034951888
-
Multilevel secure transaction processing
-
Jajodia, S., Atluri, V., Keefe, T., McCollum, C. D., Mukkamala, R., Multilevel secure transaction processing, Journal of Computer Security 9(2001), pp. 165-195.
-
(2001)
Journal of Computer Security
, vol.9
, pp. 165-195
-
-
Jajodia, S.1
Atluri, V.2
Keefe, T.3
McCollum, C.D.4
Mukkamala, R.5
-
279
-
-
3042565619
-
Model checking SPKI/SDSI
-
Jha, S., Reps, T., Model checking SPKI/SDSI, Journal of Computer Security 12(2004), pp. 317-353.
-
(2004)
Journal of Computer Security
, vol.12
, pp. 317-353
-
-
Jha, S.1
Reps, T.2
-
280
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
Johnson, D., Menezes, A., Vanstone, S., The elliptic curve digital signature algorithm (ECDSA), International Journal on Information Security 1(1) (2001), pp. 36-63.
-
(2001)
International Journal on Information Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
281
-
-
84987646334
-
The enforcement of security policies for computation
-
Jones, A. K., Lipton, R. J., The enforcement of security policies for computation. In: Proc. 5th Symposium on Operating System Principles, Operating Systems Review 9(5) (1975), pp. 197-206.
-
(1975)
Proc. 5th Symposium on Operating System Principles, Operating Systems Review
, vol.9
, Issue.5
, pp. 197-206
-
-
Jones, A.K.1
Lipton, R.J.2
-
282
-
-
0017268870
-
A language extension for controlling access to shared data
-
Jones, A. K., Liskov, B. H., A language extension for controlling access to shared data, IEEE Transactions on Software Engineering 2(4) (1976), pp. 227-285.
-
(1976)
IEEE Transactions on Software Engineering
, vol.2
, Issue.4
, pp. 227-285
-
-
Jones, A.K.1
Liskov, B.H.2
-
283
-
-
0017971337
-
A language extension for expressing constraints on data access
-
Jones, A. K., Liskov, B. H., A language extension for expressing constraints on data access, Communications of the ACM 21(5) (1978), pp. 358-367.
-
(1978)
Communications of the ACM
, vol.21
, Issue.5
, pp. 358-367
-
-
Jones, A.K.1
Liskov, B.H.2
-
284
-
-
84958759310
-
A subjective metric of authentication
-
Springer, Berlin etc.
-
Josang, A., A subjective metric of authentication. In: Proc. 5th European Symposium on Research in Computer Security, ESORICS 1998, Lecture Notes in Computer Science 1485, Springer, Berlin etc., 1998, pp. 329-344.
-
(1998)
Proc. 5th European Symposium on Research in Computer Security, ESORICS 1998, Lecture Notes in Computer Science 1485
, pp. 329-344
-
-
Josang, A.1
-
285
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Josang, A., Ismail, R., Boyd, C., A survey of trust and reputation systems for online service provision, Decision Support Systems 43(2) (2007), pp. 618-644.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
286
-
-
0242456740
-
Dependencies and separation of duty constraints in GTRBAC
-
SACMAT 03, June 2003, Como, Italy
-
Joshi, J. B. D., Bertino, E., Shafiq, B., Ghafoor, A., Dependencies and separation of duty constraints in GTRBAC. In: Proc. 8th ACM Symposium on Access Control Models and Technologies, SACMAT 03, June 2003, Como, Italy, pp. 51-64.
-
Proc. 8th ACM Symposium on Access Control Models and Technologies
, pp. 51-64
-
-
Joshi, J.B.D.1
Bertino, E.2
Shafiq, B.3
Ghafoor, A.4
-
287
-
-
3142623031
-
Clustering intrusion detection alarms to support rot cause analysis
-
Julisch, K., Clustering intrusion detection alarms to support rot cause analysis, ACM Transactions on Information and System Security 6(4) (2003), pp. 443-471.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
288
-
-
84948969398
-
Thirty years later: Lessons from the Multics security evaluation
-
ACSAC 02, IEEE
-
Karger, P. A., Schell, R. R., Thirty years later: Lessons from the Multics security evaluation. In: Proc. 18th Annual Security Applications Conference, ACSAC 02, IEEE, 2002, pp. 119-126.
-
(2002)
Proc. 18th Annual Security Applications Conference
, pp. 119-126
-
-
Karger, P.A.1
Schell, R.R.2
-
290
-
-
0020543282
-
On secret sharing schemes
-
Karnin, E. D., Greene, J. W., Hellman, M. E., On secret sharing schemes, IEEE Transactions on Information Theory 29(1) (1983), pp. 231-241.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.1
, pp. 231-241
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
292
-
-
1642309744
-
Dynamic access control through Petri net workflows
-
ACSAC 00, New Orleans, Dec
-
Knorr, K., Dynamic access control through Petri net workflows. In: Proc. 16th Annual Computer Security Applications Conference, ACSAC 00, New Orleans, Dec. 2000, pp. 159-167.
-
(2000)
Proc. 16th Annual Computer Security Applications Conference
, pp. 159-167
-
-
Knorr, K.1
-
293
-
-
0003657590
-
-
Addison-Wesley, Reading, MA, etc.
-
Knuth, D., The Art of Computer Programming - Volume 2: Seminumerical Algorithms, Addison-Wesley, Reading, MA, etc., 1981.
-
(1981)
The Art of Computer Programming - Volume 2: Seminumerical Algorithms
-
-
Knuth, D.1
-
294
-
-
0030677523
-
Execution monitoring of security-critical programs in a distributed system
-
Ko, C., Ruschitzka, M., Levitt, K., Execution monitoring of security-critical programs in a distributed system. In: Proc. IEEE Symposium on Security and Privacy, 1997, pp. 175-187.
-
(1997)
Proc. IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
295
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N., Elliptic curve cryptosystems, Mathematics of Computation 48(1987), pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
296
-
-
84957011508
-
Decidability of safety in graph-based models for access control
-
ESORICS 2002, Oct. 2002, Lecture Notes in Computer Science 2502, Springer, Berlin etc.
-
Koch, M., Mancini, L. V., Parisi-Presicce, F., Decidability of safety in graph-based models for access control. In: Proc. 7th European Symposium on Research in Computer Security, ESORICS 2002, Oct. 2002, Lecture Notes in Computer Science 2502, Springer, Berlin etc., 2002, pp. 229-243.
-
(2002)
Proc. 7th European Symposium on Research in Computer Security
, pp. 229-243
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
297
-
-
85008430937
-
A graph-based formalism for RBAC
-
Koch, M., Mancini, L. V., Parisi-Presicce, F., A graph-based formalism for RBAC, ACM Transactions on Information and System Security 5(3) (2002), pp. 332-365.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
298
-
-
0002548429
-
The evolution of the Kerberos authentification service
-
Brazier, F., Johansen, D. eds., IEEE Computer Society Press
-
Kohl, J. T., Neuman, B. C., Ts'o, T. Y., The evolution of the Kerberos authentification service. In: Brazier, F., Johansen, D. (eds.), Distributed Open Systems, IEEE Computer Society Press, 1994, pp. 78-94.
-
(1994)
Distributed Open Systems
, pp. 78-94
-
-
Kohl, J.T.1
Neuman, B.C.2
Ts'o, T.Y.3
-
299
-
-
0001902056
-
Three approaches to the concept of "the amount of information" [in Russian]
-
Kolmogorov, A. N., Three approaches to the concept of "the amount of information" [in Russian], Problems of Information Transmission 1(1965), 3-11.
-
(1965)
Problems of Information Transmission
, vol.1
, pp. 3-11
-
-
Kolmogorov, A.N.1
-
300
-
-
0025544134
-
Protection in the BirliX operating system
-
IEEE
-
Kowalski, O. C., Härtig, H., Protection in the BirliX operating system. In: Proc. 10th Int. Conf. on Distributed Computing Systems, IEEE, 1990, pp. 160-166.
-
(1990)
Proc. 10th Int. Conf. on Distributed Computing Systems
, pp. 160-166
-
-
Kowalski, O.C.1
Härtig, H.2
-
301
-
-
33845537069
-
-
Springer, New York
-
Kruegel, C., Valeur, F., Vigna, G., Intrusion Detection and Correlation: Challenges and Solutions, Springer, New York, 2005.
-
(2005)
Intrusion Detection and Correlation: Challenges and Solutions
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
-
302
-
-
33947621658
-
Simulation-based security with inexhaustible interactive Turing machines
-
CSFW-2006, IEEE Computer Society Press
-
Küsters, R., Simulation-based security with inexhaustible interactive Turing machines. In: 19th IEEE Computer Security Foundations Workshop, CSFW-2006, IEEE Computer Society Press, 2006, pp. 309-320.
-
(2006)
19th IEEE Computer Security Foundations Workshop
, pp. 309-320
-
-
Küsters, R.1
-
303
-
-
35548966087
-
On the automatic analysis of recursive security protocols with XOR
-
STACS 2007, Lecture Notes in Computer Science 4393, Springer, Berlin etc.
-
Küsters, R., Truderung, T., On the automatic analysis of recursive security protocols with XOR. In: 24th Annual Symposium on Theoretical Aspects of Computer Science, STACS 2007, Lecture Notes in Computer Science 4393, Springer, Berlin etc., 2007, pp. 646-657.
-
(2007)
24th Annual Symposium on Theoretical Aspects of Computer Science
, pp. 646-657
-
-
Küsters, R.1
Truderung, T.2
-
304
-
-
0003445736
-
-
ETH Series in Information Processing 1, Hartung-Gorre, Konstanz
-
Lai, X., On the Design and Security of Block Ciphers, ETH Series in Information Processing 1, Hartung-Gorre, Konstanz, 1992.
-
(1992)
On the Design and Security of Block Ciphers
-
-
Lai, X.1
-
305
-
-
85011105685
-
A proposal for a new block encryption standard
-
Lecture Notes in Computer Science 473, Springer, Berlin etc.
-
Lai, X., Massey, J. L., A proposal for a new block encryption standard. In: Proc. Advances in Cryptology, EUROCRYPT 90, Lecture Notes in Computer Science 473, Springer, Berlin etc., 1991, pp. 389-404.
-
(1991)
Proc. Advances in Cryptology, EUROCRYPT 90
, pp. 389-404
-
-
Lai, X.1
Massey, J.L.2
-
306
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
Lamport, L., Time, clocks, and the ordering of events in a distributed system, Communications of the ACM 21(7) (1978), pp. 558-565.
-
(1978)
Communications of the ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
307
-
-
84976801533
-
Concurrent reading and writing of clocks
-
Lamport, L., Concurrent reading and writing of clocks, Transactions on Computing Systems 8(4) (1990), pp. 305-310.
-
(1990)
Transactions on Computing Systems
, vol.8
, Issue.4
, pp. 305-310
-
-
Lamport, L.1
-
308
-
-
0015672289
-
A note on the confinement problem
-
Lampson, B., A note on the confinement problem, Communications of the ACM 16(10) (1973), pp. 613-615.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
309
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson, B., Abadi, M., Burrows, M., Wobber, E., Authentication in distributed systems: Theory and practice, ACM Transactions on Computer Systems 10, 4(1992), pp. 265-310.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
310
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
Lane, T., Brodley, C. E., Temporal sequence learning and data reduction for anomaly detection, ACM Transactions on Information and System Security 2(3) (1999), pp. 295-331.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
312
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee, W., Stolfo, S. L., A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information and System Security, 3(4) (2000), pp. 227-261.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.L.2
-
314
-
-
0042496106
-
Randomness and non-determinism
-
Levin, L. A., Randomness and non-determinism, Journal of Symbolic Logic 58(1993), pp. 1102-1103.
-
(1993)
Journal of Symbolic Logic
, vol.58
, pp. 1102-1103
-
-
Levin, L.A.1
-
315
-
-
0037913144
-
-
Addison-Wesley, Boston etc.
-
Lewis, P. M., Bernstein, A., Kifer, M., Database and Transaction Processing: An Application-Oriented Approach, Addison-Wesley, Boston etc., 2002.
-
(2002)
Database and Transaction Processing: An Application-Oriented Approach
-
-
Lewis, P.M.1
Bernstein, A.2
Kifer, M.3
-
316
-
-
0036085965
-
Design of a role-based trust-management framework
-
Li, N., Mitchell, J. C., Winsborough, W. H., Design of a role-based trust-management framework. In: Proc. IEEE Symposium on Security and Privacy, 2002, pp. 114-130.
-
(2002)
Proc. IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
317
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Li, N., Winsborough, W. H., Mitchell, J. C., Distributed credential chain discovery in trust management, Journal of Computer Security 11(2003), pp. 35-86.
-
(2003)
Journal of Computer Security
, vol.11
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
318
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Li, N., Grosof, B. N., Feigenbaum, J., Delegation logic: A logic-based approach to distributed authorization, ACM Transactions on Information and System Security 6(1) (2003), pp. 128-171.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
319
-
-
33646242539
-
Understanding SPKI/SDSI using first-order logic
-
Li, N., Mitchell, J. C., Understanding SPKI/SDSI using first-order logic, International Journal of Information Security 5(2006), pp. 48-64.
-
(2006)
International Journal of Information Security
, vol.5
, pp. 48-64
-
-
Li, N.1
Mitchell, J.C.2
-
321
-
-
0004127220
-
-
2nd edition, Cambridge University Press, Cambridge
-
Lidl, R., Niederreiter, H., Finite Fields, 2nd edition, Cambridge University Press, Cambridge, 1997.
-
(1997)
Finite Fields
-
-
Lidl, R.1
Niederreiter, H.2
-
322
-
-
0028755016
-
On the validity of the Bell-LaPadula model
-
Lindgreen, E. R., Herschberg, I. S., On the validity of the Bell-LaPadula model, Computers & Security 13(1994), pp. 317-333.
-
(1994)
Computers & Security
, vol.13
, pp. 317-333
-
-
Lindgreen, E.R.1
Herschberg, I.S.2
-
323
-
-
0032630098
-
Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
-
Lindquist, U., Porras, P. A., Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In: Proc. IEEE Symposium on Security and Privacy, 1999, pp. 146-161.
-
(1999)
Proc. IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindquist, U.1
Porras, P.A.2
-
324
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
Lipton, R. J., Snyder, L., A linear time algorithm for deciding subject security, Journal of the ACM 24(3) (1977), pp. 455-464.
-
(1977)
Journal of the ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
325
-
-
26844560119
-
On classes of protection systems
-
DeMillo, R. A., et al., eds., Academic Press, New York
-
Lipton, R. J., Budd, T. A., On classes of protection systems. In: DeMillo, R. A., et al., (eds.), Foundations of Secure Computation, Academic Press, New York, 1978, pp. 281-298.
-
(1978)
Foundations of Secure Computation
, pp. 281-298
-
-
Lipton, R.J.1
Budd, T.A.2
-
326
-
-
0242571490
-
Role-based security in data base management systems
-
Landwehr, C. E., ed., Elsevier Science North Holland, Amsterdam etc.
-
Lochovsky, F. H., Woo, C. C., Role-based security in data base management systems. In: Landwehr, C. E., (ed.), Database Security: Status and Prospects, Elsevier Science (North Holland), Amsterdam etc., 1988, pp. 173-185.
-
(1988)
Database Security: Status and Prospects
, pp. 173-185
-
-
Lochovsky, F.H.1
Woo, C.C.2
-
327
-
-
0020207596
-
Unidirectional transport of rights and take-grant control
-
Lockmann, A., Minsky, N., Unidirectional transport of rights and take-grant control, IEEE Transactions on Software Engineering SE-8 (6) (1982), pp. 597-604.
-
(1982)
IEEE Transactions on Software Engineering
, vol.SE-8
, Issue.6
, pp. 597-604
-
-
Lockmann, A.1
Minsky, N.2
-
328
-
-
0034300797
-
Anomaly-based intrusion detection: Privacy concerns and other problems
-
Lundin, E., Jonsson, E., Anomaly-based intrusion detection: Privacy concerns and other problems, Computer Networks 34(4) (2000), pp. 623-640.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 623-640
-
-
Lundin, E.1
Jonsson, E.2
-
329
-
-
0025442003
-
The SeaView security model
-
Lunt, T. F., Denning, D. E., Schell, R. R., Heckman, M., Shockley, W. R., The SeaView security model, IEEE Transactions on Software Engineering 16(6) (1990), pp. 593-607.
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
330
-
-
0034836335
-
Preserving information flow properties under refinement
-
Oakland
-
Mantel, H., Preserving information flow properties under refinement. In: Proc. IEEE Symposium on Security and Privacy, 2001, Oakland, pp. 78-91.
-
(2001)
Proc. IEEE Symposium on Security and Privacy
, pp. 78-91
-
-
Mantel, H.1
-
334
-
-
18344371384
-
The definition of randomness
-
Martin-Löf, P., The definition of randomness, Information and Control 9(1966), pp. 602-619.
-
(1966)
Information and Control
, vol.9
, pp. 602-619
-
-
Martin-Löf, P.1
-
335
-
-
85117416545
-
Timestamps: Main issues on their use and implementation
-
WETICE 99, IEEE
-
Massias, H., Serret Avila, X., Quisquater, J.-J., Timestamps: Main issues on their use and implementation. In: 8th Workshop on Enabling Technologies: Infrastructure for Collaboration, WETICE 99, IEEE, 1999, pp. 178-183.
-
(1999)
8th Workshop on Enabling Technologies: Infrastructure for Collaboration
, pp. 178-183
-
-
Massias, H.1
Avila, S.X.2
Quisquater, J.-J.3
-
336
-
-
84947294004
-
Modelling a public-key infrastructure
-
ESORICS 96, Lecture Notes in Computer Science 1146, Springer, Berlin etc.
-
Maurer, U., Modelling a public-key infrastructure. In: Proc. 4th European Symposium on Research in Computer Security, ESORICS 96, Lecture Notes in Computer Science 1146, Springer, Berlin etc., 1996, pp. 325-350.
-
(1996)
Proc. 4th European Symposium on Research in Computer Security
, pp. 325-350
-
-
Maurer, U.1
-
337
-
-
0023829319
-
Noninterference and the compositionality of security properties
-
McCullough, D., Noninterference and the compositionality of security properties. In: Proc. IEEE Symposium on Security and Privacy, 1988, pp. 177-186.
-
(1988)
Proc. IEEE Symposium on Security and Privacy
, pp. 177-186
-
-
McCullough, D.1
-
339
-
-
0003416497
-
-
Wiley, New York etc.
-
McGraw, G., Felton, E. W., Securing Java: Getting Down to Business with Mobile Code, Wiley, New York etc., 1999.
-
(1999)
Securing Java: Getting Down to Business with Mobile Code
-
-
McGraw, G.1
Felton, E.W.2
-
340
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluation as performed by Lincoln Laboratory
-
McHugh, J., Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluation as performed by Lincoln Laboratory, ACM Transactions on Information and System Security 3(4) (2000), pp. 262-294.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
341
-
-
0003972113
-
-
Addison-Wesley, Reading, MA, etc.
-
McKusick, M. K., Bostic, K., Karels, M. J., Quarterman, J. S., The Design and Implementation of the 4.4BSD Operating System, Addison-Wesley, Reading, MA, etc., 1996.
-
(1996)
The Design and Implementation of the 4.4BSD Operating System
-
-
McKusick, M.K.1
Bostic, K.2
Karels, M.J.3
Quarterman, J.S.4
-
342
-
-
0022012611
-
A comment on the "Basic Security Theorem" of Bell and LaPa-dula
-
McLean, J., A comment on the "Basic Security Theorem" of Bell and LaPa-dula, Information Processing Letters 20(1985), pp. 67-70.
-
(1985)
Information Processing Letters
, vol.20
, pp. 67-70
-
-
McLean, J.1
-
344
-
-
84974747891
-
Proving noninterference and functional correctness using traces
-
McLean, J., Proving noninterference and functional correctness using traces, Journal of Computer Security 1(1) (1992), pp. 37-57.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 37-57
-
-
McLean, J.1
-
345
-
-
0002426876
-
A general theory of composition for a class of "possibilistic" security properties
-
McLean, J., A general theory of composition for a class of "possibilistic" security properties, IEEE Transactions on Software Engineering 22(1) (1996), pp. 53-67.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-67
-
-
McLean, J.1
-
346
-
-
1442335809
-
Ordering from Satan's menu: A survey of requirements specification for formal analysis of cryptographic protocols
-
Meadows, C., Ordering from Satan's menu: A survey of requirements specification for formal analysis of cryptographic protocols, Science of Computer Programming 50(2004), pp. 3-22.
-
(2004)
Science of Computer Programming
, vol.50
, pp. 3-22
-
-
Meadows, C.1
-
347
-
-
84944878354
-
-
CRC Press, Boca Raton etc.
-
Menezes, A. J., van Oorschot, P. C., Vanstone, S. A., Handbook of Applied Cryptography, CRC Press, Boca Raton etc., 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
348
-
-
85028772160
-
On the security of the IDEA block cipher
-
Eurocrypt 93, Lecture Notes in Computer Science 765, Springer, Berlin etc.
-
Meier, W., On the security of the IDEA block cipher. In: Proc. Advances in Cryptology, Eurocrypt 93, Lecture Notes in Computer Science 765, Springer, Berlin etc., 1994, pp. 371-385.
-
(1994)
Proc. Advances in Cryptology
, pp. 371-385
-
-
Meier, W.1
-
350
-
-
0025545583
-
A fast software one-way hash function
-
Merkle, R. C., A fast software one-way hash function, Journal of Cryptology 3(1990), pp. 43-58.
-
(1990)
Journal of Cryptology
, vol.3
, pp. 43-58
-
-
Merkle, R.C.1
-
351
-
-
84882800335
-
Simple state-based approaches to program-based anomaly detection
-
Michael, C., Ghosh, A., Simple state-based approaches to program-based anomaly detection, ACM Transactions on Information and System Security 5(3) (2002), pp. 203-237.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
, pp. 203-237
-
-
Michael, C.1
Ghosh, A.2
-
352
-
-
0016951438
-
Security kernel validation in practice
-
Millen, J. K., Security kernel validation in practice, Communications of the ACM 19(5) (1976), pp. 243-250.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 243-250
-
-
Millen, J.K.1
-
353
-
-
0003700417
-
Section E.2.1: Kerberos authentification and authorization system
-
Technical Report, Cambridge, MA
-
Miller, S. P., Neuman, B. C., Schiller, J. I., Saltzer, J. H., Section E.2.1: Kerberos authentification and authorization system, M. I. T. Project Athena, Technical Report, Cambridge, MA, 1987.
-
(1987)
M. I. T. Project Athena
-
-
Miller, S.P.1
Neuman, B.C.2
Schiller, J.I.3
Saltzer, J.H.4
-
354
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Springer, Berlin etc.
-
Miller, V. S., Uses of elliptic curves in cryptography. In: Proc. Crypto 85, Lecture Notes in Computer Science 218, Springer, Berlin etc., 1986, pp. 417-426.
-
(1986)
Proc. Crypto 85, Lecture Notes in Computer Science 218
, pp. 417-426
-
-
Miller, V.S.1
-
355
-
-
0029326301
-
Improved algorithms for synchronizing computer network clocks
-
Mills, D., Improved algorithms for synchronizing computer network clocks, IEEE/ACM Transactions on Networks 3(1995), pp. 245-254.
-
(1995)
IEEE/ACM Transactions on Networks
, vol.3
, pp. 245-254
-
-
Mills, D.1
-
356
-
-
15944401468
-
An operation-control scheme for authorization in computer systems
-
Minsky, N., An operation-control scheme for authorization in computer systems, International Journal of Computer and Information Sciences 7(2) (1978), pp. 157-191.
-
(1978)
International Journal of Computer and Information Sciences
, vol.7
, Issue.2
, pp. 157-191
-
-
Minsky, N.1
-
357
-
-
0000788149
-
Law-governed interaction: A coordination and control mechanism for heterogeneous distributed systems
-
Minsky, N., Ungureanu, V., Law-governed interaction: A coordination and control mechanism for heterogeneous distributed systems, ACM Transactions on Software Engineering and Methodology 9(3) (2000), pp. 273-305.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.3
, pp. 273-305
-
-
Minsky, N.1
Ungureanu, V.2
-
359
-
-
0002535673
-
Distributed audit trail analysis
-
Mounji, A., Charlier, B. L., Zampunieris, D., Habra, N., Distributed audit trail analysis. In: Proc. ISOC 95 Symposium on Network and Distributed System Security, 1995, pp. 102-112.
-
(1995)
Proc. ISOC 95 Symposium on Network and Distributed System Security
, pp. 102-112
-
-
Mounji, A.1
Charlier, B.L.2
Zampunieris, D.3
Habra, N.4
-
360
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
Myers, A. C., Liskov, B., Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology 9(4) (2000), pp. 410-442.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
361
-
-
0001448484
-
Bit commitment using pseudorandomness
-
Naor, M., Bit commitment using pseudorandomness, Journal of Cryptology 4(2) (1991), pp. 151-158.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 151-158
-
-
Naor, M.1
-
362
-
-
0141544069
-
Zero-knowledge arguments for NP can be based on general assumptions
-
Naor, M., Ostrovsky, R., Venkatesan, R., Yung, M., Zero-knowledge arguments for NP can be based on general assumptions, Journal of Cryptology 11(1998), pp. 87-108.
-
(1998)
Journal of Cryptology
, vol.11
, pp. 87-108
-
-
Naor, M.1
Ostrovsky, R.2
Venkatesan, R.3
Yung, M.4
-
363
-
-
51749088711
-
-
National Bureau of Standards, NBS FIPS PUB 46
-
National Bureau of Standards, Data Encryption Standard, NBS FIPS PUB 46, 1980.
-
(1980)
Data Encryption Standard
-
-
-
364
-
-
84891425189
-
-
National Bureau of Standards, NBS FIPS PUB 81
-
National Bureau of Standards, DES Modes of Operation, NBS FIPS PUB 81, 1977.
-
(1977)
DES Modes of Operation
-
-
-
365
-
-
0003508558
-
-
National Institute of Standards and Technology, U. S. Department of Commerce, NIST Federal Information Processing Standards Publication 197
-
National Institute of Standards and Technology, U. S. Department of Commerce, Advanced Encryption Standard, NIST Federal Information Processing Standards Publication 197, 2001.
-
(2001)
Advanced Encryption Standard
-
-
-
366
-
-
0003629990
-
-
National Institute of Standards and Technology, U. S. Department of Commerce, NIST Federal Information Processing Standards Publication 180-2
-
National Institute of Standards and Technology, U. S. Department of Commerce, Secure Hash Standard, NIST Federal Information Processing Standards Publication 180-2, 2002.
-
(2002)
Secure Hash Standard
-
-
-
367
-
-
0003508562
-
-
National Institute of Standards and Technology, U. S. Department of Commerce, NIST Federal Information Processing Standards Publication 186-2
-
National Institute of Standards and Technology, U. S. Department of Commerce, Digital Signature Standard, NIST Federal Information Processing Standards Publication 186-2, 2000.
-
(2000)
Digital Signature Standard
-
-
-
368
-
-
0013413537
-
-
2nd edition, Springer, New York etc.
-
Nerode, A., Shore, R. A., Logic for Applications, 2nd edition, Springer, New York etc., 1997.
-
(1997)
Logic for Applications
-
-
Nerode, A.1
Shore, R.A.2
-
369
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Neuman, B., Ts'o, T., Kerberos: An authentication service for computer networks, IEEE Communications 32(9) (1994), pp. 33-38.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Ts'o, T.2
-
370
-
-
0004131498
-
-
Addison-Wesley, Reading, MA, etc.
-
Neumann, P. G., Computer Related Risks, Addison-Wesley, Reading, MA, etc., 1995.
-
(1995)
Computer Related Risks
-
-
Neumann, P.G.1
-
372
-
-
10444243686
-
Learning attack strategies from intrusion alerts
-
CCS 03, ACM
-
Ning, P., Xu, D., Learning attack strategies from intrusion alerts. In: Proc. 10th ACM Conference on Computer and Communications Security, CCS 03, ACM, 2003, pp. 200-209.
-
(2003)
Proc. 10th ACM Conference on Computer and Communications Security
, pp. 200-209
-
-
Ning, P.1
Xu, D.2
-
373
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
Ning, P., Cui, Y., Reeves, D. S., Xu, D., Techniques and tools for analyzing intrusion alerts, ACM Transactions on Information and System Security 7(2) (2004), pp. 274-318.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
374
-
-
33746585508
-
-
Kluwer, Boston etc.
-
Ning, P., Jajodia, S., Wang, X. S., Intrusion Detection in Distributed Systems: An Abstraction-Based Approach, Kluwer, Boston etc., 2004.
-
(2004)
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach
-
-
Ning, P.1
Jajodia, S.2
Wang, X.S.3
-
375
-
-
0004282942
-
-
9th edition, Oldenbourg, Munich/Vienna
-
Oberschelp, W., Vossen, G., Rechneraufbau und Rechnerstrukturen, 9th edition, Oldenbourg, Munich/Vienna, 2003.
-
(2003)
Rechneraufbau und Rechnerstrukturen
-
-
Oberschelp, W.1
Vossen, G.2
-
377
-
-
0028398878
-
A taxonomy for secure object-oriented databases
-
Olivier, M., von Solms, S. H., A taxonomy for secure object-oriented databases, ACM Transactions on Database Systems 19(1) (1994), pp. 3-46.
-
(1994)
ACM Transactions on Database Systems
, vol.19
, Issue.1
, pp. 3-46
-
-
Olivier, M.1
Von Solms, S.H.2
-
378
-
-
0347229437
-
-
OMG Object Management Group, OMG Document orbos/96-06-20, July
-
OMG (Object Management Group), Common Secure Interoperability, OMG Document orbos/96-06-20, July 1996.
-
(1996)
Common Secure Interoperability
-
-
-
379
-
-
84891397250
-
-
OMG Object Management Group, OMG Documents 96-08-03 through 96-08-06, July
-
OMG (Object Management Group), CORBA Security, OMG Documents 96-08-03 through 96-08-06, July 1996.
-
(1996)
CORBA Security
-
-
-
380
-
-
84891408732
-
-
Oracle Corporation, Release 2 9.2, March
-
Oracle Corporation, Oracle 9i - SQL Reference, Release 2 (9.2), March 2002.
-
(2002)
Oracle 9i - SQL Reference
-
-
-
381
-
-
0003925208
-
-
MIT Press, Cambridge, MA, etc.
-
Organick, E. I., The Multics System: An Examination of its Structure, MIT Press, Cambridge, MA, etc., 1972.
-
(1972)
The Multics System: An Examination of its Structure
-
-
Organick, E.I.1
-
382
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Osborne, S., Sandhu, R., Munawar, Q., Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security 3(2) (2000), pp. 85-106.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborne, S.1
Sandhu, R.2
Munawar, Q.3
-
383
-
-
84994391858
-
Role-based access control on the Web
-
Park, J. S., Sandhu, R., Gail, J. A., Role-based access control on the Web, ACM Transactions on Information and System Security 4(1) (2001), pp. 37-71.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.1
, pp. 37-71
-
-
Park, J.S.1
Sandhu, R.2
Gail, J.A.3
-
384
-
-
84891463718
-
Restating the foundation of information security
-
Singapore
-
Parker, D. B., Restating the foundation of information security. In: Proc. IFIP/SEC 92, Singapore, pp. 159-171.
-
Proc. IFIP/SEC 92
, pp. 159-171
-
-
Parker, D.B.1
-
385
-
-
0003719406
-
-
3rd edition, Morgan Kaufmann, San Francisco
-
Patterson, D. A., Hennessy, J. L., Computer Organization and Design: The Hardware/Software Interface, 3rd edition, Morgan Kaufmann, San Francisco, 2004.
-
(2004)
Computer Organization and Design: The Hardware/Software Interface
-
-
Patterson, D.A.1
Hennessy, J.L.2
-
386
-
-
1142270162
-
-
Prentice-Hall, Upper Saddle River etc.
-
Pearson, S. (ed.), Balacheff, B., Chen, L., Plaquin, D., Proudler, G., Trusted Computing Platforms: TCPA Technology in Context, Prentice-Hall, Upper Saddle River etc., 2003.
-
(2003)
Trusted Computing Platforms: TCPA Technology in Context
-
-
Pearson, S.1
Balacheff, B.2
Chen, L.3
Plaquin, D.4
Proudler, G.5
-
387
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Springer, Berlin etc.
-
Pedersen, T. P., Non-interactive and information-theoretic secure verifiable secret sharing. In: Proc. Crypto 91, Lecture Notes in Computer Science 576, Springer, Berlin etc., 1992, pp. 129-140.
-
(1992)
Proc. Crypto 91, Lecture Notes in Computer Science 576
, pp. 129-140
-
-
Pedersen, T.P.1
-
388
-
-
0008284565
-
Fail-stop signatures
-
Pedersen, T. P., Pfitzmann, B., Fail-stop signatures, SIAM Journal on Computing 26(2) (1997), pp. 291-330.
-
(1997)
SIAM Journal on Computing
, vol.26
, Issue.2
, pp. 291-330
-
-
Pedersen, T.P.1
Pfitzmann, B.2
-
390
-
-
0031078841
-
Trusting mobile user devices and security modules
-
Pfitzmann, A., Pfitzmann, B., Schunter, M., Waidner, M., Trusting mobile user devices and security modules, IEEE Computer 30(2) (1997), pp. 61-68.
-
(1997)
IEEE Computer
, vol.30
, Issue.2
, pp. 61-68
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Schunter, M.3
Waidner, M.4
-
391
-
-
33745883087
-
-
Pfitzmann, A., Hansen, M., Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology, http://dud.inf.tu-dresden. de/Anon-Terminology.shtml.
-
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
393
-
-
84957647748
-
Coin-based anonymous fingerprinting
-
Springer, Berlin etc.
-
Pfitzmann, B., Sadeghi, A.-R., Coin-based anonymous fingerprinting. In: Proc. Eurocrypt 99, Lecture Notes in Computer Science 1592, Springer, Berlin etc., 1999, pp. 150-164.
-
(1999)
Proc. Eurocrypt 99, Lecture Notes in Computer Science 1592
, pp. 150-164
-
-
Pfitzmann, B.1
Sadeghi, A.-R.2
-
394
-
-
0004198635
-
-
2nd edition, Prentice-Hall, Englewood Cliffs etc.
-
Pfleeger, C. P., Security in Computing, 2nd edition, Prentice-Hall, Englewood Cliffs etc., 1997.
-
(1997)
Security in Computing
-
-
Pfleeger, C.P.1
-
395
-
-
26044478785
-
-
Springer, Berlin etc.
-
Pieprzyk, J., Hardjono, T., Seberry, J., Fundamentals of Computer Security, Springer, Berlin etc., 2003.
-
(2003)
Fundamentals of Computer Security
-
-
Pieprzyk, J.1
Hardjono, T.2
Seberry, J.3
-
397
-
-
0018019384
-
A model for verification of data security in operating systems
-
Popek, G. J., Farber, D. A., A model for verification of data security in operating systems, Communications of the ACM 21(9) (1978), pp. 737-749.
-
(1978)
Communications of the ACM
, vol.21
, Issue.9
, pp. 737-749
-
-
Popek, G.J.1
Farber, D.A.2
-
398
-
-
27844549441
-
A systematic approach to static access control
-
Pottier, F., Skalka, C., Smith, S., A systematic approach to static access control, ACM Transactions on Programming Languages and Systems 27(2) (2005), pp. 344-382.
-
(2005)
ACM Transactions on Programming Languages and Systems
, vol.27
, Issue.2
, pp. 344-382
-
-
Pottier, F.1
Skalka, C.2
Smith, S.3
-
399
-
-
0032665874
-
On the security of iterated message authentication codes
-
Preneel, B., van Oorschot, P. C., On the security of iterated message authentication codes, IEEE Transactions on Information Theory 45(1) (1999), pp. 188-199.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.1
, pp. 188-199
-
-
Preneel, B.1
Van Oorschot, P.C.2
-
402
-
-
0025498829
-
Fault-tolerant clock synchronization in distributed systems
-
Ramanathan, P., Shin, K., Butler, R., Fault-tolerant clock synchronization in distributed systems, IEEE Computer 23(10) (1990), pp. 33-42.
-
(1990)
IEEE Computer
, vol.23
, Issue.10
, pp. 33-42
-
-
Ramanathan, P.1
Shin, K.2
Butler, R.3
-
404
-
-
0032307222
-
A semantic-based transaction processing model for multilevel transactions
-
Ray, I., Ammann, P., Jajodia, S., A semantic-based transaction processing model for multilevel transactions, Journal of Computer Security 6(1998), pp. 181-217.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 181-217
-
-
Ray, I.1
Ammann, P.2
Jajodia, S.3
-
405
-
-
35048832496
-
A vector model of trust for developing trustworthy systems
-
ESORICS 04, Lecture Notes in Computer Science 3193, Springer, Berlin etc.
-
Ray, I., Chakraborty, S., A vector model of trust for developing trustworthy systems. In: Proc. 9th European Symposium on Research in Computer Security, ESORICS 04, Lecture Notes in Computer Science 3193, Springer, Berlin etc., 2004, pp. 260-275.
-
(2004)
Proc. 9th European Symposium on Research in Computer Security
, pp. 260-275
-
-
Ray, I.1
Chakraborty, S.2
-
406
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
Reiter, M. K., Rubin, A. D., Crowds: Anonymity for web transactions, ACM Transactions on Information and System Security 1(1) (1998), pp. 66-92.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
407
-
-
0016082170
-
The UNIX time-sharing system
-
Ritchie, D. M., Thompson, K., The UNIX time-sharing system, Communications of the ACM 7(7) (1974), pp. 365-375.
-
(1974)
Communications of the ACM
, vol.7
, Issue.7
, pp. 365-375
-
-
Ritchie, D.M.1
Thompson, K.2
-
408
-
-
84981254509
-
The evolution of the UNIX time-sharing system
-
Springer, Berlin etc.
-
Ritchie, D. M., The Evolution of the UNIX Time-Sharing System. In: Proc. Symposium on Language Design and Programming Methodology, Lecture Notes in Computer Science 79, Springer, Berlin etc., 1979, pp. 25-36.
-
(1979)
Proc. Symposium on Language Design and Programming Methodology, Lecture Notes in Computer Science 79
, pp. 25-36
-
-
Ritchie, D.M.1
-
409
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R. L., Shamir, A., Adleman, L. M., A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM 21(2) (1978), pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
410
-
-
78650922644
-
The MD4 message digest algorithm
-
Springer, Berlin etc.
-
Rivest, R. L., The MD4 message digest algorithm. In: Proc. Crypto 90, Lecture Notes in Computer Science 537, Springer, Berlin etc., 1990, pp. 303-311.
-
(1990)
Proc. Crypto 90, Lecture Notes in Computer Science 537
, pp. 303-311
-
-
Rivest, R.L.1
-
412
-
-
0003753345
-
-
Elsevier Science, Amsterdam; MIT Press, Cambridge
-
Robinson, A., Voronkov, A. (eds.), Handbook of Automated Reasoning, Volume I + II, Elsevier Science, Amsterdam; MIT Press, Cambridge, 2001.
-
(2001)
Handbook of Automated Reasoning
, vol.1-2
-
-
Robinson, A.1
Voronkov, A.2
-
415
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
SRI International
-
Rushby, J. Noninterference, transitivity, and channel-control security policies, Technical Report CSL-92-02, SRI International, 1992.
-
(1992)
Technical Report CSL-92-02
-
-
Rushby, J.1
-
416
-
-
84949243805
-
Mathematical models of computer security
-
Focardi, R., Gorrieri, R. eds., Springer, Berlin etc.
-
Ryan, P., Mathematical models of computer security. In: Focardi, R., Gorrieri, R. (eds.), Foundations of Security Analysis and Design, Lecture Notes in Computer Science 2171, Springer, Berlin etc., 2001, pp. 1-62.
-
(2001)
Foundations of Security Analysis and Design, Lecture Notes in Computer Science 2171
, pp. 1-62
-
-
Ryan, P.1
-
417
-
-
85084162270
-
Design and implementation of a TCG-based measurement architecture
-
San Diego, The USENIX Association
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L., Design and implementation of a TCG-based measurement architecture. In: Proc. 13th USENIX Security Symposium, San Diego, The USENIX Association, 2004, pp. 223-238.
-
(2004)
Proc. 13th USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
418
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
CCS 04, ACM Press, New York
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L., Attestation-based policy enforcement for remote access. In: Proc. 11th ACM Computer and Communications Security Conference, CCS 04, ACM Press, New York, 2004, pp. 308-317.
-
(2004)
Proc. 11th ACM Computer and Communications Security Conference
, pp. 308-317
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
420
-
-
0016081584
-
Protection and the control of information sharing in Multics
-
Saltzer, J. H., Protection and the control of information sharing in Multics, Communications of the ACM 17(7) (1974), pp. 388-402.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.H.1
-
421
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J. H., Schroeder, M. D., The protection of information in computer systems, Proceedings of the IEEE 63(9) (1975), pp. 1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
422
-
-
84976845043
-
End-to-end arguments in system design
-
Saltzer, J. H., Reed, D. P., Clark, D. D., End-to-end arguments in system design, ACM Transactions on Computer Systems 2(4) (1984), pp. 277-288.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
423
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
Focardi, R., Gorrieri, R. eds., Springer, Berlin etc
-
Samarati, P., De Capitani di Vimercati, S., Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.), Foundations of Security Analysis and Design, Lecture Notes in Computer Science 2171, Springer, Berlin etc, 2001, pp. 137-196.
-
(2001)
Foundations of Security Analysis and Design, Lecture Notes in Computer Science 2171
, pp. 137-196
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
424
-
-
0023999796
-
The schematic protection model: Its definition and analysis for acyclic attenuating schemes
-
Sandhu, R. S., The schematic protection model: Its definition and analysis for acyclic attenuating schemes, Journal of the ACM 35(2) (1988), pp. 404-432.
-
(1988)
Journal of the ACM
, vol.35
, Issue.2
, pp. 404-432
-
-
Sandhu, R.S.1
-
425
-
-
0024738591
-
The demand operation in the schematic protection model
-
Sandhu, R. S., The demand operation in the schematic protection model, Information Processing Letters 32(1989), pp. 213-219.
-
(1989)
Information Processing Letters
, vol.32
, pp. 213-219
-
-
Sandhu, R.S.1
-
427
-
-
85029488605
-
Polyinstantiation for cover stories
-
Springer, Berlin etc.
-
Sandhu, R. S., Jajodia, S., Polyinstantiation for cover stories. In: Proc. 2nd European Symposium on Research in Computer Security, ESORICS 92, Lecture Notes in Computer Science 648, Springer, Berlin etc., 1992, pp. 307-328.
-
(1992)
Proc. 2nd European Symposium on Research in Computer Security, ESORICS 92, Lecture Notes in Computer Science 648
, pp. 307-328
-
-
Sandhu, R.S.1
Jajodia, S.2
-
428
-
-
0027699087
-
Lattice-based access control
-
Sandhu, R. S., Lattice-based access control, IEEE Computer 26(11) (1993), pp. 9-19.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
429
-
-
0028513932
-
Access control: Principles and practice
-
Sept.
-
Sandhu, R. S., Samarati, P., Access control: Principles and practice, IEEE Communications Magazine, Sept. 1994, pp. 40-48.
-
(1994)
IEEE Communications Magazine
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
431
-
-
0030086382
-
Role-based access control models
-
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., Youman, C. E., Role-based access control models, IEEE Computer 29(2) (1996), pp. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
432
-
-
0033312487
-
Role-based administration of user-role assignment: The URA97 model and its Oracle implementation
-
Sandhu, R. S., Bhamidipati, V., Role-based administration of user-role assignment: The URA97 model and its Oracle implementation, Journal of Computer Security 7(4) (1999), pp. 317-342.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.4
, pp. 317-342
-
-
Sandhu, R.S.1
Bhamidipati, V.2
-
433
-
-
33750235645
-
A formal framework for confidentiality-preserving refinement
-
Springer, Berlin etc.
-
Santen, T., A formal framework for confidentiality-preserving refinement. In: Proc. 11th European Symposium on Research in Computer Security, ESORICS 06, Lecture Notes in Computer Science 4189, Springer, Berlin etc., 2006, pp. 225-242.
-
(2006)
Proc. 11th European Symposium on Research in Computer Security, ESORICS 06, Lecture Notes in Computer Science 4189
, pp. 225-242
-
-
Santen, T.1
-
434
-
-
0038967795
-
Role-based access control and the access control matrix
-
Saunders, G., Hitchens, M., Varadharajan, V., Role-based access control and the access control matrix, Operating Systems Review 35(4) (2001), pp. 6-20.
-
(2001)
Operating Systems Review
, vol.35
, Issue.4
, pp. 6-20
-
-
Saunders, G.1
Hitchens, M.2
Varadharajan, V.3
-
435
-
-
84891402537
-
A uniform approach to the definition of randomness
-
Schnorr, C. P., A uniform approach to the definition of randomness, Mathematical System Theory 5(1971), pp. 9-28.
-
(1971)
Mathematical System Theory
, vol.5
, pp. 9-28
-
-
Schnorr, C.P.1
-
439
-
-
0038825675
-
Task-role-based access control model
-
Sejong, O., Seog, P., Task-role-based access control model, Information Systems 28(6) (2003), pp. 533-562.
-
(2003)
Information Systems
, vol.28
, Issue.6
, pp. 533-562
-
-
Sejong, O.1
Seog, P.2
-
440
-
-
84891436134
-
-
2nd edition, Addison-Wesley, Reading, MA, etc.
-
Sehti, R., Programming Languages: Concepts and Constructs, 2nd edition, Addison-Wesley, Reading, MA, etc., 1996.
-
(1996)
Programming Languages: Concepts and Constructs
-
-
Sehti, R.1
-
441
-
-
35248841429
-
From a trickle to a flood: Active attacks on several mix types
-
Springer, Berlin etc.
-
Serjantov, A., Dingledine, R., Syverson, P. F., From a trickle to a flood: Active attacks on several mix types. In: Proc. 5th International Workshop on Information Hiding, 2002, Lecture Notes in Computer Science 2578, Springer, Berlin etc., 2003, pp. 36-52.
-
(2003)
Proc. 5th International Workshop on Information Hiding, 2002, Lecture Notes in Computer Science 2578
, pp. 36-52
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.F.3
-
442
-
-
0018545449
-
How to share a secret
-
Shamir, A., How to share a secret, Communications of the ACM 22(1979), pp. 612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
443
-
-
84856043672
-
A mathematical theory of communications
-
623-656
-
Shannon, C. E., A mathematical theory of communications, Bell System Technical Journal 27(1948), pp. 379-423, 623-656.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
444
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C. E., Communication theory of secrecy systems, Bell System Technical Journal 28(4) (1949), pp. 656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
445
-
-
0020718929
-
Answering queries without revealing secrets
-
Sicherman, G. L., de Jonge, W., van de Riet, R. P., Answering queries without revealing secrets, ACM Transactions on Database Systems 8(1) (1983), pp. 41-59.
-
(1983)
ACM Transactions on Database Systems
, vol.8
, Issue.1
, pp. 41-59
-
-
Sicherman, G.L.1
Jonge, W.2
Van De Riet, R.P.3
-
446
-
-
2642573551
-
A compositional framework for access control policies enforcement
-
Oct. 30, Washington, DC
-
Siewe, F., Cau, A., Zedan, H., A compositional framework for access control policies enforcement. In: FMSE 03, Oct. 30, Washington, DC, pp. 32-42.
-
FMSE 03
, pp. 32-42
-
-
Siewe, F.1
Cau, A.2
Zedan, H.3
-
447
-
-
0004233425
-
-
6th edition, Addison-Wesley, Reading, MA, etc.
-
Silberschatz, A., Galvin, P. B., Gagne, G., Operating System Concepts, 6th edition, Addison-Wesley, Reading, MA, etc., 2001.
-
(2001)
Operating System Concepts
-
-
Silberschatz, A.1
Galvin, P.B.2
Gagne, G.3
-
448
-
-
84983269168
-
Authentication theory/coding theory
-
Springer, Berlin etc.
-
Simmons, G. J., Authentication theory/coding theory. In: Advances in Cryptology, Crypto 84, Lecture Notes in Computer Science 196, Springer, Berlin etc., 1985, pp. 411-432.
-
(1985)
Advances in Cryptology, Crypto 84, Lecture Notes in Computer Science 196
, pp. 411-432
-
-
Simmons, G.J.1
-
449
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their applications
-
Simmons, G. J. ed., IEEE Press, New York
-
Simmons, G. J., An introduction to shared secret and/or shared control schemes and their applications. In: Simmons, G. J. (ed.), Contemporary Cryptology: The Science of Information Integrity, IEEE Press, New York, 1992, pp. 441-497.
-
(1992)
Contemporary Cryptology: The Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
450
-
-
0003038453
-
A survey on information authentication
-
Simmons, G. J. ed., IEEE Press, New York
-
Simmons, G. J., A survey on information authentication. In: Simmons, G. J. (ed.), Contemporary Cryptology: The Science of Information Integrity, IEEE Press, New York, 1992, pp. 379-419.
-
(1992)
Contemporary Cryptology: The Science of Information Integrity
, pp. 379-419
-
-
Simmons, G.J.1
-
451
-
-
79951987555
-
The data encryption standard: Past and future
-
Simmons, G. J. ed., IEEE Press, New York
-
Smid, M. E., Branstad, D. K., The Data Encryption Standard: Past and future. In: Simmons, G. J. (ed.), Contemporary Cryptology: The Science of Information Integrity, IEEE Press, New York, 1992, pp. 43-64.
-
(1992)
Contemporary Cryptology: The Science of Information Integrity
, pp. 43-64
-
-
Smid, M.E.1
Branstad, D.K.2
-
452
-
-
0019713652
-
Theft and conspiracy in the take-grant model
-
Snyder, L., Theft and conspiracy in the take-grant model, Journal of Computer and System Sciences 23(3) (1981), pp. 333-347.
-
(1981)
Journal of Computer and System Sciences
, vol.23
, Issue.3
, pp. 333-347
-
-
Snyder, L.1
-
453
-
-
0019548112
-
Formal models of capability-based protection systems
-
Snyder, L., Formal models of capability-based protection systems, IEEE Transactions on Computers C-30 (3) (1981), pp. 172-181.
-
(1981)
IEEE Transactions on Computers
, vol.C-30
, Issue.3
, pp. 172-181
-
-
Snyder, L.1
-
454
-
-
0343472295
-
Pseudonymous audit for privacy enhanced intrusion detection
-
SEC 97, Chapman & Hall, London etc.
-
Sobirey, M., Fischer-Hübner, S., Rannenberg, K., Pseudonymous audit for privacy enhanced intrusion detection. In: Proc. IFIP TC11 13th International Conference on Information Security, SEC 97, Chapman & Hall, London etc., 1997, pp. 151-163.
-
(1997)
Proc. IFIP TC11 13th International Conference on Information Security
, pp. 151-163
-
-
Sobirey, M.1
Fischer-Hübner, S.2
Rannenberg, K.3
-
455
-
-
35048896610
-
Security property based administrative controls
-
Springer, Berlin etc.
-
Solworth, J. A., Sloan, R. H., Security property based administrative controls. In: Proc. 9th European Symposium on Research in Computer Security, ESORICS 04, Lecture Notes in Computer Science 3193, Springer, Berlin etc., 2004, pp. 244-259.
-
(2004)
Proc. 9th European Symposium on Research in Computer Security, ESORICS 04, Lecture Notes in Computer Science 3193
, pp. 244-259
-
-
Solworth, J.A.1
Sloan, R.H.2
-
456
-
-
84944079173
-
Safety analysis of the dynamic-typed access matrix model
-
Springer, Berlin etc.
-
Soshi, M., Safety analysis of the dynamic-typed access matrix model. In: Proc. 6th European Symposium on Research in Computer Security, ESORICS 2000, Lecture Notes in Computer Science 1895, Springer, Berlin etc., 2000, pp. 106-121.
-
(2000)
Proc. 6th European Symposium on Research in Computer Security, ESORICS 2000, Lecture Notes in Computer Science 1895
, pp. 106-121
-
-
Soshi, M.1
-
457
-
-
0842288709
-
The dynamic-typed access matrix model and decidability of the safety problem
-
Soshi, M., Maekawa, M., Okamoto, E., The dynamic-typed access matrix model and decidability of the safety problem, IEICE Transactions on Information and Systems 87-A (1) (2004), pp. 190-203.
-
(2004)
IEICE Transactions on Information and Systems
, vol.87 A
, Issue.1
, pp. 190-203
-
-
Soshi, M.1
Maekawa, M.2
Okamoto, E.3
-
458
-
-
84957629646
-
Fair blind signatures
-
Springer, Berlin etc.
-
Stadler, M., Piveteau, J.-M., Camenisch, J., Fair blind signatures. In: Proc. Eurocrypt 95, Lecture Notes in Computer Science 921, Springer, Berlin etc., 1995, pp. 209-219.
-
(1995)
Proc. Eurocrypt 95, Lecture Notes in Computer Science 921
, pp. 209-219
-
-
Stadler, M.1
Piveteau, J.-M.2
Camenisch, J.3
-
459
-
-
84947917119
-
Publicly verifiable secret sharing
-
Springer, Berlin etc.
-
Stadler, M., Publicly verifiable secret sharing. In: Proc. Eurocrypt 96, Lecture Notes in Computer Science 1070, Springer, Berlin etc., 1996, pp. 190-199.
-
(1996)
Proc. Eurocrypt 96, Lecture Notes in Computer Science 1070
, pp. 190-199
-
-
Stadler, M.1
-
461
-
-
0003600595
-
-
5th edition, Prentice-Hall, Upper Saddle River etc.
-
Stallings, W., Operating Systems, 5th edition, Prentice-Hall, Upper Saddle River etc., 2005.
-
(2005)
Operating Systems
-
-
Stallings, W.1
-
464
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, Texas
-
Steiner, J. G., Neuman, B. C., Schiller, J. I., Kerberos: An authentication service for open network systems. In: Usenix Conference Proceedings, Dallas, Texas, 1988, pp. 191-202.
-
(1988)
Usenix Conference Proceedings
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, B.C.2
Schiller, J.I.3
-
465
-
-
0023828936
-
Some constructions and bounds of authentication codes
-
Stinson, D. R., Some constructions and bounds of authentication codes, Journal of Cryptology 1(1988), pp. 37-51.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 37-51
-
-
Stinson, D.R.1
-
466
-
-
0025212061
-
The combinatorics of authentication and secrecy codes
-
Stinson, D. R., The combinatorics of authentication and secrecy codes, Journal of Cryptology 2(1990), pp. 23-49.
-
(1990)
Journal of Cryptology
, vol.2
, pp. 23-49
-
-
Stinson, D.R.1
-
467
-
-
0038452683
-
Combinatorial characterizations of authentication codes
-
Stinson, D. R., Combinatorial characterizations of authentication codes, Designs, Codes, and Cryptography 2(1992), pp. 175-187.
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, pp. 175-187
-
-
Stinson, D.R.1
-
468
-
-
0000708528
-
An explication of secret sharing schemes
-
Stinson, D. R., An explication of secret sharing schemes, Designs, Codes and Cryptography 2(1992), pp. 357-390.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
469
-
-
0028323999
-
Decomposition structures for secret sharing schemes
-
Stinson, D. R., Decomposition structures for secret sharing schemes, IEEE Transactions on Information Theory 40(1994), pp. 118-125.
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, pp. 118-125
-
-
Stinson, D.R.1
-
470
-
-
0003987443
-
-
1st edition, Chapman & Hall/CRC Press, Boca Raton etc., 3rd edition
-
Stinson, D. R., Cryptography: Theory and Practice, 1st edition, Chapman & Hall/CRC Press, Boca Raton etc., 1995;3rd edition, 2006.
-
(1995)
Cryptography: Theory and Practice
-
-
Stinson, D.R.1
-
473
-
-
0004193866
-
-
2nd edition, Prentice-Hall, Upper Saddle River
-
Tanenbaum, A. S., Modern Operating Systems, 2nd edition, Prentice-Hall, Upper Saddle River, 2001.
-
(2001)
Modern Operating Systems
-
-
Tanenbaum, A.S.1
-
474
-
-
0004141908
-
-
4th edition, Prentice-Hall, Upper Saddle River
-
Tanenbaum, A. S., Computer Networks, 4th edition, Prentice-Hall, Upper Saddle River, 2003.
-
(2003)
Computer Networks
-
-
Tanenbaum, A.S.1
-
475
-
-
0004120131
-
-
3rd edition, Prentice-Hall, Upper Saddle River
-
Tanenbaum, A. S., Woodhull, A. S., Operating Systems: Design and Implementation, 3rd edition, Prentice-Hall, Upper Saddle River, 2006.
-
(2006)
Operating Systems: Design and Implementation
-
-
Tanenbaum, A.S.1
Woodhull, A.S.2
-
476
-
-
0022561959
-
Using sparse capabilities in a distributed operating system
-
IEEE
-
Tanenbaum, A. S., Mullender, S., van Renesse, R., Using sparse capabilities in a distributed operating system. In: Proc. 6th International Conference on Distributed Computing Systems, IEEE, 1986, pp. 558-563.
-
(1986)
Proc. 6th International Conference on Distributed Computing Systems
, pp. 558-563
-
-
Tanenbaum, A.S.1
Mullender, S.2
Van Renesse, R.3
-
477
-
-
0025568729
-
Experiences with the Amoeba distributed operating system
-
Tanenbaum, A. S., van Renesse, R., van Staveren, H., Sharp, G., Mullender, S., Jansen, J., van Rossum, G., Experiences with the Amoeba distributed operating system, Communiations of the ACM 33(12) (1990), pp. 46-63.
-
(1990)
Communiations of the ACM
, vol.33
, Issue.12
, pp. 46-63
-
-
Tanenbaum, A.S.1
Van Renesse, R.2
Van Staveren, H.3
Sharp, G.4
Mullender, S.5
Jansen, J.6
Rossum, G.7
-
478
-
-
0003520264
-
-
Prentice-Hall, Upper Saddle River
-
Tanenbaum, A. S., van Steen, M., Distributed Systems: Principles and Paradigms, Prentice-Hall, Upper Saddle River, 2002.
-
(2002)
Distributed Systems: Principles and Paradigms
-
-
Tanenbaum, A.S.1
Van Steen, M.2
-
479
-
-
27944486263
-
-
McGraw-Hill, New York etc.
-
Theriault, M., Newman, A., Oracle Security Handbook, McGraw-Hill, New York etc., 2001.
-
(2001)
Oracle Security Handbook
-
-
Theriault, M.1
Newman, A.2
-
482
-
-
0242528829
-
A user-role based data security approach
-
Landwehr, C. E. ed., Elsevier Science North Holland, Amsterdam etc.
-
Ting, T. C., A user-role based data security approach. In: Landwehr, C. E. (ed.), Database Security: Status and Prospects, Elsevier Science (North Holland), Amsterdam etc., 1988, pp. 187-208.
-
(1988)
Database Security: Status and Prospects
, pp. 187-208
-
-
Ting, T.C.1
-
483
-
-
0021622802
-
The statistical security of a statistical database
-
Traub, J. F., Yemini, Y., Wozniakowski, H., The statistical security of a statistical database, ACM Transactions on Database Systems 9(4) (1984), pp. 672-679.
-
(1984)
ACM Transactions on Database Systems
, vol.9
, Issue.4
, pp. 672-679
-
-
Traub, J.F.1
Yemini, Y.2
Wozniakowski, H.3
-
484
-
-
21644486314
-
-
Trusted Computing Group, Revision 1.2
-
Trusted Computing Group, TCG Specification Architecture Overview, Revision 1.2, 2004, https://www.trustedcomputinggroup.org.
-
(2004)
TCG Specification Architecture Overview
-
-
-
485
-
-
54749105312
-
-
Trusted Computing Group - Infrastructure Working Group, Version 1.0, Revision 1
-
Trusted Computing Group - Infrastructure Working Group, Reference Architecture for Interoperability (Part I), Version 1.0, Revision 1, 2005, https://www.trustedcomputinggroup.org.
-
(2005)
Reference Architecture for Interoperability (Part I)
-
-
-
486
-
-
70749096362
-
-
Trusted Computing Group, Version 1.2, Revision 85
-
Trusted Computing Group, TPM Main Part 1, Design Principles, Version 1.2, Revision 85, 2005, https://www.trustedcomputinggroup.org.
-
(2005)
TPM Main Part 1, Design Principles
-
-
-
487
-
-
84860448417
-
-
Trusted Computing Group, Version 1.2, Revision 85
-
Trusted Computing Group, TPM Main Part 2, TPM Structures, Version 1.2, Revision 85, 2005, https://www.trustedcomputinggroup.org.
-
(2005)
TPM Main Part 2, TPM Structures
-
-
-
489
-
-
0003584325
-
-
Prentice-Hall, Upper Saddle River
-
Ullman, J. D., Widom, J., A First Course on Database Systems, Prentice-Hall, Upper Saddle River, 1997.
-
(1997)
A First Course on Database Systems
-
-
Ullman, J.D.1
Widom, J.2
-
490
-
-
0003925663
-
-
Addison-Wesley, Boston etc.
-
Viega, J., McGraw, G., Building Secure Software, Addison-Wesley, Boston etc., 2001.
-
(2001)
Building Secure Software
-
-
Viega, J.1
McGraw, G.2
-
491
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
Vigna, G., Kemmerer, R. A., NetSTAT: A network-based intrusion detection system, Journal of Computer Security 7(1) (1999), pp. 37-71.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
-
492
-
-
84896508047
-
Unconditional sender and recipient untraceability in spite of active attacks
-
Springer, Berlin etc.
-
Waidner, M., Unconditional sender and recipient untraceability in spite of active attacks. In: Proc. Eurocrypt 89, Lecture Notes in Computer Science 434, Springer, Berlin etc., 1990, pp. 302-319.
-
(1990)
Proc. Eurocrypt 89, Lecture Notes in Computer Science 434
, pp. 302-319
-
-
Waidner, M.1
-
493
-
-
0031677290
-
Understanding Java stack inspection
-
Oakland, May
-
Wallach, D. S., Felton, E. W., Understanding Java stack inspection. In: Proc. IEEE Symposium on Security and Privacy, Oakland, May 1998, pp. 1-12.
-
(1998)
Proc. IEEE Symposium on Security and Privacy
, pp. 1-12
-
-
Wallach, D.S.1
Felton, E.W.2
-
494
-
-
0142219258
-
Precisely answering multi-dimensional range queries without privacy breaches
-
Springer, Berlin etc.
-
Wang, L., Li, Y., Wijesekera, D., Jajodia, S., Precisely answering multi-dimensional range queries without privacy breaches. In: Proc. 8th European Symposium on Research in Computer Security, ESORICS 03, Lecture Notes in Computer Science 2808, Springer, Berlin etc., 2003, pp. 100-115.
-
(2003)
Proc. 8th European Symposium on Research in Computer Security, ESORICS 03, Lecture Notes in Computer Science 2808
, pp. 100-115
-
-
Wang, L.1
Li, Y.2
Wijesekera, D.3
Jajodia, S.4
-
495
-
-
19944425657
-
-
Cryptology ePrint Archive, Report 2004/199
-
Wang, X., Feng, D., Lai, X., Yu, H., Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive, Report 2004/199, 2004, http://eprint.iacr.org/2004/199.
-
(2004)
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
-
-
Wang, X.1
Feng, D.2
Lai, X.3
Yu, H.4
-
497
-
-
0003819990
-
-
Academic Press, San Diego/London
-
Weikum, G., Vossen, G., Transactional Information Systems, Academic Press, San Diego/London, 2002.
-
(2002)
Transactional Information Systems
-
-
Weikum, G.1
Vossen, G.2
-
498
-
-
84944248021
-
Intrusion detection using variable-length audit trail patterns
-
RAID 2000, Lecture Notes in Computer Science 1907, Springer, Berlin etc.
-
Wespi, A., Dacier, M., Debar, H., Intrusion detection using variable-length audit trail patterns. In: Proc. 3rd International Symposium on Recent Advances in Intrusion Detection, RAID 2000, Lecture Notes in Computer Science 1907, Springer, Berlin etc., 2000, pp. 110-129.
-
(2000)
Proc. 3rd International Symposium on Recent Advances in Intrusion Detection
, pp. 110-129
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
-
499
-
-
3142523600
-
A propositional policy algebra for access control
-
Wijesekera, D., Jajodia, S., A propositional policy algebra for access control, ACM Transactions on Information and System Security 6(2) (2003), pp. 286-325.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.2
, pp. 286-325
-
-
Wijesekera, D.1
Jajodia, S.2
-
500
-
-
20444492231
-
Removing permissions in the flexible authorization framework
-
Wijesekera, D., Jajodia, S., Parisi-Presicce, F., Hagström, A., Removing permissions in the flexible authorization framework, ACM Transactions on Database Systems 28(3) (2003), pp. 209-229.
-
(2003)
ACM Transactions on Database Systems
, vol.28
, Issue.3
, pp. 209-229
-
-
Wijesekera, D.1
Jajodia, S.2
Parisi-Presicce, F.3
Hagström, A.4
-
501
-
-
0028720693
-
Formal query languages for secure relational databases
-
Winslett, M, Smith, K., Qian, X., Formal query languages for secure relational databases, ACM Transactions on Database Systems 19(4) (1994), pp. 626-662.
-
(1994)
ACM Transactions on Database Systems
, vol.19
, Issue.4
, pp. 626-662
-
-
Winslett, M.1
Smith, K.2
Qian, X.3
-
502
-
-
0016069660
-
HYDRA: The kernel of a multiprocessor operating system
-
Wulf, W., Cohen, E., Corwin, W., Jones, A., Levin, R., Pierson, C., Pollack, F., HYDRA: The kernel of a multiprocessor operating system, Communications of the ACM 17(6) (1974), pp. 337-345.
-
(1974)
Communications of the ACM
, vol.17
, Issue.6
, pp. 337-345
-
-
Wulf, W.1
Cohen, E.2
Corwin, W.3
Jones, A.4
Levin, R.5
Pierson, C.6
Pollack, F.7
-
503
-
-
0004694565
-
-
McGraw-Hill, New York
-
Wulf, W. A., Levin, S. P., Harbison, S. P., Hydra/Cmmp: An Experimental Computer System, McGraw-Hill, New York, 1981.
-
(1981)
Hydra/Cmmp: An Experimental Computer System
-
-
Wulf, W.A.1
Levin, S.P.2
Harbison, S.P.3
-
504
-
-
33746644985
-
Privacy-preserving alert correlation: A concept hierarchy based approach
-
ACSAC 2005, IEEE
-
Xu, D., Ning, P., Privacy-preserving alert correlation: A concept hierarchy based approach. In: Proc. 21st Annual Computer Security Applications Confernce, ACSAC 2005, IEEE, 2005, pp. 537-546.
-
(2005)
Proc. 21st Annual Computer Security Applications Confernce
, pp. 537-546
-
-
Xu, D.1
Ning, P.2
-
508
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotations
-
Yu, T., Winslett, M., Seamons, K. E., Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotations, ACM Transactions on Information and System Security 6(1) (2003), pp. 1-42.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|