Journal of Computer Security
, Volume 6
Volume 6, Number 1-2, 1998
Martín Abadi
: On SDSI's Linked Local Name Spaces. 3-22
James W. Gray III
,
Kin Fai Epsilon Ip
,
King-Shan Lui
: Provable Security for Cryptographic Protocols - Exact Analysis and Engineering Applications. 23-52
Gavin Lowe
: Casper: A Compiler for the Analysis of Security Protocols. 53-84
Lawrence C. Paulson
: The Inductive Approach to Verifying Cryptographic Protocols. 85-128
Volume 6, Number 3, 1998
Tsutomu Matsumoto
: Human-Computer Cryptography: An Attempt. 129-150
Steven A. Hofmeyr
,
Stephanie Forrest
,
Anil Somayaji
: Intrusion Detection Using Sequences of System Calls. 151-180
Indrakshi Ray
,
Paul Ammann
,
Sushil Jajodia
: A Semantic-Based Transaction Processing Model for Multilevel Transactions. 181-217
Volume 6, Number 4, 1998
Lars R. Knudsen
,
Keith M. Martin
: In Search of Multiple Domain Key Recovery. 219-236
Matthew K. Franklin
,
Dahlia Malkhi
: Auditable Metering with Lightweight Security. 237-256
Fabio Casati
,
Silvana Castano
,
Maria Grazia Fugini
: Enforcing Workflow Authorization Constraints Using Triggers. 257-286
Copyright ©
Fri Mar 12 17:29:53 2010 by
Michael Ley
(
ley@uni-trier.de
)