The SCEAS System
Navigation Menu

Journals in DBLP

Journal of Computer Security
2000, volume: 8, number: 2/3

  1. Vijayalakshmi Atluri, Wei-kuang Huang
    A Petri Net Based Safety Analysis of Workflow Authorization Models. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  2. Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo
    A Logic-Based Approach for Enforcing Access Control. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  3. Günther Horn, Bart Preneel
    Authentication and Payment in Future Mobile Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  4. Günter Karjoth
    Authorization in CORBA Security. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  5. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  6. Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi
    Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002