Journals in DBLP
Dorothy E. Denning , Selim G. Akl , Mark Heckman , Teresa F. Lunt , Matthew Morgenstern , Peter G. Neumann , Roger R. Schell Views for Multilevel Database Security. [Citation Graph (6, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:129-140 [Journal ] J. Thomas Haigh , William D. Young Extending the Noninterference Version of MLS for SAT. [Citation Graph (2, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:141-150 [Journal ] J. Daniel Halpern , Sam Owre , Norman Proctor , William F. Wilson Muse - A Computer Assisted Verification System. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:151-156 [Journal ] J. Thomas Haigh , Richard A. Kemmerer , John McHugh , William D. Young An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:157-168 [Journal ] Virgil D. Gligor , C. Sekar Chandersekaran , Wen-Der Jiang , Abhai Johri , Gary L. Luckenbaugh , L. Edward Reich A New Security Testing Method and Its Application to the Secure Xenix Kernel. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:169-183 [Journal ] Daniel M. Berry Towards a Formal Basis for the Formal Development Method and the Ina Jo Specification Language. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:184-201 [Journal ] Richard Y. Kain , Carl E. Landwehr On Access Checking in Capability-Based Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:202-207 [Journal ] Virgil D. Gligor , C. Sekar Chandersekaran , Robert S. Chapman , Leslie J. Dotterer , Matthew S. Hecht , Wen-Der Jiang , Abhai Johri , Gary L. Luckenbaugh , N. Vasudevan Design and Implementation of Secure Xenix. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:208-221 [Journal ] Dorothy E. Denning An Intrusion-Detection Model. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:222-232 [Journal ] Dan M. Nessett Factors Affecting Distributed System Security. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:233-248 [Journal ] Deborah Estrin Controls for Interorganization Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:249-261 [Journal ] Judy H. Moore , Gustavus J. Simmons Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:262-273 [Journal ] Jonathan K. Millen , Sidney C. Clark , Sheryl B. Freedman The Interrogator: Protocol Security Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:274-288 [Journal ] Catherine Meadows , David Mutchler Matching Secrets in the Absence of a Continuously Available Trusted Authority. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:289-292 [Journal ] C. Gray Girling Covert Channels in LAN`s. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:292-296 [Journal ]