The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Trans. Software Eng.
1987, volume: 13, number: 2

  1. Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell
    Views for Multilevel Database Security. [Citation Graph (6, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:129-140 [Journal]
  2. J. Thomas Haigh, William D. Young
    Extending the Noninterference Version of MLS for SAT. [Citation Graph (2, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:141-150 [Journal]
  3. J. Daniel Halpern, Sam Owre, Norman Proctor, William F. Wilson
    Muse - A Computer Assisted Verification System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:151-156 [Journal]
  4. J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young
    An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:157-168 [Journal]
  5. Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich
    A New Security Testing Method and Its Application to the Secure Xenix Kernel. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:169-183 [Journal]
  6. Daniel M. Berry
    Towards a Formal Basis for the Formal Development Method and the Ina Jo Specification Language. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:184-201 [Journal]
  7. Richard Y. Kain, Carl E. Landwehr
    On Access Checking in Capability-Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:202-207 [Journal]
  8. Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan
    Design and Implementation of Secure Xenix. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:208-221 [Journal]
  9. Dorothy E. Denning
    An Intrusion-Detection Model. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:222-232 [Journal]
  10. Dan M. Nessett
    Factors Affecting Distributed System Security. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:233-248 [Journal]
  11. Deborah Estrin
    Controls for Interorganization Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:249-261 [Journal]
  12. Judy H. Moore, Gustavus J. Simmons
    Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:262-273 [Journal]
  13. Jonathan K. Millen, Sidney C. Clark, Sheryl B. Freedman
    The Interrogator: Protocol Security Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:274-288 [Journal]
  14. Catherine Meadows, David Mutchler
    Matching Secrets in the Absence of a Continuously Available Trusted Authority. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:289-292 [Journal]
  15. C. Gray Girling
    Covert Channels in LAN`s. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:292-296 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002