Sciweavers

4 search results - page 1 / 1
» jcs 1998
Sort
View
69
Voted
JCS
1998
85views more  JCS 1998»
15 years 3 days ago
The Inductive Approach to Verifying Cryptographic Protocols
Lawrence C. Paulson
89
Voted
JCS
1998
82views more  JCS 1998»
15 years 3 days ago
On SDSI's Linked Local Name Spaces
Rivest and Lampson have recently introduced SDSI, a Simple Distributed Security Infrastructure. One of the important innovations of SDSI is the use of linked local name spaces. Th...
Martín Abadi
147
Voted
JCS
1998
338views more  JCS 1998»
15 years 3 days ago
Intrusion Detection Using Sequences of System Calls
A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a g...
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaj...
90
Voted
JCS
1998
117views more  JCS 1998»
15 years 3 days ago
A Semantic-Based Transaction Processing Model for Multilevel Transactions
Multilevel transactions have been proposed for multilevel secure databases; in contrast to most proposals, such transactions allow users to read and write across multiple security...
Indrakshi Ray, Paul Ammann, Sushil Jajodia