ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings 1996 IEEE Symposium on Security and Privacy
Latest Publications
TOTAL DOCUMENTS
23
(FIVE YEARS 0)
H-INDEX
12
(FIVE YEARS 0)
Published By IEEE
0818674172
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Java security: from HotJava to Netscape and beyond
Proceedings 1996 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.1996.502681
◽
2002
◽
Cited By ~ 62
Author(s):
D. Dean
◽
E.W. Felten
◽
D.S. Wallach
Download Full-text
Cryptovirology: extortion-based security threats and countermeasures
Proceedings 1996 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.1996.502676
◽
2002
◽
Cited By ~ 45
Author(s):
A. Young
◽
Moti Yung
Keyword(s):
Security Threats
Download Full-text
What do we mean by entity authentication?
Proceedings 1996 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.1996.502668
◽
2002
◽
Cited By ~ 43
Author(s):
D. Gollmann
Download Full-text
Supporting multiple access control policies in database systems
Proceedings 1996 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.1996.502673
◽
2002
◽
Cited By ~ 44
Author(s):
E. Bertino
◽
S. Jajodia
◽
P. Samarati
Keyword(s):
Access Control
◽
Multiple Access
◽
Database Systems
◽
Multiple Access Control
◽
Control Policies
◽
Access Control Policies
Download Full-text
Ensuring atomicity of multilevel transactions
Proceedings 1996 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.1996.502671
◽
2002
◽
Cited By ~ 3
Author(s):
P. Ammann
◽
S. Jajodia
◽
I. Ray
Download Full-text
A communication agreement framework for access/action control
Proceedings 1996 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.1996.502678
◽
2002
◽
Cited By ~ 11
Author(s):
M. Roscheisen
◽
T. Winograd
Keyword(s):
Action Control
Download Full-text
Security properties and CSP
Proceedings 1996 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.1996.502680
◽
2002
◽
Cited By ~ 86
Author(s):
S. Schneider
Keyword(s):
Security Properties
Download Full-text
Secure network objects
Proceedings 1996 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.1996.502683
◽
2002
◽
Cited By ~ 14
Author(s):
L. Van Doorn
◽
M. Abadi
◽
M. Burrows
◽
E. Wobber
Keyword(s):
Secure Network
Download Full-text
Decentralized trust management
Proceedings 1996 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.1996.502679
◽
2002
◽
Cited By ~ 773
Author(s):
M. Blaze
◽
J. Feigenbaum
◽
J. Lacy
Keyword(s):
Trust Management
Download Full-text
View-based access control with high assurance
Proceedings 1996 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.1996.502672
◽
2002
◽
Cited By ~ 6
Author(s):
Xiaolei Qian
Keyword(s):
Access Control
◽
High Assurance
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close