default search action
ACM Transactions on Information and System Security (TISSEC), Volume 6
Volume 6, Number 1, February 2003
- Ting Yu, Marianne Winslett, Kent E. Seamons:
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. 1-42 - Joseph Y. Halpern, Riccardo Pucella:
On the relationship between strand spaces and multi-agent systems. 43-70 - Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca:
A logical framework for reasoning about access control models. 71-127 - Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum:
Delegation logic: A logic-based approach to distributed authorization. 128-171
Volume 6, Number 2, May 2003
- Suresh Chari, Pau-Chen Cheng:
BlueBoX: A policy-driven, host-based intrusion detection system. 173-200 - Jason Crampton, George Loizou:
Administrative scope: A foundation for role-based administrative models. 201-231 - Günter Karjoth:
Access control with IBM Tivoli access manager. 232-257 - Jung-Min Park, Edwin K. P. Chong, Howard Jay Siegel:
Efficient multicast stream authentication using erasure codes. 258-285 - Duminda Wijesekera, Sushil Jajodia:
A propositional policy algebra for access control. 286-325
Volume 6, Number 3, August 2003
- Trent Jaeger, Xiaolan Zhang, Antony Edwards:
Policy management using access control spaces. 327-364 - Phillip Rogaway, Mihir Bellare, John Black:
OCB: A block-cipher mode of operation for efficient authenticated encryption. 365-403 - Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu:
A rule-based framework for role-based delegation and revocation. 404-441
Volume 6, Number 4, November 2003
- Klaus Julisch:
Clustering intrusion detection alarms to support root cause analysis. 443-471 - Pino Persiano, Ivan Visconti:
A secure and private system for subscription-based remote services. 472-500 - Steve Barker, Peter J. Stuckey:
Flexible access control policy specification with constraint logic programming. 501-546 - Carl M. Ellison, Steve Dohrmann:
Public-key support for group collaboration. 547-565 - Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai:
Certificate-based authorization policy in a PKI environment. 566-588
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.