ACM Transactions on Information and System Security (TISSEC)
, Volume 6
Volume 6, Number 1, February 2003
Ting Yu
,
Marianne Winslett
,
Kent E. Seamons
:
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.
1-42
Joseph Y. Halpern
,
Riccardo Pucella
:
On the relationship between strand spaces and multi-agent systems.
43-70
Elisa Bertino
,
Barbara Catania
,
Elena Ferrari
,
Paolo Perlasca
:
A logical framework for reasoning about access control models.
71-127
Ninghui Li
,
Benjamin N. Grosof
,
Joan Feigenbaum
:
Delegation logic: A logic-based approach to distributed authorization.
128-171
Volume 6, Number 2, May 2003
Suresh Chari
,
Pau-Chen Cheng
:
BlueBoX: A policy-driven, host-based intrusion detection system.
173-200
Jason Crampton
,
George Loizou
:
Administrative scope: A foundation for role-based administrative models.
201-231
Günter Karjoth
:
Access control with IBM Tivoli access manager.
232-257
Jung Min Park
,
Edwin K. P. Chong
,
Howard Jay Siegel
:
Efficient multicast stream authentication using erasure codes.
258-285
Duminda Wijesekera
,
Sushil Jajodia
:
A propositional policy algebra for access control.
286-325
Volume 6, Number 3, August 2003
Trent Jaeger
,
Xiaolan Zhang
,
Fidel Cacheda
:
Policy management using access control spaces.
327-364
Phillip Rogaway
,
Mihir Bellare
,
John Black
:
OCB: A block-cipher mode of operation for efficient authenticated encryption.
365-403
Longhua Zhang
,
Gail-Joon Ahn
,
Bei-tseng Chu
:
A rule-based framework for role-based delegation and revocation.
404-441
Volume 6, Number 4, November 2003
Klaus Julisch
:
Clustering intrusion detection alarms to support root cause analysis.
443-471
Pino Persiano
,
Ivan Visconti
:
A secure and private system for subscription-based remote services.
472-500
Steve Barker
,
Peter J. Stuckey
:
Flexible access control policy specification with constraint logic programming.
501-546
Carl M. Ellison
,
Steve Dohrmann
:
Public-key support for group collaboration.
547-565
Mary R. Thompson
,
Abdelilah Essiari
,
Srilekha Mudumbai
:
Certificate-based authorization policy in a PKI environment.
566-588
Copyright ©
Fri Mar 12 17:33:23 2010 by
Michael Ley
(
ley@uni-trier.de
)