


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 6
Volume 6, Number 1, February 2003
- Ting Yu, Marianne Winslett, Kent E. Seamons:

Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. 1-42 - Joseph Y. Halpern, Riccardo Pucella:

On the relationship between strand spaces and multi-agent systems. 43-70 - Elisa Bertino, Barbara Catania, Elena Ferrari

, Paolo Perlasca
:
A logical framework for reasoning about access control models. 71-127 - Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum:

Delegation logic: A logic-based approach to distributed authorization. 128-171
Volume 6, Number 2, May 2003
- Suresh Chari, Pau-Chen Cheng:

BlueBoX: A policy-driven, host-based intrusion detection system. 173-200 - Jason Crampton, George Loizou:

Administrative scope: A foundation for role-based administrative models. 201-231 - Günter Karjoth:

Access control with IBM Tivoli access manager. 232-257 - Jung-Min Park, Edwin K. P. Chong

, Howard Jay Siegel:
Efficient multicast stream authentication using erasure codes. 258-285 - Duminda Wijesekera, Sushil Jajodia:

A propositional policy algebra for access control. 286-325
Volume 6, Number 3, August 2003
- Trent Jaeger, Xiaolan Zhang, Antony Edwards:

Policy management using access control spaces. 327-364 - Phillip Rogaway, Mihir Bellare, John Black:

OCB: A block-cipher mode of operation for efficient authenticated encryption. 365-403 - Longhua Zhang, Gail-Joon Ahn

, Bei-tseng Chu:
A rule-based framework for role-based delegation and revocation. 404-441
Volume 6, Number 4, November 2003
- Klaus Julisch:

Clustering intrusion detection alarms to support root cause analysis. 443-471 - Pino Persiano, Ivan Visconti:

A secure and private system for subscription-based remote services. 472-500 - Steve Barker, Peter J. Stuckey:

Flexible access control policy specification with constraint logic programming. 501-546 - Carl M. Ellison, Steve Dohrmann:

Public-key support for group collaboration. 547-565 - Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai:

Certificate-based authorization policy in a PKI environment. 566-588

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














