Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tissec/tissec6.bht:"
@article{DBLP:journals/tissec/BarkerS03, author = {Steve Barker and Peter J. Stuckey}, title = {Flexible access control policy specification with constraint logic programming}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {4}, pages = {501--546}, year = {2003}, url = {https://doi.org/10.1145/950191.950194}, doi = {10.1145/950191.950194}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BarkerS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BertinoCFP03, author = {Elisa Bertino and Barbara Catania and Elena Ferrari and Paolo Perlasca}, title = {A logical framework for reasoning about access control models}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {1}, pages = {71--127}, year = {2003}, url = {https://doi.org/10.1145/605434.605437}, doi = {10.1145/605434.605437}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BertinoCFP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChariC03, author = {Suresh Chari and Pau{-}Chen Cheng}, title = {BlueBoX: {A} policy-driven, host-based intrusion detection system}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {2}, pages = {173--200}, year = {2003}, url = {https://doi.org/10.1145/762476.762477}, doi = {10.1145/762476.762477}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ChariC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CramptonL03, author = {Jason Crampton and George Loizou}, title = {Administrative scope: {A} foundation for role-based administrative models}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {2}, pages = {201--231}, year = {2003}, url = {https://doi.org/10.1145/762476.762478}, doi = {10.1145/762476.762478}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CramptonL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/EllisonD03, author = {Carl M. Ellison and Steve Dohrmann}, title = {Public-key support for group collaboration}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {4}, pages = {547--565}, year = {2003}, url = {https://doi.org/10.1145/950191.950195}, doi = {10.1145/950191.950195}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/EllisonD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HalpernP03, author = {Joseph Y. Halpern and Riccardo Pucella}, title = {On the relationship between strand spaces and multi-agent systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {1}, pages = {43--70}, year = {2003}, url = {https://doi.org/10.1145/605434.605436}, doi = {10.1145/605434.605436}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HalpernP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JaegerZC03, author = {Trent Jaeger and Xiaolan Zhang and Antony Edwards}, title = {Policy management using access control spaces}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {3}, pages = {327--364}, year = {2003}, url = {https://doi.org/10.1145/937527.937528}, doi = {10.1145/937527.937528}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/JaegerZC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Julisch03, author = {Klaus Julisch}, title = {Clustering intrusion detection alarms to support root cause analysis}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {4}, pages = {443--471}, year = {2003}, url = {https://doi.org/10.1145/950191.950192}, doi = {10.1145/950191.950192}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Julisch03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Karjoth03, author = {G{\"{u}}nter Karjoth}, title = {Access control with {IBM} Tivoli access manager}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {2}, pages = {232--257}, year = {2003}, url = {https://doi.org/10.1145/762476.762479}, doi = {10.1145/762476.762479}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Karjoth03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiGF03, author = {Ninghui Li and Benjamin N. Grosof and Joan Feigenbaum}, title = {Delegation logic: {A} logic-based approach to distributed authorization}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {1}, pages = {128--171}, year = {2003}, url = {https://doi.org/10.1145/605434.605438}, doi = {10.1145/605434.605438}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiGF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ParkCS03, author = {Jung{-}Min Park and Edwin K. P. Chong and Howard Jay Siegel}, title = {Efficient multicast stream authentication using erasure codes}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {2}, pages = {258--285}, year = {2003}, url = {https://doi.org/10.1145/762476.762480}, doi = {10.1145/762476.762480}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ParkCS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PersianoV03, author = {Pino Persiano and Ivan Visconti}, title = {A secure and private system for subscription-based remote services}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {4}, pages = {472--500}, year = {2003}, url = {https://doi.org/10.1145/950191.950193}, doi = {10.1145/950191.950193}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PersianoV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RogawayBB03, author = {Phillip Rogaway and Mihir Bellare and John Black}, title = {{OCB:} {A} block-cipher mode of operation for efficient authenticated encryption}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {3}, pages = {365--403}, year = {2003}, url = {https://doi.org/10.1145/937527.937529}, doi = {10.1145/937527.937529}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/RogawayBB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ThompsonEM03, author = {Mary R. Thompson and Abdelilah Essiari and Srilekha Mudumbai}, title = {Certificate-based authorization policy in a {PKI} environment}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {4}, pages = {566--588}, year = {2003}, url = {https://doi.org/10.1145/950191.950196}, doi = {10.1145/950191.950196}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ThompsonEM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WijesekeraJ03, author = {Duminda Wijesekera and Sushil Jajodia}, title = {A propositional policy algebra for access control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {2}, pages = {286--325}, year = {2003}, url = {https://doi.org/10.1145/762476.762481}, doi = {10.1145/762476.762481}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WijesekeraJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YuWS03, author = {Ting Yu and Marianne Winslett and Kent E. Seamons}, title = {Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {1}, pages = {1--42}, year = {2003}, url = {https://doi.org/10.1145/605434.605435}, doi = {10.1145/605434.605435}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YuWS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangAC03, author = {Longhua Zhang and Gail{-}Joon Ahn and Bei{-}tseng Chu}, title = {A rule-based framework for role-based delegation and revocation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {3}, pages = {404--441}, year = {2003}, url = {https://doi.org/10.1145/937527.937530}, doi = {10.1145/937527.937530}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhangAC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.