Search dblp for Publications

export results for "toc:db/journals/tissec/tissec6.bht:"

 download as .bib file

@article{DBLP:journals/tissec/BarkerS03,
  author       = {Steve Barker and
                  Peter J. Stuckey},
  title        = {Flexible access control policy specification with constraint logic
                  programming},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {501--546},
  year         = {2003},
  url          = {https://doi.org/10.1145/950191.950194},
  doi          = {10.1145/950191.950194},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BarkerS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BertinoCFP03,
  author       = {Elisa Bertino and
                  Barbara Catania and
                  Elena Ferrari and
                  Paolo Perlasca},
  title        = {A logical framework for reasoning about access control models},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {71--127},
  year         = {2003},
  url          = {https://doi.org/10.1145/605434.605437},
  doi          = {10.1145/605434.605437},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BertinoCFP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChariC03,
  author       = {Suresh Chari and
                  Pau{-}Chen Cheng},
  title        = {BlueBoX: {A} policy-driven, host-based intrusion detection system},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {173--200},
  year         = {2003},
  url          = {https://doi.org/10.1145/762476.762477},
  doi          = {10.1145/762476.762477},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ChariC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramptonL03,
  author       = {Jason Crampton and
                  George Loizou},
  title        = {Administrative scope: {A} foundation for role-based administrative
                  models},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {201--231},
  year         = {2003},
  url          = {https://doi.org/10.1145/762476.762478},
  doi          = {10.1145/762476.762478},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CramptonL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/EllisonD03,
  author       = {Carl M. Ellison and
                  Steve Dohrmann},
  title        = {Public-key support for group collaboration},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {547--565},
  year         = {2003},
  url          = {https://doi.org/10.1145/950191.950195},
  doi          = {10.1145/950191.950195},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/EllisonD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HalpernP03,
  author       = {Joseph Y. Halpern and
                  Riccardo Pucella},
  title        = {On the relationship between strand spaces and multi-agent systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {43--70},
  year         = {2003},
  url          = {https://doi.org/10.1145/605434.605436},
  doi          = {10.1145/605434.605436},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HalpernP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JaegerZC03,
  author       = {Trent Jaeger and
                  Xiaolan Zhang and
                  Antony Edwards},
  title        = {Policy management using access control spaces},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {327--364},
  year         = {2003},
  url          = {https://doi.org/10.1145/937527.937528},
  doi          = {10.1145/937527.937528},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/JaegerZC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Julisch03,
  author       = {Klaus Julisch},
  title        = {Clustering intrusion detection alarms to support root cause analysis},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {443--471},
  year         = {2003},
  url          = {https://doi.org/10.1145/950191.950192},
  doi          = {10.1145/950191.950192},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Julisch03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Karjoth03,
  author       = {G{\"{u}}nter Karjoth},
  title        = {Access control with {IBM} Tivoli access manager},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {232--257},
  year         = {2003},
  url          = {https://doi.org/10.1145/762476.762479},
  doi          = {10.1145/762476.762479},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Karjoth03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiGF03,
  author       = {Ninghui Li and
                  Benjamin N. Grosof and
                  Joan Feigenbaum},
  title        = {Delegation logic: {A} logic-based approach to distributed authorization},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {128--171},
  year         = {2003},
  url          = {https://doi.org/10.1145/605434.605438},
  doi          = {10.1145/605434.605438},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiGF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ParkCS03,
  author       = {Jung{-}Min Park and
                  Edwin K. P. Chong and
                  Howard Jay Siegel},
  title        = {Efficient multicast stream authentication using erasure codes},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {258--285},
  year         = {2003},
  url          = {https://doi.org/10.1145/762476.762480},
  doi          = {10.1145/762476.762480},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ParkCS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PersianoV03,
  author       = {Pino Persiano and
                  Ivan Visconti},
  title        = {A secure and private system for subscription-based remote services},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {472--500},
  year         = {2003},
  url          = {https://doi.org/10.1145/950191.950193},
  doi          = {10.1145/950191.950193},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PersianoV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RogawayBB03,
  author       = {Phillip Rogaway and
                  Mihir Bellare and
                  John Black},
  title        = {{OCB:} {A} block-cipher mode of operation for efficient authenticated
                  encryption},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {365--403},
  year         = {2003},
  url          = {https://doi.org/10.1145/937527.937529},
  doi          = {10.1145/937527.937529},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RogawayBB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ThompsonEM03,
  author       = {Mary R. Thompson and
                  Abdelilah Essiari and
                  Srilekha Mudumbai},
  title        = {Certificate-based authorization policy in a {PKI} environment},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {566--588},
  year         = {2003},
  url          = {https://doi.org/10.1145/950191.950196},
  doi          = {10.1145/950191.950196},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ThompsonEM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WijesekeraJ03,
  author       = {Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {A propositional policy algebra for access control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {286--325},
  year         = {2003},
  url          = {https://doi.org/10.1145/762476.762481},
  doi          = {10.1145/762476.762481},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WijesekeraJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YuWS03,
  author       = {Ting Yu and
                  Marianne Winslett and
                  Kent E. Seamons},
  title        = {Supporting structured credentials and sensitive policies through interoperable
                  strategies for automated trust negotiation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--42},
  year         = {2003},
  url          = {https://doi.org/10.1145/605434.605435},
  doi          = {10.1145/605434.605435},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YuWS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangAC03,
  author       = {Longhua Zhang and
                  Gail{-}Joon Ahn and
                  Bei{-}tseng Chu},
  title        = {A rule-based framework for role-based delegation and revocation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {404--441},
  year         = {2003},
  url          = {https://doi.org/10.1145/937527.937530},
  doi          = {10.1145/937527.937530},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangAC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics