Journal: Computer Communications

Volume 23, Issue 17

1581 -- 1583Madjid Merabti, Qi Shi, Rolf Oppliger. Advanced security techniques for network protection
1584 -- 1593Along Lin, R. Brown. The application of security policy to role-based access control and the common data security architecture
1594 -- 1605Stephane Doyon, Mourad Debbabi. On object initialization in the Java bytecode
1606 -- 1612Jianying Zhou. Further analysis of the Internet key exchange protocol
1613 -- 1620Paul Ashley, Mark Vandenwauver, Frank Siebenlist. Applying authorization to intranets: architectures, issues and APIs
1621 -- 1626Ross J. Anderson, Jong-Hyeon Lee. Jikzi - a new framework for security policy, trusted publishing and electronic commerce
1627 -- 1637N. Asokan, Philip Ginzboorg. Key agreement in ad hoc networks
1638 -- 1644Seong-Min Hong, SeungWon Lee, Yongsoo Park, Yookun Cho, Hyunsoo Yoon. On the construction of a powerful distributed authentication server without additional key management
1645 -- 1654Maria Felicia Florio, Roberto Gorrieri, Gianluigi Marchetti. Coping with denial of service due to malicious Java applets
1655 -- 1666Pascal Urien. Internet card, a smart card as a true Internet node
1667 -- 1676Wayne A. Jansen. Countermeasures for mobile agent security
1677 -- 1680Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh. Randomization enhanced Chaum s blind signature scheme
1681 -- 1701Lakshminath R. Dondeti, Sarit Mukherjee, Ashok Samal. Scalable secure one-to-many group communication using dual encryption
1702 -- 1715Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia. Modeling requests among cooperating intrusion detection systems
1716 -- 1723Denis Trcek. Security policy conceptual modeling and formalization for networked information systems