researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: ACM Trans. Inf. Syst. Secur.
Home
Index
Info
Volume
Volume
6
, Issue
4
443
--
471
Klaus Julisch
.
Clustering intrusion detection alarms to support root cause analysis
472
--
500
Pino Persiano
,
Ivan Visconti
.
A secure and private system for subscription-based remote services
501
--
546
Steve Barker
,
Peter J. Stuckey
.
Flexible access control policy specification with constraint logic programming
547
--
565
Carl M. Ellison
,
Steve Dohrmann
.
Public-key support for group collaboration
566
--
588
Mary R. Thompson
,
Abdelilah Essiari
,
Srilekha Mudumbai
.
Certificate-based authorization policy in a PKI environment
Volume
6
, Issue
3
327
--
364
Trent Jaeger
,
Xiaolan Zhang
,
Fidel Cacheda
.
Policy management using access control spaces
365
--
403
Phillip Rogaway
,
Mihir Bellare
,
John Black
.
OCB: A block-cipher mode of operation for efficient authenticated encryption
404
--
441
Longhua Zhang
,
Gail-Joon Ahn
,
Bei-tseng Chu
.
A rule-based framework for role-based delegation and revocation
Volume
6
, Issue
2
173
--
200
Suresh Chari
,
Pau-Chen Cheng
.
BlueBoX: A policy-driven, host-based intrusion detection system
201
--
231
Jason Crampton
,
George Loizou
.
Administrative scope: A foundation for role-based administrative models
232
--
257
Günter Karjoth
.
Access control with IBM Tivoli access manager
258
--
285
Jung Min Park
,
Edwin K. P. Chong
,
Howard Jay Siegel
.
Efficient multicast stream authentication using erasure codes
286
--
325
Duminda Wijesekera
,
Sushil Jajodia
.
A propositional policy algebra for access control
Volume
6
, Issue
1
1
--
42
Ting Yu
,
Marianne Winslett
,
Kent E. Seamons
.
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
43
--
70
Joseph Y. Halpern
,
Riccardo Pucella
.
On the relationship between strand spaces and multi-agent systems
71
--
127
Elisa Bertino
,
Barbara Catania
,
Elena Ferrari
,
Paolo Perlasca
.
A logical framework for reasoning about access control models
128
--
171
Ninghui Li
,
Benjamin N. Grosof
,
Joan Feigenbaum
.
Delegation logic: A logic-based approach to distributed authorization