Journals in DBLP
Brian D. Carrier , Clay Shields The session token protocol for forensics and traceback. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:333-362 [Journal ] Horst Wedde , Mario Lischka Modular authorization and administration. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:363-391 [Journal ] Mark Strembeck , Gustaf Neumann An integrated approach to engineer and enforce context constraints in RBAC environments. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:392-427 [Journal ] Adam Hess , Jason E. Holt , Jared Jacobson , Kent E. Seamons Content-triggered trust negotiation. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:428-456 [Journal ] Yair Amir , Yongdae Kim , Cristina Nita-Rotaru , Gene Tsudik On the performance of group key agreement protocols. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:457-488 [Journal ]