The SCEAS System
Navigation Menu

Journals in DBLP

ACM Trans. Inf. Syst. Secur.
2004, volume: 7, number: 3

  1. Brian D. Carrier, Clay Shields
    The session token protocol for forensics and traceback. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:333-362 [Journal]
  2. Horst Wedde, Mario Lischka
    Modular authorization and administration. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:363-391 [Journal]
  3. Mark Strembeck, Gustaf Neumann
    An integrated approach to engineer and enforce context constraints in RBAC environments. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:392-427 [Journal]
  4. Adam Hess, Jason E. Holt, Jared Jacobson, Kent E. Seamons
    Content-triggered trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:428-456 [Journal]
  5. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik
    On the performance of group key agreement protocols. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:457-488 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002