|
Journals in DBLP
- Suresh Chari, Pau-Chen Cheng
BlueBoX: A policy-driven, host-based intrusion detection system. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:173-200 [Journal]
- Jason Crampton, George Loizou
Administrative scope: A foundation for role-based administrative models. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:201-231 [Journal]
- Günter Karjoth
Access control with IBM Tivoli access manager. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:232-257 [Journal]
- Jung Min Park, Edwin K. P. Chong, Howard Jay Siegel
Efficient multicast stream authentication using erasure codes. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:258-285 [Journal]
- Duminda Wijesekera, Sushil Jajodia
A propositional policy algebra for access control. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:286-325 [Journal]
|