Journal cover image

Browse issues

Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Information and Computer Security

2007 Vol. 1 No. 1/2


PagesTitle and authors
5-38Data security in location-aware applications: an approach based on RBAC
M.L. Damiani, E. Bertino, P. Perlasca
DOI: 10.1504/IJICS.2007.012243

39-63Deflation-secure web metering
Rob Johnson, Jessica Staddon
DOI: 10.1504/IJICS.2007.012244

64-108On the design, implementation and application of an authorisation architecture for web services
Sarath Indrakanti, Vijay Varadharajan, Ritesh Agarwal
DOI: 10.1504/IJICS.2007.012245

109-142Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems
Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Yanxin Wang, Xia Wang, Natalia Stakhanova
DOI: 10.1504/IJICS.2007.012246

143-168A geotemporal role-based authorisation system
Vijayalakshmi Atluri, Soon Ae Chun
DOI: 10.1504/IJICS.2007.012247

169-184A taxonomy of intrusion response systems
Natalia Stakhanova, Samik Basu, Johnny Wong
DOI: 10.1504/IJICS.2007.012248

185-200A framework of security and safety checking for internet-based control systems
Lili Yang, S.H. Yang
DOI: 10.1504/IJICS.2007.012249

201-209An RSA-based (t, n) threshold proxy signature scheme with freewill identities
Ya-Fen Chang, Chin-Chen Chang
DOI: 10.1504/IJICS.2007.012250

210-233Selection of an EAP authentication method for a WLAN
Khidir M. Ali, Thomas J. Owens
DOI: 10.1504/IJICS.2007.012251