International Journal of Information and Computer Security (IJICS)

International Journal of Information and Computer Security

2007 Vol.1 No.1/2


Pages Title and author(s)
5-38Data security in location-aware applications: an approach based on RBAC
M.L. Damiani, E. Bertino, P. Perlasca
DOI: 10.1504/IJICS.2007.012243
39-63Deflation-secure web metering
Rob Johnson, Jessica Staddon
DOI: 10.1504/IJICS.2007.012244
64-108On the design, implementation and application of an authorisation architecture for web services
Sarath Indrakanti, Vijay Varadharajan, Ritesh Agarwal
DOI: 10.1504/IJICS.2007.012245
109-142Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems
Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Yanxin Wang, Xia Wang, Natalia Stakhanova
DOI: 10.1504/IJICS.2007.012246
143-168A geotemporal role-based authorisation system
Vijayalakshmi Atluri, Soon Ae Chun
DOI: 10.1504/IJICS.2007.012247
169-184A taxonomy of intrusion response systems
Natalia Stakhanova, Samik Basu, Johnny Wong
DOI: 10.1504/IJICS.2007.012248
185-200A framework of security and safety checking for internet-based control systems
Lili Yang, S.H. Yang
DOI: 10.1504/IJICS.2007.012249
201-209An RSA-based (t, n) threshold proxy signature scheme with freewill identities
Ya-Fen Chang, Chin-Chen Chang
DOI: 10.1504/IJICS.2007.012250
210-233Selection of an EAP authentication method for a WLAN
Khidir M. Ali, Thomas J. Owens
DOI: 10.1504/IJICS.2007.012251