Volume 15,
Number 1,
2006
Trusted Internet Workshop (TIW) 2004
- Suresh Subramaniam, Krishna M. Sivalingam, G. Manimaran:
Selected papers from Trusted Internet Workshop (TIW) 2004.
1-3
Electronic Edition (link) BibTeX
- Yih Huang, David Arsenault, Arun Sood:
SCIT-DNS: Critical infrastructure protection through secure DNS server dynamic updates.
5-19
Electronic Edition (link) BibTeX
- Olga Gelbart, Bhagirath Narahari, Rahul Simha:
SPEE: A Secure Program Execution Environment tool using code integrity checking.
21-32
Electronic Edition (link) BibTeX
- Vijay Bhuse, Ajay K. Gupta:
Anomaly intrusion detection in wireless sensor networks.
33-51
Electronic Edition (link) BibTeX
- B. Venkata Ramana, B. S. Manoj, C. Siva Ram Murthy:
AR-TCP: A Loss-Aware Adaptive Rate based TCP for Ad hoc Wireless Networks.
53-72
Electronic Edition (link) BibTeX
- Mohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy:
A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks.
73-92
Electronic Edition (link) BibTeX
- Manel Guerrero Zapata:
Key management and delayed verification for Ad hoc networks.
93-109
Electronic Edition (link) BibTeX
Volume 15,
Number 2,
2006
- Yen Chieh Ouyang, Ching-Wen Yang, Wei Shi Lian:
Neural networks based variable bit rate traffic prediction for traffic control using multiple leaky bucket.
111-122
Electronic Edition (link) BibTeX
- Baoxian Zhang, Hussein T. Mouftah:
Destination-driven shortest path tree algorithms.
123-130
Electronic Edition (link) BibTeX
- Galia Shabtai, Israel Cidon, Moshe Sidi:
Two priority buffered multistage interconnection networks.
131-155
Electronic Edition (link) BibTeX
- Khaled Salah, K. El-Badawi:
Throughput-delay analysis of interrupt-driven kernels with DMA enabled and disabled in high-speed networks.
157-172
Electronic Edition (link) BibTeX
- Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy:
Convergence of IPsec in presence of resets.
173-183
Electronic Edition (link) BibTeX
- Haci A. Mantar, Ibrahim T. Okumus, Junseok Hwang, Steve J. Chapin:
A scalable intra-domain resource management architecture for DiffServ networks.
185-205
Electronic Edition (link) BibTeX
Volume 15,
Number 3,
2006
Managing security policies:
Modeling,
verification and configuration
- Managing security policies: Modeling, verification and configuration.
207-208
Electronic Edition (link) BibTeX
- Hazem Hamed, Ehab Al-Shaer:
On autonomic optimization of firewall policy organization.
209-227
Electronic Edition (link) BibTeX
- Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington:
Client-side access control enforcement using trusted computing and PEI models.
229-245
Electronic Edition (link) BibTeX
- Romain Laborde, François Barrère, Abdelmalek Benzekri:
Network security policy refinement process: Expression and analysis.
247-260
Electronic Edition (link) BibTeX
- Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:
Reconfiguring Role Based Access Control policies using risk semantics.
261-273
Electronic Edition (link) BibTeX
- Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shyhtsun Felix Wu:
IPsec/VPN security policy correctness and assurance.
275-289
Electronic Edition (link) BibTeX
- Alan Ganek, Anthony J. Nadalin, Nataraj Nagaratnam, Dinesh Verma:
An autonomic approach for managing security and identity management policies in enterprises.
291-300
Electronic Edition (link) BibTeX
- Simon N. Foley, Barry P. Mulcahy, Thomas B. Quillinan, Meabh O'Connor, John P. Morrison:
Supporting heterogeneous middleware security policies in WebCom.
301-313
Electronic Edition (link) BibTeX
- Lu'ay A. Wahsheh, Jim Alves-Foss:
Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems.
315-327
Electronic Edition (link) BibTeX
Volume 15,
Number 4,
2006
Copyright © Sun May 17 00:09:33 2009
by Michael Ley (ley@uni-trier.de)