ACM Transactions on Information and System Security (TISSEC)
, Volume 2
Volume 2, Number 1, February 1999
Ravi S. Sandhu
:
Editorial.
1-2
Electronic Edition
(
ACM DL
)
BibTeX
Matunda Nyanchama
,
Sylvia L. Osborn
:
The Role Graph Model and Conflict of Interest.
3-33
Electronic Edition
(
ACM DL
)
BibTeX
David F. Ferraiolo
,
John F. Barkley
,
D. Richard Kuhn
:
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet.
34-64
Electronic Edition
(
ACM DL
)
BibTeX
Elisa Bertino
,
Elena Ferrari
,
Vijayalakshmi Atluri
:
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems.
65-104
Electronic Edition
(
ACM DL
)
BibTeX
Ravi S. Sandhu
,
Venkata Bhamidipati
,
Qamar Munawer
:
The ARBAC97 Model for Role-Based Administration of Roles.
105-135
Electronic Edition
(
ACM DL
)
BibTeX
Volume 2, Number 2, May 1999
Michael K. Reiter
,
Stuart G. Stubblebine
:
Authentication Metric Analysis and Design.
138-158
Electronic Edition
(
ACM DL
)
BibTeX
Bruce Schneier
,
John Kelsey
:
Secure Audit Logs to Support Computer Forensics.
159-176
Electronic Edition
(
ACM DL
)
BibTeX
Trent Jaeger
,
Atul Prakash
,
Jochen Liedtke
,
Nayeem Islam
:
Flexible Control of Downloaded Executable Content.
177-228
Electronic Edition
(
ACM DL
)
BibTeX
Volume 2, Number 3, August 1999
Shai Halevi
,
Hugo Krawczyk
:
Public-Key Cryptography and Password Protocols.
230-268
Electronic Edition
(
ACM DL
)
BibTeX
Jun Xu
,
Mukesh Singhal
:
Design of a High-Performance ATM Firewall.
269-294
Electronic Edition
(
ACM DL
)
BibTeX
Terran Lane
,
Carla E. Brodley
:
Temporal Sequence Learning and Data Reduction for Anomaly Detection.
295-331
Electronic Edition
(
ACM DL
)
BibTeX
Lawrence C. Paulson
:
Inductive Analysis of the Internet Protocol TLS.
332-351
Electronic Edition
(
ACM DL
)
BibTeX
Volume 2, Number 4, November 1999
Stuart G. Stubblebine
,
Paul F. Syverson
,
David M. Goldschlag
:
Unlinkable serial transactions: protocols and applications.
354-389
Electronic Edition
(
ACM DL
)
BibTeX
Eran Gabber
,
Phillip B. Gibbons
,
David M. Kristol
,
Yossi Matias
,
Alain J. Mayer
:
On secure and pseudonymous client-relationships with multiple servers.
390-415
Electronic Edition
(
ACM DL
)
BibTeX
Alejandro Hevia
,
Marcos A. Kiwi
:
Strength of two data encryption standard implementations under timing attacks.
416-437
Electronic Edition
(
ACM DL
)
BibTeX
Copyright ©
Sun May 17 00:26:03 2009 by
Michael Ley
(
ley@uni-trier.de
)