ACM Transactions on Information and System Security (TISSEC)
, Volume 3
Volume 3, Number 1, February 2000
Deborah A. Frincke
:
Balancing cooperation and risk in intrusion detection.
1-29
Electronic Edition
(
ACM DL
)
BibTeX
Fred B. Schneider
:
Enforceable security policies.
30-50
Electronic Edition
(
ACM DL
)
BibTeX
Diomidis Spinellis
:
Reflection as a mechanism for software integrity verification.
51-62
Electronic Edition
(
ACM DL
)
BibTeX
Volume 3, Number 2, May 2000
Shlomi Dolev
,
Rafail Ostrovsky
:
Xor-trees for efficient anonymous multicast and reception.
63-84
Electronic Edition
(
ACM DL
)
BibTeX
Sylvia L. Osborn
,
Ravi S. Sandhu
,
Qamar Munawer
:
Configuring role-based access control to enforce mandatory and discretionary access control policies.
85-106
Electronic Edition
(
ACM DL
)
BibTeX
Avishai Wool
:
Key management for encrypted broadcast.
107-134
Electronic Edition
(
ACM DL
)
BibTeX
Volume 3, Number 3, August 2000
Refik Molva
,
Alain Pannetrat
:
Scalable multicast security with dynamic recipient groups.
136-160
Electronic Edition
(
ACM DL
)
BibTeX
Ronald Cramer
,
Victor Shoup
:
Signature schemes based on the strong RSA assumption.
161-185
Electronic Edition
(
ACM DL
)
BibTeX
Stefan Axelsson
:
The base-rate fallacy and the difficulty of intrusion detection.
186-205
Electronic Edition
(
ACM DL
)
BibTeX
Volume 3, Number 4, November 2000
Gail-Joon Ahn
,
Ravi S. Sandhu
:
Role-based authorization constraints specification.
207-226
Electronic Edition
(
ACM DL
)
BibTeX
Wenke Lee
,
Salvatore J. Stolfo
:
A framework for constructing features and models for intrusion detection systems.
227-261
Electronic Edition
(
ACM DL
)
BibTeX
John McHugh
:
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory.
262-294
Electronic Edition
(
ACM DL
)
BibTeX
Copyright ©
Sun May 17 00:26:03 2009 by
Michael Ley
(
ley@uni-trier.de
)