default search action
ACM Transactions on Information and System Security (TISSEC), Volume 2
Volume 2, Number 1, February 1999
- Ravi S. Sandhu:
Editorial. 1-2 - Matunda Nyanchama, Sylvia L. Osborn:
The Role Graph Model and Conflict of Interest. 3-33 - David F. Ferraiolo, John F. Barkley, D. Richard Kuhn:
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. 34-64 - Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri:
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. 65-104 - Ravi S. Sandhu, Venkata Bhamidipati, Qamar Munawer:
The ARBAC97 Model for Role-Based Administration of Roles. 105-135
Volume 2, Number 2, May 1999
- Michael K. Reiter, Stuart G. Stubblebine:
Authentication Metric Analysis and Design. 138-158 - Bruce Schneier, John Kelsey:
Secure Audit Logs to Support Computer Forensics. 159-176 - Trent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam:
Flexible Control of Downloaded Executable Content. 177-228
Volume 2, Number 3, August 1999
- Shai Halevi, Hugo Krawczyk:
Public-Key Cryptography and Password Protocols. 230-268 - Jun Xu, Mukesh Singhal:
Design of a High-Performance ATM Firewall. 269-294 - Terran Lane, Carla E. Brodley:
Temporal Sequence Learning and Data Reduction for Anomaly Detection. 295-331 - Lawrence C. Paulson:
Inductive Analysis of the Internet Protocol TLS. 332-351
Volume 2, Number 4, November 1999
- Stuart G. Stubblebine, Paul F. Syverson, David M. Goldschlag:
Unlinkable serial transactions: protocols and applications. 354-389 - Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer:
On secure and pseudonymous client-relationships with multiple servers. 390-415 - Alejandro Hevia, Marcos A. Kiwi:
Strength of two data encryption standard implementations under timing attacks. 416-437
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.