


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 2
Volume 2, Number 1, February 1999
- Ravi S. Sandhu:

Editorial. 1-2 - Matunda Nyanchama, Sylvia L. Osborn:

The Role Graph Model and Conflict of Interest. 3-33 - David F. Ferraiolo, John F. Barkley, D. Richard Kuhn:

A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. 34-64 - Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri:

The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. 65-104 - Ravi S. Sandhu, Venkata Bhamidipati, Qamar Munawer:

The ARBAC97 Model for Role-Based Administration of Roles. 105-135
Volume 2, Number 2, May 1999
- Michael K. Reiter, Stuart G. Stubblebine:

Authentication Metric Analysis and Design. 138-158 - Bruce Schneier, John Kelsey

:
Secure Audit Logs to Support Computer Forensics. 159-176 - Trent Jaeger, Atul Prakash

, Jochen Liedtke, Nayeem Islam:
Flexible Control of Downloaded Executable Content. 177-228
Volume 2, Number 3, August 1999
- Shai Halevi, Hugo Krawczyk:

Public-Key Cryptography and Password Protocols. 230-268 - Jun Xu, Mukesh Singhal:

Design of a High-Performance ATM Firewall. 269-294 - Terran Lane, Carla E. Brodley:

Temporal Sequence Learning and Data Reduction for Anomaly Detection. 295-331 - Lawrence C. Paulson:

Inductive Analysis of the Internet Protocol TLS. 332-351
Volume 2, Number 4, November 1999
- Stuart G. Stubblebine, Paul F. Syverson, David M. Goldschlag:

Unlinkable serial transactions: protocols and applications. 354-389 - Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer:

On secure and pseudonymous client-relationships with multiple servers. 390-415 - Alejandro Hevia

, Marcos A. Kiwi:
Strength of two data encryption standard implementations under timing attacks. 416-437

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














