


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 3
Volume 3, Number 1, February 2000
- Deborah A. Frincke:

Balancing cooperation and risk in intrusion detection. 1-29 - Fred B. Schneider:

Enforceable security policies. 30-50 - Diomidis Spinellis:

Reflection as a mechanism for software integrity verification. 51-62
Volume 3, Number 2, May 2000
- Shlomi Dolev

, Rafail Ostrovsky
:
Xor-trees for efficient anonymous multicast and reception. 63-84 - Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer:

Configuring role-based access control to enforce mandatory and discretionary access control policies. 85-106 - Avishai Wool

:
Key management for encrypted broadcast. 107-134
Volume 3, Number 3, August 2000
- Refik Molva

, Alain Pannetrat:
Scalable multicast security with dynamic recipient groups. 136-160 - Ronald Cramer, Victor Shoup:

Signature schemes based on the strong RSA assumption. 161-185 - Stefan Axelsson:

The base-rate fallacy and the difficulty of intrusion detection. 186-205
Volume 3, Number 4, November 2000
- Gail-Joon Ahn

, Ravi S. Sandhu:
Role-based authorization constraints specification. 207-226 - Wenke Lee, Salvatore J. Stolfo:

A framework for constructing features and models for intrusion detection systems. 227-261 - John McHugh:

Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. 262-294

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














