default search action
ACM Transactions on Information and System Security (TISSEC), Volume 5
Volume 5, Number 1, February 2002
- Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati:
An algebra for composing access control policies. 1-35 - Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini:
Remus: a security-enhanced operating system. 36-61 - Vijayalakshmi Atluri, Avigdor Gal:
An authorization model for temporal and derived data: securing information portals. 62-94
Volume 5, Number 2, May 2002
- Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Trust management for IPsec. 95-118 - Drew Dean, Matthew K. Franklin, Adam Stubblefield:
An algebraic approach to IP traceback. 119-137 - Algis Rudys, Dan S. Wallach:
Termination in language-based systems. 138-168 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati:
A fine-grained access control system for XML documents. 169-202
Volume 5, Number 3, August 2002
- Christoph C. Michael, Anup K. Ghosh:
Simple, state-based approaches to program-based anomaly detection. 203-237 - John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw:
Token-based scanning of source code for security problems. 238-261 - Joe Loughry, David A. Umphress:
Information leakage from optical emanations. 262-289 - Elisa Bertino, Elena Ferrari:
Secure and selective dissemination of XML documents. 290-331 - Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
A graph-based formalism for RBAC. 332-365
Volume 5, Number 4, November 2002
- Francesco Bergadano, Daniele Gunetti, Claudia Picardi:
User authentication through keystroke dynamics. 367-397 - Michael M. Swift, Anne Hopkins, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Shannon Chan, Mario Goertzel, Gregory Jensenworth:
Improving the granularity of access control for Windows 2000. 398-437 - Lawrence A. Gordon, Martin P. Loeb:
The economics of information security investment. 438-457 - Alan Harbitter, Daniel A. Menascé:
A methodology for analyzing the performance of authentication protocols. 458-491 - Jean Bacon, Ken Moody, Walt Yao:
A model of OASIS role-based access control and its support for active security. 492-540
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.