default search action
ACM Transactions on Information and System Security (TISSEC), Volume 3
Volume 3, Number 1, February 2000
- Deborah A. Frincke:
Balancing cooperation and risk in intrusion detection. 1-29 - Fred B. Schneider:
Enforceable security policies. 30-50 - Diomidis Spinellis:
Reflection as a mechanism for software integrity verification. 51-62
Volume 3, Number 2, May 2000
- Shlomi Dolev, Rafail Ostrovsky:
Xor-trees for efficient anonymous multicast and reception. 63-84 - Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer:
Configuring role-based access control to enforce mandatory and discretionary access control policies. 85-106 - Avishai Wool:
Key management for encrypted broadcast. 107-134
Volume 3, Number 3, August 2000
- Refik Molva, Alain Pannetrat:
Scalable multicast security with dynamic recipient groups. 136-160 - Ronald Cramer, Victor Shoup:
Signature schemes based on the strong RSA assumption. 161-185 - Stefan Axelsson:
The base-rate fallacy and the difficulty of intrusion detection. 186-205
Volume 3, Number 4, November 2000
- Gail-Joon Ahn, Ravi S. Sandhu:
Role-based authorization constraints specification. 207-226 - Wenke Lee, Salvatore J. Stolfo:
A framework for constructing features and models for intrusion detection systems. 227-261 - John McHugh:
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. 262-294
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.