


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 4
Volume 4, Number 1, February 2001
- Ho-Yen Chang, Shyhtsun Felix Wu, Y. Frank Jou:

Real-time protocol analysis for detecting link-state routing protocol attacks. 1-36 - Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn

:
Role-based access control on the web. 37-71 - Richard E. Smith:

Cost profile of a highly assured, secure operating system. 72-101
Volume 4, Number 2, May 2001
- Deborah Shands, Jay Jacobs, Richard Yee, E. John Sebes:

Secure virtual enclaves: Supporting coalition use of distributed application technologies. 103-133 - Michael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner

:
Secure password-based cipher suite for TLS. 134-157 - Trent Jaeger, Jonathon Tidswell:

Practical safety in flexible access control models. 158-190
Volume 4, Number 3, August 2001
- Elisa Bertino, Piero A. Bonatti, Elena Ferrari

:
TRBAC: A temporal role-based access control model. 191-233 - David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli

:
Proposed NIST standard for role-based access control. 224-274 - Burton S. Kaliski Jr.:

An unknown key-share attack on the MQV key agreement protocol. 275-288 - Ohad Rodeh, Kenneth P. Birman

, Danny Dolev:
The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle. 289-319
Volume 4, Number 4, November 2001
- Elisa Bertino, Barbara Catania, Elena Ferrari

:
A nested transaction model for multilevel secure database management systems. 321-370 - Kim Potter Kihlstrom, Louise E. Moser, P. M. Melliar-Smith:

The SecureRing group communication system. 371-406 - Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang:

Abstraction-based intrusion detection in distributed environments. 407-452 - Pierangela Samarati

, Michael K. Reiter, Sushil Jajodia:
An authorization model for a public key management service. 453-482

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














