


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 5
Volume 5, Number 1, February 2002
- Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati:

An algebra for composing access control policies. 1-35 - Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini

:
Remus: a security-enhanced operating system. 36-61 - Vijayalakshmi Atluri

, Avigdor Gal:
An authorization model for temporal and derived data: securing information portals. 62-94
Volume 5, Number 2, May 2002
- Matt Blaze, John Ioannidis, Angelos D. Keromytis:

Trust management for IPsec. 95-118 - Drew Dean, Matthew K. Franklin, Adam Stubblefield:

An algebraic approach to IP traceback. 119-137 - Algis Rudys, Dan S. Wallach:

Termination in language-based systems. 138-168 - Ernesto Damiani

, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati:
A fine-grained access control system for XML documents. 169-202
Volume 5, Number 3, August 2002
- Christoph C. Michael, Anup K. Ghosh:

Simple, state-based approaches to program-based anomaly detection. 203-237 - John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw:

Token-based scanning of source code for security problems. 238-261 - Joe Loughry

, David A. Umphress:
Information leakage from optical emanations. 262-289 - Elisa Bertino, Elena Ferrari

:
Secure and selective dissemination of XML documents. 290-331 - Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:

A graph-based formalism for RBAC. 332-365
Volume 5, Number 4, November 2002
- Francesco Bergadano

, Daniele Gunetti
, Claudia Picardi:
User authentication through keystroke dynamics. 367-397 - Michael M. Swift, Anne Hopkins, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Shannon Chan, Mario Goertzel, Gregory Jensenworth:

Improving the granularity of access control for Windows 2000. 398-437 - Lawrence A. Gordon, Martin P. Loeb:

The economics of information security investment. 438-457 - Alan Harbitter, Daniel A. Menascé:

A methodology for analyzing the performance of authentication protocols. 458-491 - Jean Bacon, Ken Moody, Walt Yao:

A model of OASIS role-based access control and its support for active security. 492-540

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














