Journal: ACM Trans. Inf. Syst. Secur.

Volume 3, Issue 4

207 -- 226Gail-Joon Ahn, Ravi S. Sandhu. Role-based authorization constraints specification
227 -- 261Wenke Lee, Salvatore J. Stolfo. A framework for constructing features and models for intrusion detection systems
262 -- 294John McHugh. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory