Journal: ACM Trans. Inf. Syst. Secur.

Volume 5, Issue 3

203 -- 237Christoph C. Michael, Anup K. Ghosh. Simple, state-based approaches to program-based anomaly detection
238 -- 261John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw. Token-based scanning of source code for security problems
262 -- 289Joe Loughry, David A. Umphress. Information leakage from optical emanations
290 -- 331Elisa Bertino, Elena Ferrari. Secure and selective dissemination of XML documents
332 -- 365Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce. A graph-based formalism for RBAC