Journal: ACM Trans. Inf. Syst. Secur.

Volume 5, Issue 4

367 -- 397Francesco Bergadano, Daniele Gunetti, Claudia Picardi. User authentication through keystroke dynamics
398 -- 437Michael M. Swift, Anne Hopkins, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Shannon Chan, Mario Goertzel, Gregory Jensenworth. Improving the granularity of access control for Windows 2000
438 -- 457Lawrence A. Gordon, Martin P. Loeb. The economics of information security investment
458 -- 491Alan Harbitter, Daniel A. Menascé. A methodology for analyzing the performance of authentication protocols
492 -- 540Jean Bacon, Ken Moody, Walt Yao. A model of OASIS role-based access control and its support for active security