researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: ACM Trans. Inf. Syst. Secur.
Home
Index
Info
Volume
Volume
2
, Issue
4
354
--
389
Stuart G. Stubblebine
,
Paul F. Syverson
,
David M. Goldschlag
.
Unlinkable serial transactions: protocols and applications
390
--
415
Eran Gabber
,
Phillip B. Gibbons
,
David M. Kristol
,
Yossi Matias
,
Alain J. Mayer
.
On secure and pseudonymous client-relationships with multiple servers
416
--
437
Alejandro Hevia
,
Marcos A. Kiwi
.
Strength of two data encryption standard implementations under timing attacks
Volume
2
, Issue
3
230
--
268
Shai Halevi
,
Hugo Krawczyk
.
Public-Key Cryptography and Password Protocols
269
--
294
Jun Xu
,
Mukesh Singhal
.
Design of a High-Performance ATM Firewall
295
--
331
Terran Lane
,
Carla E. Brodley
.
Temporal Sequence Learning and Data Reduction for Anomaly Detection
332
--
351
Lawrence C. Paulson
.
Inductive Analysis of the Internet Protocol TLS
Volume
2
, Issue
2
138
--
158
Michael K. Reiter
,
Stuart G. Stubblebine
.
Authentication Metric Analysis and Design
159
--
176
Bruce Schneier
,
John Kelsey
.
Secure Audit Logs to Support Computer Forensics
177
--
228
Trent Jaeger
,
Atul Prakash
,
Jochen Liedtke
,
Nayeem Islam
.
Flexible Control of Downloaded Executable Content
Volume
2
, Issue
1
1
--
2
Ravi S. Sandhu
.
Editorial
3
--
33
Matunda Nyanchama
,
Sylvia L. Osborn
.
The Role Graph Model and Conflict of Interest
34
--
64
David F. Ferraiolo
,
John F. Barkley
,
D. Richard Kuhn
.
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet
65
--
104
Elisa Bertino
,
Elena Ferrari
,
Vijayalakshmi Atluri
.
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
105
--
135
Ravi S. Sandhu
,
Venkata Bhamidipati
,
Qamar Munawer
.
The ARBAC97 Model for Role-Based Administration of Roles