Journal: ACM Trans. Inf. Syst. Secur.

Volume 2, Issue 4

354 -- 389Stuart G. Stubblebine, Paul F. Syverson, David M. Goldschlag. Unlinkable serial transactions: protocols and applications
390 -- 415Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer. On secure and pseudonymous client-relationships with multiple servers
416 -- 437Alejandro Hevia, Marcos A. Kiwi. Strength of two data encryption standard implementations under timing attacks

Volume 2, Issue 3

230 -- 268Shai Halevi, Hugo Krawczyk. Public-Key Cryptography and Password Protocols
269 -- 294Jun Xu, Mukesh Singhal. Design of a High-Performance ATM Firewall
295 -- 331Terran Lane, Carla E. Brodley. Temporal Sequence Learning and Data Reduction for Anomaly Detection
332 -- 351Lawrence C. Paulson. Inductive Analysis of the Internet Protocol TLS

Volume 2, Issue 2

138 -- 158Michael K. Reiter, Stuart G. Stubblebine. Authentication Metric Analysis and Design
159 -- 176Bruce Schneier, John Kelsey. Secure Audit Logs to Support Computer Forensics
177 -- 228Trent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam. Flexible Control of Downloaded Executable Content

Volume 2, Issue 1

1 -- 2Ravi S. Sandhu. Editorial
3 -- 33Matunda Nyanchama, Sylvia L. Osborn. The Role Graph Model and Conflict of Interest
34 -- 64David F. Ferraiolo, John F. Barkley, D. Richard Kuhn. A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet
65 -- 104Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
105 -- 135Ravi S. Sandhu, Venkata Bhamidipati, Qamar Munawer. The ARBAC97 Model for Role-Based Administration of Roles