Journal: ACM Trans. Inf. Syst. Secur.

Volume 3, Issue 4

207 -- 226Gail-Joon Ahn, Ravi S. Sandhu. Role-based authorization constraints specification
227 -- 261Wenke Lee, Salvatore J. Stolfo. A framework for constructing features and models for intrusion detection systems
262 -- 294John McHugh. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory

Volume 3, Issue 3

136 -- 160Refik Molva, Alain Pannetrat. Scalable multicast security with dynamic recipient groups
161 -- 185Ronald Cramer, Victor Shoup. Signature schemes based on the strong RSA assumption
186 -- 205Stefan Axelsson. The base-rate fallacy and the difficulty of intrusion detection

Volume 3, Issue 2

63 -- 84Shlomi Dolev, Rafail Ostrovsky. Xor-trees for efficient anonymous multicast and reception
85 -- 106Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies
107 -- 134Avishai Wool. Key management for encrypted broadcast

Volume 3, Issue 1

1 -- 29Deborah A. Frincke. Balancing cooperation and risk in intrusion detection
30 -- 50Fred B. Schneider. Enforceable security policies
51 -- 62Diomidis Spinellis. Reflection as a mechanism for software integrity verification