researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: ACM Trans. Inf. Syst. Secur.
Home
Index
Info
Volume
Volume
3
, Issue
4
207
--
226
Gail-Joon Ahn
,
Ravi S. Sandhu
.
Role-based authorization constraints specification
227
--
261
Wenke Lee
,
Salvatore J. Stolfo
.
A framework for constructing features and models for intrusion detection systems
262
--
294
John McHugh
.
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
Volume
3
, Issue
3
136
--
160
Refik Molva
,
Alain Pannetrat
.
Scalable multicast security with dynamic recipient groups
161
--
185
Ronald Cramer
,
Victor Shoup
.
Signature schemes based on the strong RSA assumption
186
--
205
Stefan Axelsson
.
The base-rate fallacy and the difficulty of intrusion detection
Volume
3
, Issue
2
63
--
84
Shlomi Dolev
,
Rafail Ostrovsky
.
Xor-trees for efficient anonymous multicast and reception
85
--
106
Sylvia L. Osborn
,
Ravi S. Sandhu
,
Qamar Munawer
.
Configuring role-based access control to enforce mandatory and discretionary access control policies
107
--
134
Avishai Wool
.
Key management for encrypted broadcast
Volume
3
, Issue
1
1
--
29
Deborah A. Frincke
.
Balancing cooperation and risk in intrusion detection
30
--
50
Fred B. Schneider
.
Enforceable security policies
51
--
62
Diomidis Spinellis
.
Reflection as a mechanism for software integrity verification