researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: ACM Trans. Inf. Syst. Secur.
Home
Index
Info
Volume
Volume
4
, Issue
4
321
--
370
Elisa Bertino
,
Barbara Catania
,
Elena Ferrari
.
A nested transaction model for multilevel secure database management systems
371
--
406
Kim Potter Kihlstrom
,
Louise E. Moser
,
P. M. Melliar-Smith
.
The SecureRing group communication system
407
--
452
Peng Ning
,
Sushil Jajodia
,
Xiaoyang Sean Wang
.
Abstraction-based intrusion detection in distributed environments
453
--
482
Pierangela Samarati
,
Michael K. Reiter
,
Sushil Jajodia
.
An authorization model for a public key management service
Volume
4
, Issue
3
191
--
233
Elisa Bertino
,
Piero A. Bonatti
,
Elena Ferrari
.
TRBAC: A temporal role-based access control model
224
--
274
David F. Ferraiolo
,
Ravi S. Sandhu
,
Serban I. Gavrila
,
D. Richard Kuhn
,
Ramaswamy Chandramouli
.
Proposed NIST standard for role-based access control
275
--
288
Burton S. Kaliski Jr.
.
An unknown key-share attack on the MQV key agreement protocol
289
--
319
Ohad Rodeh
,
Kenneth P. Birman
,
Danny Dolev
.
The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle
Volume
4
, Issue
2
103
--
133
Deborah Shands
,
Jay Jacobs
,
Richard Yee
,
E. John Sebes
.
Secure virtual enclaves: Supporting coalition use of distributed application technologies
134
--
157
Michael Steiner
,
Peter Buhler
,
Thomas Eirich
,
Michael Waidner
.
Secure password-based cipher suite for TLS
158
--
190
Trent Jaeger
,
Jonathon Tidswell
.
Practical safety in flexible access control models
Volume
4
, Issue
1
1
--
36
Ho-Yen Chang
,
Shyhtsun Felix Wu
,
Y. Frank Jou
.
Real-time protocol analysis for detecting link-state routing protocol attacks
37
--
71
Joon S. Park
,
Ravi S. Sandhu
,
Gail-Joon Ahn
.
Role-based access control on the web
72
--
101
Richard E. Smith
.
Cost profile of a highly assured, secure operating system