Journal: ACM Trans. Inf. Syst. Secur.

Volume 4, Issue 4

321 -- 370Elisa Bertino, Barbara Catania, Elena Ferrari. A nested transaction model for multilevel secure database management systems
371 -- 406Kim Potter Kihlstrom, Louise E. Moser, P. M. Melliar-Smith. The SecureRing group communication system
407 -- 452Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang. Abstraction-based intrusion detection in distributed environments
453 -- 482Pierangela Samarati, Michael K. Reiter, Sushil Jajodia. An authorization model for a public key management service

Volume 4, Issue 3

191 -- 233Elisa Bertino, Piero A. Bonatti, Elena Ferrari. TRBAC: A temporal role-based access control model
224 -- 274David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli. Proposed NIST standard for role-based access control
275 -- 288Burton S. Kaliski Jr.. An unknown key-share attack on the MQV key agreement protocol
289 -- 319Ohad Rodeh, Kenneth P. Birman, Danny Dolev. The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle

Volume 4, Issue 2

103 -- 133Deborah Shands, Jay Jacobs, Richard Yee, E. John Sebes. Secure virtual enclaves: Supporting coalition use of distributed application technologies
134 -- 157Michael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner. Secure password-based cipher suite for TLS
158 -- 190Trent Jaeger, Jonathon Tidswell. Practical safety in flexible access control models

Volume 4, Issue 1

1 -- 36Ho-Yen Chang, Shyhtsun Felix Wu, Y. Frank Jou. Real-time protocol analysis for detecting link-state routing protocol attacks
37 -- 71Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn. Role-based access control on the web
72 -- 101Richard E. Smith. Cost profile of a highly assured, secure operating system