367 | -- | 397 | Francesco Bergadano, Daniele Gunetti, Claudia Picardi. User authentication through keystroke dynamics |
398 | -- | 437 | Michael M. Swift, Anne Hopkins, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Shannon Chan, Mario Goertzel, Gregory Jensenworth. Improving the granularity of access control for Windows 2000 |
438 | -- | 457 | Lawrence A. Gordon, Martin P. Loeb. The economics of information security investment |
458 | -- | 491 | Alan Harbitter, Daniel A. Menascé. A methodology for analyzing the performance of authentication protocols |
492 | -- | 540 | Jean Bacon, Ken Moody, Walt Yao. A model of OASIS role-based access control and its support for active security |