ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 3 Issue 4, Nov. 2000

Role-based authorization constraints specification
Gail-Joon Ahn, Ravi Sandhu
Pages: 207-226
DOI: 10.1145/382912.382913
Constraints are an important aspect of role-based access control (RBAC) and are often regarded as one of the principal motivations behind RBAC. Although the importance of contraints in RBAC has been recogni zed for a long time, they have not recieved...

A framework for constructing features and models for intrusion detection systems
Wenke Lee, Salvatore J. Stolfo
Pages: 227-261
DOI: 10.1145/382912.382914
Intrusion detection (ID) is an important component of infrastructure protection mechanisms. Intrusion detection systems (IDSs) need to be accurate, adaptive, and extensible. Given these requirements and the complexities of today's network...

Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
John McHugh
Pages: 262-294
DOI: 10.1145/382912.382923
In 1998 and again in 1999, the Lincoln Laboratory of MIT conducted a comparative evaluation of intrusion detection systems (IDSs) developed under DARPA funding. While this evaluation represents a significant and monumental undertaking, there are...