ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 4 Issue 1, Feb. 2001

Real-time protocol analysis for detecting link-state routing protocol attacks
Ho-Yen Chang, S. Felix Wu, Y. Frank Jou
Pages: 1-36
DOI: 10.1145/383775.383776
A real-time knowledge-based network intrusion-detection model for a link-state routing protocol is presented for the OSPF protocol. This model includes three layers: a data process layer to parse packets and...

Role-based access control on the web
Joon S. Park, Ravi Sandhu, Gail-Joon Ahn
Pages: 37-71
DOI: 10.1145/383775.383777
Current approaches to access control on the Web servers do not scale to enterprise-wide systems because they are mostly based on individual user identities. Hence we were motivated by the need to manage and enforce the strong and efficient RBAC...

Cost profile of a highly assured, secure operating system
Richard E. Smith
Pages: 72-101
DOI: 10.1145/383775.383778
The Logical Coprocessing Kernel (LOCK) began as a research project to stretch the state of the art in secure computing by trying to meet or even exceed the “A1” requirements of the Trusted Computer System Evaluation Criteria (TCSEC)....