Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 3 Issue 1, Feb. 2000

Balancing cooperation and risk in intrusion detection
Deborah Frincke
Pages: 1-29
DOI: 10.1145/353323.353324
Early systems for networked intrusion detection (or, more generally, intrusion or misuse management) required either a centralized architecture or a centralized decision-making point, even when the data gathering was distributed. More recently,...

Enforceable security policies
Fred B. Schneider
Pages: 30-50
DOI: 10.1145/353323.353382
A precise characterization is given for the class of security policies enforceable with mechanisms that work by monitoring system execution, and automata are introduced for specifying exactly that class of security policies. Techniques to...

Reflection as a mechanism for software integrity verification
Diomidis Spinellis
Pages: 51-62
DOI: 10.1145/353323.353383
The integrity verification of a device's controlling software is an important aspect of many emerging information appliances. We propose the use of reflection, whereby the software is able to examine its own operation, in conjunction with...