default search action
ACM Transactions on Information and System Security (TISSEC), Volume 12
Volume 12, Number 1, October 2008
- Steve Barker, Marek J. Sergot, Duminda Wijesekera:
Status-Based Access Control. 1:1-1:47 - Shouhuai Xu, Srdjan Capkun:
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions. 2:1-2:37 - Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum:
New Multiparty Signature Schemes for Network Routing Applications. 3:1-3:39 - Wei Wang, Thomas E. Daniels:
A Graph Based Approach Toward Network Forensics Analysis. 4:1-4:33 - Joseph Y. Halpern, Kevin R. O'Neill:
Secrecy in Multiagent Systems. 5:1-5:47 - Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Private Information: To Reveal or not to Reveal. 6:1-6:27
Volume 12, Number 2, December 2008
- Rebecca N. Wright, Sabrina De Capitani di Vimercati:
Guest Editorial: Special Issue on Computer and Communications Security. 7:1-7:2 - Adam J. Lee, Marianne Winslett:
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems. 8:1-8:33 - Philippe Golle, Frank McSherry, Ilya Mironov:
Data Collection with Self-Enforcing Privacy. 9:1-9:24 - Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
EXE: Automatically Generating Inputs of Death. 10:1-10:38 - XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil:
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. 11:1-11:35 - Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis:
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. 12:1-12:38 - Mengjun Xie, Heng Yin, Haining Wang:
Thwarting E-mail Spam Laundering. 13:1-13:32
Volume 12, Number 3, January 2009
- Zhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar:
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. 14:1-14:37 - Danfeng Yao, Roberto Tamassia:
Compact and Anonymous Role-Based Authorization Chain. 15:1-15:27 - John Bethencourt, Dawn Xiaodong Song, Brent Waters:
New Techniques for Private Stream Searching. 16:1-16:32 - Scott A. Crosby, Dan S. Wallach, Rudolf H. Riedi:
Opportunities and Limits of Remote Timing Attacks. 17:1-17:29 - Mikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken:
Dynamic and Efficient Key Management for Access Hierarchies. 18:1-18:43 - Jay Ligatti, Lujo Bauer, David Walker:
Run-Time Enforcement of Nonsafety Policies. 19:1-19:41
Volume 12, Number 4, April 2009
- Ninghui Li, Qihua Wang, Mahesh V. Tripunitara:
Resiliency Policies in Access Control. 20:1-20:34 - Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik:
Universally Composable RFID Identification and Authentication Protocols. 21:1-21:33 - Serdar Cabuk, Carla E. Brodley, Clay Shields:
IP Covert Channel Detection. 22:1-22:29
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.