Search dblp for Publications

export results for "toc:db/journals/tissec/tissec12.bht:"

 download as .bib file

@article{DBLP:journals/tissec/AtallahBFF09,
  author       = {Mikhail J. Atallah and
                  Marina Blanton and
                  Nelly Fazio and
                  Keith B. Frikken},
  title        = {Dynamic and Efficient Key Management for Access Hierarchies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {18:1--18:43},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455531},
  doi          = {10.1145/1455526.1455531},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AtallahBFF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BethencourtSW09,
  author       = {John Bethencourt and
                  Dawn Xiaodong Song and
                  Brent Waters},
  title        = {New Techniques for Private Stream Searching},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {16:1--16:32},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455529},
  doi          = {10.1145/1455526.1455529},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BethencourtSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BurmesterLMT09,
  author       = {Mike Burmester and
                  Tri Van Le and
                  Breno de Medeiros and
                  Gene Tsudik},
  title        = {Universally Composable {RFID} Identification and Authentication Protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {21:1--21:33},
  year         = {2009},
  url          = {https://doi.org/10.1145/1513601.1513603},
  doi          = {10.1145/1513601.1513603},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BurmesterLMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CabukBS09,
  author       = {Serdar Cabuk and
                  Carla E. Brodley and
                  Clay Shields},
  title        = {{IP} Covert Channel Detection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {22:1--22:29},
  year         = {2009},
  url          = {https://doi.org/10.1145/1513601.1513604},
  doi          = {10.1145/1513601.1513604},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CabukBS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CrosbyWR09,
  author       = {Scott A. Crosby and
                  Dan S. Wallach and
                  Rudolf H. Riedi},
  title        = {Opportunities and Limits of Remote Timing Attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {17:1--17:29},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455530},
  doi          = {10.1145/1455526.1455530},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CrosbyWR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiWT09,
  author       = {Ninghui Li and
                  Qihua Wang and
                  Mahesh V. Tripunitara},
  title        = {Resiliency Policies in Access Control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {20:1--20:34},
  year         = {2009},
  url          = {https://doi.org/10.1145/1513601.1513602},
  doi          = {10.1145/1513601.1513602},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiWT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiangSVS09,
  author       = {Zhenkai Liang and
                  Weiqing Sun and
                  V. N. Venkatakrishnan and
                  R. Sekar},
  title        = {Alcatraz: An Isolated Environment for Experimenting with Untrusted
                  Software},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {14:1--14:37},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455527},
  doi          = {10.1145/1455526.1455527},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LiangSVS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LigattiBW09,
  author       = {Jay Ligatti and
                  Lujo Bauer and
                  David Walker},
  title        = {Run-Time Enforcement of Nonsafety Policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {19:1--19:41},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455532},
  doi          = {10.1145/1455526.1455532},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LigattiBW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YaoT09,
  author       = {Danfeng Yao and
                  Roberto Tamassia},
  title        = {Compact and Anonymous Role-Based Authorization Chain},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {15:1--15:27},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455528},
  doi          = {10.1145/1455526.1455528},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YaoT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AntonatosALA08,
  author       = {Spyros Antonatos and
                  Periklis Akritidis and
                  Vinh The Lam and
                  Kostas G. Anagnostakis},
  title        = {Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {12:1--12:38},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1477941},
  doi          = {10.1145/1455518.1477941},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AntonatosALA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BarkerSW08,
  author       = {Steve Barker and
                  Marek J. Sergot and
                  Duminda Wijesekera},
  title        = {Status-Based Access Control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {1:1--1:47},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410235},
  doi          = {10.1145/1410234.1410235},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BarkerSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BoldyrevaGOY08,
  author       = {Alexandra Boldyreva and
                  Craig Gentry and
                  Adam O'Neill and
                  Dae Hyun Yum},
  title        = {New Multiparty Signature Schemes for Network Routing Applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {3:1--3:39},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410237},
  doi          = {10.1145/1410234.1410237},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BoldyrevaGOY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CadarGPDE08,
  author       = {Cristian Cadar and
                  Vijay Ganesh and
                  Peter M. Pawlowski and
                  David L. Dill and
                  Dawson R. Engler},
  title        = {{EXE:} Automatically Generating Inputs of Death},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {10:1--10:38},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455522},
  doi          = {10.1145/1455518.1455522},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CadarGPDE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GolleMM08,
  author       = {Philippe Golle and
                  Frank McSherry and
                  Ilya Mironov},
  title        = {Data Collection with Self-Enforcing Privacy},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {9:1--9:24},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1477940},
  doi          = {10.1145/1455518.1477940},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/GolleMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HalpernO08,
  author       = {Joseph Y. Halpern and
                  Kevin R. O'Neill},
  title        = {Secrecy in Multiagent Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {5:1--5:47},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410239},
  doi          = {10.1145/1410234.1410239},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HalpernO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeeW08,
  author       = {Adam J. Lee and
                  Marianne Winslett},
  title        = {Enforcing Safety and Consistency Constraints in Policy-Based Authorization
                  Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {8:1--8:33},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455520},
  doi          = {10.1145/1455518.1455520},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LeeW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangD08,
  author       = {Wei Wang and
                  Thomas E. Daniels},
  title        = {A Graph Based Approach Toward Network Forensics Analysis},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {4:1--4:33},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410238},
  doi          = {10.1145/1410234.1410238},
  timestamp    = {Wed, 29 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WangD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangLCXRK08,
  author       = {XiaoFeng Wang and
                  Zhuowei Li and
                  Jong Youl Choi and
                  Jun Xu and
                  Michael K. Reiter and
                  Chongkyung Kil},
  title        = {Fast and Black-box Exploit Detection and Signature Generation for
                  Commodity Software},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {11:1--11:35},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455523},
  doi          = {10.1145/1455518.1455523},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WangLCXRK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WrightV08,
  author       = {Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Guest Editorial: Special Issue on Computer and Communications Security},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {7:1--7:2},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455519},
  doi          = {10.1145/1455518.1455519},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WrightV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/XieYW08,
  author       = {Mengjun Xie and
                  Heng Yin and
                  Haining Wang},
  title        = {Thwarting E-mail Spam Laundering},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {13:1--13:32},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455525},
  doi          = {10.1145/1455518.1455525},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/XieYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/XuC08,
  author       = {Shouhuai Xu and
                  Srdjan Capkun},
  title        = {Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework
                  and Constructions},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {2:1--2:37},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410236},
  doi          = {10.1145/1410234.1410236},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/XuC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YaoFAT08,
  author       = {Danfeng Yao and
                  Keith B. Frikken and
                  Mikhail J. Atallah and
                  Roberto Tamassia},
  title        = {Private Information: To Reveal or not to Reveal},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {6:1--6:27},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410240},
  doi          = {10.1145/1410234.1410240},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YaoFAT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics