


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 12
Volume 12, Number 1, October 2008
- Steve Barker, Marek J. Sergot, Duminda Wijesekera:

Status-Based Access Control. 1:1-1:47 - Shouhuai Xu, Srdjan Capkun:

Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions. 2:1-2:37 - Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum:

New Multiparty Signature Schemes for Network Routing Applications. 3:1-3:39 - Wei Wang, Thomas E. Daniels:

A Graph Based Approach Toward Network Forensics Analysis. 4:1-4:33 - Joseph Y. Halpern, Kevin R. O'Neill:

Secrecy in Multiagent Systems. 5:1-5:47 - Danfeng Yao

, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Private Information: To Reveal or not to Reveal. 6:1-6:27
Volume 12, Number 2, December 2008
- Rebecca N. Wright, Sabrina De Capitani di Vimercati

:
Guest Editorial: Special Issue on Computer and Communications Security. 7:1-7:2 - Adam J. Lee

, Marianne Winslett:
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems. 8:1-8:33 - Philippe Golle, Frank McSherry, Ilya Mironov:

Data Collection with Self-Enforcing Privacy. 9:1-9:24 - Cristian Cadar

, Vijay Ganesh
, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
EXE: Automatically Generating Inputs of Death. 10:1-10:38 - XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil:

Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. 11:1-11:35 - Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis:

Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. 12:1-12:38 - Mengjun Xie

, Heng Yin
, Haining Wang:
Thwarting E-mail Spam Laundering. 13:1-13:32
Volume 12, Number 3, January 2009
- Zhenkai Liang

, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar:
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. 14:1-14:37 - Danfeng Yao

, Roberto Tamassia:
Compact and Anonymous Role-Based Authorization Chain. 15:1-15:27 - John Bethencourt, Dawn Xiaodong Song, Brent Waters:

New Techniques for Private Stream Searching. 16:1-16:32 - Scott A. Crosby, Dan S. Wallach, Rudolf H. Riedi:

Opportunities and Limits of Remote Timing Attacks. 17:1-17:29 - Mikhail J. Atallah, Marina Blanton

, Nelly Fazio, Keith B. Frikken:
Dynamic and Efficient Key Management for Access Hierarchies. 18:1-18:43 - Jay Ligatti, Lujo Bauer

, David Walker
:
Run-Time Enforcement of Nonsafety Policies. 19:1-19:41
Volume 12, Number 4, April 2009
- Ninghui Li, Qihua Wang, Mahesh V. Tripunitara:

Resiliency Policies in Access Control. 20:1-20:34 - Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik:

Universally Composable RFID Identification and Authentication Protocols. 21:1-21:33 - Serdar Cabuk, Carla E. Brodley, Clay Shields:

IP Covert Channel Detection. 22:1-22:29

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














