


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 10
Volume 10, Number 1, February 2007
- Gail-Joon Ahn
:
Guest editorial: Special issue on access control models and technologies. 1 - Maria Luisa Damiani, Elisa Bertino, Barbara Catania, Paolo Perlasca
:
GEO-RBAC: A spatially aware RBAC. 2 - Mizuho Iwaihara, Ryotaro Hayashi, Somchai Chatvichienchai, Chutiporn Anutariya
, Vilas Wuwongse:
Relevancy-based access control and its evaluation on versioned XML documents. 3 - Jingmin Zhou, Mark R. Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop
:
Modeling network intrusion detection alerts for correlation. 4
Volume 10, Number 2, May 2007
- Ninghui Li, Mahesh V. Tripunitara, Ziad Bizri:
On mutually exclusive roles and separation-of-duty. 5 - Kun Peng, Colin Boyd, Ed Dawson
:
Batch zero-knowledge proof and verification and its applications. 6 - Tanvir Ahmed, Anand R. Tripathi:
Specification and verification of security requirements in a programming model for decentralized CSCW systems. 7 - Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon:
Secure sessions for Web services. 8
Volume 10, Number 3, July 2007
- Martín Abadi, Bruno Blanchet, Cédric Fournet:
Just fast keying in the pi calculus. 9 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval
:
Provably secure authenticated group Diffie-Hellman key exchange. 10 - Paul C. van Oorschot
, Tao Wan, Evangelos Kranakis
:
On interdomain routing security and pretty secure BGP (psBGP). 11 - Anna Cinzia Squicciarini
, Elisa Bertino, Elena Ferrari
, Federica Paci
, Bhavani Thuraisingham:
PP-trust-X: A system for privacy preserving trust negotiations. 12
Volume 10, Number 4, January 2008
- Deepayan Chakrabarti
, Yang Wang, Chenxi Wang, Jure Leskovec, Christos Faloutsos
:
Epidemic thresholds in real networks. 1:1-1:26 - James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang:
Formal foundations for hybrid hierarchies in GTRBAC. 2:1-2:39 - Blaise Gassend, Marten van Dijk, Dwaine E. Clarke
, Emina Torlak, Srinivas Devadas, Pim Tuyls:
Controlled physical random functions and applications. 3:1-3:22 - Luc Bouganim, François Dang Ngoc, Philippe Pucheral:
Dynamic access-control policies on XML encrypted data. 4:1-4:37 - Paul C. van Oorschot
, Julie Thorpe
:
On predictive models and user-drawn graphical passwords. 5:1-5:33 - Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru, Herbert Rubens:
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. 6:1-6:35

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.