default search action
ACM Transactions on Information and System Security, Volume 14
Volume 14, Number 1, May 2011
- Ninghui Li:
Introduction to special section SACMAT'08. 1:1 - Lujo Bauer, Scott Garriss, Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems. 2:1-2:28 - Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu:
Authorization recycling in hierarchical RBAC systems. 3:1-3:29 - Jens-Matthias Bohli, Andreas Pashalidis:
Relations among privacy notions. 4:1-4:24 - Gabriele Oligeri, Stefano Chessa, Roberto Di Pietro, Gaetano Giunta:
Robust and efficient authentication of video stream broadcasting. 5:1-5:25 - Brian Demsky:
Cross-application data provenance and policy enforcement. 6:1-6:22 - Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Practical defenses against pollution attacks in wireless network coding. 7:1-7:31 - Fred B. Schneider, Kevin Walsh, Emin Gün Sirer:
Nexus authorization logic (NAL): Design rationale and applications. 8:1-8:28 - Glenn Bruns, Michael Huth:
Access control via belnap logic: Intuitive, expressive, and analyzable policy composition. 9:1-9:27 - Scott E. Coull, Matthew Green, Susan Hohenberger:
Access controls for oblivious and anonymous systems. 10:1-10:28 - Mike Burmester, Jorge Munilla:
Lightweight RFID authentication with forward and backward security. 11:1-11:26 - Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary N. J. Peterson, Dawn Song:
Remote data checking using provable data possession. 12:1-12:34 - Yao Liu, Peng Ning, Michael K. Reiter:
False data injection attacks against state estimation in electric power grids. 13:1-13:33 - Jason Crampton:
Practical and efficient cryptographic enforcement of interval-based access control policies. 14:1-14:30
Volume 14, Number 2, September 2011
- Tielei Wang, Tao Wei, Guofei Gu, Wei Zou:
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution. 15:1-15:28 - David A. Basin, Srdjan Capkun, Patrick Schaller, Benedikt Schmidt:
Formal Reasoning about Physical Properties of Security Protocols. 16:1-16:28 - Scott A. Crosby, Dan S. Wallach:
Authenticated Dictionaries: Real-World Costs and Trade-Offs. 17:1-17:30 - Andrew W. Appel:
Security Seals on Voting Machines: A Case Study. 18:1-18:29 - Z. Cliffe Schreuders, Tanya Jane McGill, Christian Payne:
Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM. 19:1-19:28 - Peter Williams, Radu Sion, Miroslava Sotáková:
Practical Oblivious Outsourced Storage. 20:1-20:28 - Guang Xiang, Jason I. Hong, Carolyn P. Rosé, Lorrie Faith Cranor:
CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites. 21:1-21:28
Volume 14, Number 3, November 2011
- James Joshi, Barbara Carminati:
Guest Editorial SACMAT 2009 and 2010. 22:1-22:2 - Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough:
Group-Centric Secure Information-Sharing Models for Isolated Groups. 23:1-23:29 - Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang:
Combining Discretionary Policy with Mandatory Information Flow in Operating Systems. 24:1-24:27 - Gregory Leighton, Denilson Barbosa:
Access Control Policy Translation, Verification, and Minimization within Heterogeneous Data Federations. 25:1-25:28 - T.-H. Hubert Chan, Elaine Shi, Dawn Song:
Private and Continual Release of Statistics. 26:1-26:24 - Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems. 27:1-27:23
Volume 14, Number 4, December 2011
- M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis:
Modeling key compromise impersonation attacks on group key exchange protocols. 28:1-28:24 - Man Ho Au, Patrick P. Tsang, Apu Kapadia:
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users. 29:1-29:34 - Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma:
On two RFID privacy notions and their relations. 30:1-30:23 - Martin Burkhart, Xenofontas A. Dimitropoulos:
Privacy-preserving distributed network troubleshooting - bridging the gap between theory and practice. 31:1-31:30 - Darrell Bethea, Robert A. Cochran, Michael K. Reiter:
Server-side verification of client behavior in online games. 32:1-32:27
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.