default search action
Search dblp for Publications
export results for "stream:journals/tissec:"
@article{DBLP:journals/tissec/0002DNW24, author = {Liqun Chen and Changyu Dong and Christopher J. P. Newton and Yalan Wang}, title = {Sphinx-in-the-Head: Group Signatures from Symmetric Primitives}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {11:1--11:35}, year = {2024}, url = {https://doi.org/10.1145/3638763}, doi = {10.1145/3638763}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/0002DNW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/0002LDP0024, author = {Yong Zeng and Jiale Liu and Tong Dong and Qingqi Pei and Jianfeng Ma and Yao Liu}, title = {Eyes See Hazy while Algorithms Recognize Who You Are}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {7:1--7:23}, year = {2024}, url = {https://doi.org/10.1145/3632292}, doi = {10.1145/3632292}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/0002LDP0024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/0004SLGW24, author = {Han Cao and Qindong Sun and Yaqi Li and Rong Geng and Xiaoxiong Wang}, title = {Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {4:1--4:25}, year = {2024}, url = {https://doi.org/10.1145/3632293}, doi = {10.1145/3632293}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/0004SLGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/0008DANS024, author = {Shen Wang and Mahshid Delavar and Muhammad Ajmal Azad and Farshad Nabizadeh and Steve Smith and Feng Hao}, title = {Spoofing Against Spoofing: Toward Caller {ID} Verification in Heterogeneous Telecommunication Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {1:1--1:25}, year = {2024}, url = {https://doi.org/10.1145/3625546}, doi = {10.1145/3625546}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/0008DANS024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AhmedCASL24, author = {Mukhtar Ahmed and Jinfu Chen and Ernest Akpaku and Rexford Nii Ayitey Sosu and Ajmal Latif}, title = {{DELM:} Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {4}, pages = {32:1--32:36}, year = {2024}, url = {https://doi.org/10.1145/3690637}, doi = {10.1145/3690637}, timestamp = {Wed, 06 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AhmedCASL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AhmedPSA24, author = {Abu Shohel Ahmed and Aleksi Peltonen and Mohit Sethi and Tuomas Aura}, title = {Security Analysis of the Consumer Remote {SIM} Provisioning Protocol}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {3}, pages = {23:1--23:36}, year = {2024}, url = {https://doi.org/10.1145/3663761}, doi = {10.1145/3663761}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AhmedPSA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AmeerPSBG24, author = {Safwa Ameer and Lopamudra Praharaj and Ravi Sandhu and Smriti Bhatt and Maanak Gupta}, title = {ZTA-IoT: {A} Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {3}, pages = {22:1--22:36}, year = {2024}, url = {https://doi.org/10.1145/3671147}, doi = {10.1145/3671147}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AmeerPSBG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BayerKSR24, author = {Markus Bayer and Philipp Kuehn and Ramin Shanehsaz and Christian Reuter}, title = {CySecBERT: {A} Domain-Adapted Language Model for the Cybersecurity Domain}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {2}, pages = {18}, year = {2024}, url = {https://doi.org/10.1145/3652594}, doi = {10.1145/3652594}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BayerKSR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BernabeRodriguezGL24, author = {Julen Bernab{\'{e}}{-}Rodr{\'{\i}}guez and Albert Garreta and Oscar Lage}, title = {A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {2}, pages = {19}, year = {2024}, url = {https://doi.org/10.1145/3652162}, doi = {10.1145/3652162}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BernabeRodriguezGL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BlassN24, author = {Erik{-}Oliver Blass and Guevara Noubir}, title = {Forward Security with Crash Recovery for Secure Logs}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {3:1--3:28}, year = {2024}, url = {https://doi.org/10.1145/3631524}, doi = {10.1145/3631524}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BlassN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CeragioliGDB24, author = {Lorenzo Ceragioli and Letterio Galletta and Pierpaolo Degano and David A. Basin}, title = {Specifying and Verifying Information Flow Control in SELinux Configurations}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {4}, pages = {31:1--31:35}, year = {2024}, url = {https://doi.org/10.1145/3690636}, doi = {10.1145/3690636}, timestamp = {Wed, 06 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CeragioliGDB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChenHK24, author = {Jiayi Chen and Urs Hengartner and Hassan Khan}, title = {{MRAAC:} {A} Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {2}, pages = {17}, year = {2024}, url = {https://doi.org/10.1145/3648372}, doi = {10.1145/3648372}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChenHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ConconeGGRM24, author = {Federico Concone and Salvatore Gaglio and Andrea Giammanco and Giuseppe Lo Re and Marco Morana}, title = {AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {2}, pages = {15}, year = {2024}, url = {https://doi.org/10.1145/3643563}, doi = {10.1145/3643563}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ConconeGGRM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/EbrahimpourH24, author = {Ghader Ebrahimpour and Mohammad Sayad Haghighi}, title = {Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {2}, pages = {14}, year = {2024}, url = {https://doi.org/10.1145/3641546}, doi = {10.1145/3641546}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/EbrahimpourH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GunasingheAB24, author = {Hasini Gunasinghe and Mikhail J. Atallah and Elisa Bertino}, title = {{PEBASI:} {A} Privacy preserving, Efficient Biometric Authentication Scheme based on Irises}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {3}, pages = {25:1--25:31}, year = {2024}, url = {https://doi.org/10.1145/3677017}, doi = {10.1145/3677017}, timestamp = {Wed, 09 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/GunasingheAB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HeHGC24, author = {Xinyu He and Fengrui Hao and Tianlong Gu and Liang Chang}, title = {CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {3}, pages = {24:1--24:26}, year = {2024}, url = {https://doi.org/10.1145/3678007}, doi = {10.1145/3678007}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/HeHGC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KlubanMY24, author = {Maryna Kluban and Mohammad Mannan and Amr M. Youssef}, title = {On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {8:1--8:37}, year = {2024}, url = {https://doi.org/10.1145/3630253}, doi = {10.1145/3630253}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KlubanMY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MohantyT24, author = {Susil Kumar Mohanty and Somanath Tripathy}, title = {Flexichain: Flexible Payment Channel Network to Defend Against Channel Exhaustion Attack}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {4}, pages = {30:1--30:26}, year = {2024}, url = {https://doi.org/10.1145/3687476}, doi = {10.1145/3687476}, timestamp = {Wed, 06 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MohantyT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OttmannBF24, author = {Jenny Ottmann and Frank Breitinger and Felix C. Freiling}, title = {An Experimental Assessment of Inconsistencies in Memory Forensics}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {2:1--2:29}, year = {2024}, url = {https://doi.org/10.1145/3628600}, doi = {10.1145/3628600}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/OttmannBF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OuDZLL24, author = {Weihan Ou and Steven H. H. Ding and Mohammad Zulkernine and Li Tao Li and Sarah Labrosse}, title = {VeriBin: {A} Malware Authorship Verification Approach for {APT} Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {3}, pages = {26:1--26:37}, year = {2024}, url = {https://doi.org/10.1145/3669901}, doi = {10.1145/3669901}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/OuDZLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ParkK24, author = {Namgyu Park and Jong Kim}, title = {Toward Robust {ASR} System against Audio Adversarial Examples using Agitated Logit}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {2}, pages = {20}, year = {2024}, url = {https://doi.org/10.1145/3661822}, doi = {10.1145/3661822}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ParkK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Qiao0K24, author = {Yan Qiao and Kui Wu and Majid Khabbazian}, title = {Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {12:1--12:32}, year = {2024}, url = {https://doi.org/10.1145/3639366}, doi = {10.1145/3639366}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Qiao0K24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SateesanVSHPM24, author = {Arish Sateesan and Jo Vliegen and Simon Scherrer and Hsu{-}Chun Hsiao and Adrian Perrig and Nele Mentens}, title = {SPArch: {A} Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {4}, pages = {29:1--29:34}, year = {2024}, url = {https://doi.org/10.1145/3687477}, doi = {10.1145/3687477}, timestamp = {Wed, 06 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SateesanVSHPM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SathiM24, author = {Vipin N. Sathi and C. Siva Ram Murthy}, title = {Boost Your Immunity: {VACCINE} for Preventing a Novel Stealthy Slice Selection Attack in 5G and Beyond}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {4}, pages = {27:1--27:29}, year = {2024}, url = {https://doi.org/10.1145/3686152}, doi = {10.1145/3686152}, timestamp = {Wed, 06 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SathiM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SchulmannZ24, author = {Haya Schulmann and Shujie Zhao}, title = {ZPredict: ML-Based {IPID} Side-channel Measurements}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {4}, pages = {28:1--28:33}, year = {2024}, url = {https://doi.org/10.1145/3672560}, doi = {10.1145/3672560}, timestamp = {Wed, 06 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SchulmannZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShiMGS24, author = {Zhenpeng Shi and Nikolay Matyunin and Kalman Graffi and David Starobinski}, title = {Uncovering {CWE-CVE-CPE} Relations with Threat Knowledge Graphs}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {13:1--13:26}, year = {2024}, url = {https://doi.org/10.1145/3641819}, doi = {10.1145/3641819}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ShiMGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShresthaMS24, author = {Prakash Shrestha and Ahmed Tanvir Mahdad and Nitesh Saxena}, title = {Sound-based Two-factor Authentication: Vulnerabilities and Redesign}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {5:1--5:27}, year = {2024}, url = {https://doi.org/10.1145/3632175}, doi = {10.1145/3632175}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ShresthaMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SommerGKKS24, author = {Florian Sommer and Mona Gierl and Reiner Kriesten and Frank Kargl and Eric Sax}, title = {Combining Cyber Security Intelligence to Refine Automotive Cyber Threats}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {2}, pages = {16}, year = {2024}, url = {https://doi.org/10.1145/3644075}, doi = {10.1145/3644075}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SommerGKKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SwarnkarS24, author = {Mayank Swarnkar and Neha Sharma}, title = {\emph{OptiClass}: An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {6:1--6:23}, year = {2024}, url = {https://doi.org/10.1145/3633777}, doi = {10.1145/3633777}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SwarnkarS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Tang00XX024, author = {Li Tang and Qingqing Ye and Haibo Hu and Qiao Xue and Yaxin Xiao and Jin Li}, title = {DeepMark: {A} Scalable and Robust Framework for DeepFake Video Detection}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {9:1--9:26}, year = {2024}, url = {https://doi.org/10.1145/3629976}, doi = {10.1145/3629976}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Tang00XX024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ValentimDMC24, author = {Rodolfo Vieira Valentim and Idilio Drago and Marco Mellia and Federico Cerutti}, title = {X-squatter: {AI} Multilingual Generation of Cross-Language Sound-squatting}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {3}, pages = {21:1--21:27}, year = {2024}, url = {https://doi.org/10.1145/3663569}, doi = {10.1145/3663569}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ValentimDMC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangML0JG24, author = {Li Wang and Xiangtao Meng and Dan Li and Xuhong Zhang and Shouling Ji and Shanqing Guo}, title = {{DEEPFAKER:} {A} Unified Evaluation Platform for Facial Deepfake and Detection Models}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {10:1--10:34}, year = {2024}, url = {https://doi.org/10.1145/3634914}, doi = {10.1145/3634914}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WangML0JG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AlexJP23, author = {Sona Alex and Dhanaraj K. J. and Deepthi P. P.}, title = {Energy Efficient and Secure Neural Network-based Disease Detection Framework for Mobile Healthcare Network}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {29:1--29:27}, year = {2023}, url = {https://doi.org/10.1145/3585536}, doi = {10.1145/3585536}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AlexJP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AlotaibiWK23, author = {Norah Mohsen T. Alotaibi and John Williamson and Mohamed Khamis}, title = {ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {12:1--12:24}, year = {2023}, url = {https://doi.org/10.1145/3563693}, doi = {10.1145/3563693}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AlotaibiWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AloufiHB23, author = {Ranya Aloufi and Hamed Haddadi and David Boyle}, title = {Paralinguistic Privacy Protection at the Edge}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {19:1--19:27}, year = {2023}, url = {https://doi.org/10.1145/3570161}, doi = {10.1145/3570161}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AloufiHB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AmroGK23, author = {Ahmed Amro and Vasileios Gkioulos and Sokratis K. Katsikas}, title = {Assessing Cyber Risk in Cyber-Physical Systems Using the ATT{\&}CK Framework}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {22:1--22:33}, year = {2023}, url = {https://doi.org/10.1145/3571733}, doi = {10.1145/3571733}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AmroGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BansalKHCBM23, author = {Ayoosh Bansal and Anant Kandikuppa and Monowar Hasan and Chien{-}Ying Chen and Adam Bates and Sibin Mohan}, title = {System Auditing for Real-Time Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {4}, pages = {50:1--50:37}, year = {2023}, url = {https://doi.org/10.1145/3625229}, doi = {10.1145/3625229}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BansalKHCBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BarbosaBGKS23, author = {Manuel Barbosa and Gilles Barthe and Benjamin Gr{\'{e}}goire and Adrien Koutsos and Pierre{-}Yves Strub}, title = {Mechanized Proofs of Adversarial Complexity and Application to Universal Composability}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {41:1--41:34}, year = {2023}, url = {https://doi.org/10.1145/3589962}, doi = {10.1145/3589962}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BarbosaBGKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BarreraBO23, author = {David Barrera and Christopher Bellman and Paul C. van Oorschot}, title = {Security Best Practices: {A} Critical Analysis Using IoT as a Case Study}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {13:1--13:30}, year = {2023}, url = {https://doi.org/10.1145/3563392}, doi = {10.1145/3563392}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BarreraBO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BhuiyanR23, author = {Farzana Ahamed Bhuiyan and Akond Rahman}, title = {Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {17:1--17:24}, year = {2023}, url = {https://doi.org/10.1145/3568020}, doi = {10.1145/3568020}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BhuiyanR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BoltonDBM23, author = {Tom Bolton and Tooska Dargahi and Sana Belguith and Carsten Maple}, title = {PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {31:1--31:29}, year = {2023}, url = {https://doi.org/10.1145/3588770}, doi = {10.1145/3588770}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BoltonDBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CabarcosFHSBS23, author = {Patricia Arias Cabarcos and Matin Fallahi and Thilo Habrich and Karen Schulze and Christian Becker and Thorsten Strufe}, title = {Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {26:1--26:36}, year = {2023}, url = {https://doi.org/10.1145/3579356}, doi = {10.1145/3579356}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CabarcosFHSBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChenSCXYA23, author = {Jinfu Chen and Luo Song and Saihua Cai and Haodi Xie and Shang Yin and Bilal Ahmad}, title = {{TLS-MHSA:} An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {4}, pages = {44:1--44:21}, year = {2023}, url = {https://doi.org/10.1145/3613960}, doi = {10.1145/3613960}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ChenSCXYA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChooNAKYW23, author = {Euijin Choo and Mohamed Nabeel and Mashael AlSabah and Issa Khalil and Ting Yu and Wei Wang}, title = {DeviceWatch: {A} Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {1}, pages = {9:1--9:32}, year = {2023}, url = {https://doi.org/10.1145/3558767}, doi = {10.1145/3558767}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChooNAKYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DambraBB23, author = {Savino Dambra and Leyla Bilge and Davide Balzarotti}, title = {A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {16:1--16:30}, year = {2023}, url = {https://doi.org/10.1145/3565362}, doi = {10.1145/3565362}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DambraBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DanielBR23, author = {Lesly{-}Ann Daniel and S{\'{e}}bastien Bardin and Tamara Rezk}, title = {Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {11:1--11:42}, year = {2023}, url = {https://doi.org/10.1145/3563037}, doi = {10.1145/3563037}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DanielBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/EngstromJLRW23, author = {Viktor Engstr{\"{o}}m and Pontus Johnson and Robert Lagerstr{\"{o}}m and Erik Ringdahl and Max W{\"{a}}llstedt}, title = {Automated Security Assessments of Amazon Web Services Environments}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {20:1--20:31}, year = {2023}, url = {https://doi.org/10.1145/3570903}, doi = {10.1145/3570903}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/EngstromJLRW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ErenBJRNA23, author = {Maksim Ekin Eren and Manish Bhattarai and Robert J. Joyce and Edward Raff and Charles Nicholas and Boian S. Alexandrov}, title = {Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {4}, pages = {48:1--48:27}, year = {2023}, url = {https://doi.org/10.1145/3624567}, doi = {10.1145/3624567}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ErenBJRNA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GilAHD23, author = {Gonzalo Gil and Aitor Arnaiz and Marivi Higuero and Francisco Javier D{\'{\i}}ez}, title = {Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {1}, pages = {10:1--10:28}, year = {2023}, url = {https://doi.org/10.1145/3561511}, doi = {10.1145/3561511}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/GilAHD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GongCYHW23, author = {Xueluan Gong and Yanjiao Chen and Wenbin Yang and Huayang Huang and Qian Wang}, title = {B\({}^{\mbox{3}}\): Backdoor Attacks against Black-box Machine Learning Models}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {4}, pages = {43:1--43:24}, year = {2023}, url = {https://doi.org/10.1145/3605212}, doi = {10.1145/3605212}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GongCYHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GuoWXY23, author = {Chun Guo and Xiao Wang and Xiang Xie and Yu Yu}, title = {The Multi-User Constrained Pseudorandom Function Security of Generalized {GGM} Trees for {MPC} and Hierarchical Wallets}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {37:1--37:38}, year = {2023}, url = {https://doi.org/10.1145/3592608}, doi = {10.1145/3592608}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/GuoWXY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HabibKHH23, author = {Sohail Habib and Hassan Khan and Andrew Hamilton{-}Wright and Urs Hengartner}, title = {Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {21:1--21:30}, year = {2023}, url = {https://doi.org/10.1145/3571743}, doi = {10.1145/3571743}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/HabibKHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HagenWSDS23, author = {Christoph Hagen and Christian Weinert and Christoph Sendner and Alexandra Dmitrienko and Thomas Schneider}, title = {Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {1}, pages = {2:1--2:44}, year = {2023}, url = {https://doi.org/10.1145/3546191}, doi = {10.1145/3546191}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HagenWSDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HessMB23, author = {Andreas V. Hess and Sebastian Alexander M{\"{o}}dersheim and Achim D. Brucker}, title = {Stateful Protocol Composition in Isabelle/HOL}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {25:1--25:36}, year = {2023}, url = {https://doi.org/10.1145/3577020}, doi = {10.1145/3577020}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/HessMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HouWZJWD23, author = {Jian Hou and Jing Wang and Mingyue Zhang and Zhi Jin and Chunlin Wei and Zuohua Ding}, title = {Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {34:1--34:22}, year = {2023}, url = {https://doi.org/10.1145/3587933}, doi = {10.1145/3587933}, timestamp = {Mon, 04 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HouWZJWD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HwangOT23, author = {Seoyeon Hwang and Ercan Ozturk and Gene Tsudik}, title = {Balancing Security and Privacy in Genomic Range Queries}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {23:1--23:28}, year = {2023}, url = {https://doi.org/10.1145/3575796}, doi = {10.1145/3575796}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/HwangOT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KhanKHM23, author = {Shaharyar Khan and Ilya Kabanov and Yunke Hua and Stuart E. Madnick}, title = {A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {1}, pages = {3:1--3:29}, year = {2023}, url = {https://doi.org/10.1145/3546068}, doi = {10.1145/3546068}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KhanKHM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KimCSKNK23, author = {Dohyun Kim and ManGi Cho and Hocheol Shin and Jaehoon Kim and Juhwan Noh and Yongdae Kim}, title = {Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {4}, pages = {46:1--46:30}, year = {2023}, url = {https://doi.org/10.1145/3615867}, doi = {10.1145/3615867}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KimCSKNK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KingH23, author = {Isaiah J. King and H. Howie Huang}, title = {Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {35:1--35:36}, year = {2023}, url = {https://doi.org/10.1145/3588771}, doi = {10.1145/3588771}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KingH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LachtarIKB23, author = {Nada Lachtar and Duha Ibdah and Hamza Khan and Anys Bacha}, title = {RansomShield: {A} Visualization Approach to Defending Mobile Systems Against Ransomware}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {27:1--27:30}, year = {2023}, url = {https://doi.org/10.1145/3579822}, doi = {10.1145/3579822}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LachtarIKB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LanotteMM23, author = {Ruggero Lanotte and Massimo Merro and Andrei Munteanu}, title = {Industrial Control Systems Security via Runtime Enforcement}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {1}, pages = {4:1--4:41}, year = {2023}, url = {https://doi.org/10.1145/3546579}, doi = {10.1145/3546579}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LanotteMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LembkeRRE23, author = {James Lembke and Srivatsan Ravi and Pierre{-}Louis Roman and Patrick Eugster}, title = {Secure and Reliable Network Updates}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {1}, pages = {8:1--8:41}, year = {2023}, url = {https://doi.org/10.1145/3556542}, doi = {10.1145/3556542}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LembkeRRE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiDTFCOSC23, author = {Litao Li and Steven H. H. Ding and Yuan Tian and Benjamin C. M. Fung and Philippe Charland and Weihan Ou and Leo Song and Congwei Chen}, title = {VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {28:1--28:25}, year = {2023}, url = {https://doi.org/10.1145/3585386}, doi = {10.1145/3585386}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LiDTFCOSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LuYS23, author = {Yang Lu and Zhengxin Yu and Neeraj Suri}, title = {Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {33:1--33:39}, year = {2023}, url = {https://doi.org/10.1145/3591354}, doi = {10.1145/3591354}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LuYS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MallahHF23, author = {Ranwa Al Mallah and Talal Halabi and Bilal Farooq}, title = {Resilience-by-design in Adaptive Multi-agent Traffic Control Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {40:1--40:27}, year = {2023}, url = {https://doi.org/10.1145/3592799}, doi = {10.1145/3592799}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MallahHF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MurrayM23, author = {Hazel Murray and David Malone}, title = {Costs and Benefits of Authentication Advice}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {30:1--30:35}, year = {2023}, url = {https://doi.org/10.1145/3588031}, doi = {10.1145/3588031}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MurrayM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OtoniMAEHS23, author = {Rodrigo Otoni and Matteo Marescotti and Leonardo Alt and Patrick Eugster and Antti E. J. Hyv{\"{a}}rinen and Natasha Sharygina}, title = {A Solicitous Approach to Smart Contract Verification}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {15:1--15:28}, year = {2023}, url = {https://doi.org/10.1145/3564699}, doi = {10.1145/3564699}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/OtoniMAEHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PaladiniMPCZ23, author = {Tommaso Paladini and Francesco Monti and Mario Polino and Michele Carminati and Stefano Zanero}, title = {Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {4}, pages = {45:1--45:35}, year = {2023}, url = {https://doi.org/10.1145/3613244}, doi = {10.1145/3613244}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PaladiniMPCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RamokapaneSR23, author = {Kopo Marvin Ramokapane and Jose M. Such and Awais Rashid}, title = {What Users Want From Cloud Deletion and the Information They Need: {A} Participatory Action Study}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {1}, pages = {5:1--5:34}, year = {2023}, url = {https://doi.org/10.1145/3546578}, doi = {10.1145/3546578}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/RamokapaneSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SajidWADAK23, author = {Md Sajidul Islam Sajid and Jinpeng Wei and Ehab Al{-}Shaer and Qi Duan and Basel Abdeen and Latifur Khan}, title = {symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {4}, pages = {51:1--51:36}, year = {2023}, url = {https://doi.org/10.1145/3624568}, doi = {10.1145/3624568}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SajidWADAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SakibAG23, author = {Shahnewaz Karim Sakib and George T. Amariucai and Yong Guan}, title = {Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {4}, pages = {47:1--47:31}, year = {2023}, url = {https://doi.org/10.1145/3624982}, doi = {10.1145/3624982}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SakibAG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ScopellitiPNABPM23, author = {Gianluca Scopelliti and Sepideh Pouyanrad and Job Noorman and Fritz Alder and Christoph Baumann and Frank Piessens and Jan Tobias M{\"{u}}hlberg}, title = {End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {39:1--39:46}, year = {2023}, url = {https://doi.org/10.1145/3592607}, doi = {10.1145/3592607}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ScopellitiPNABPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/TizioSSBSK23, author = {Giorgio Di Tizio and Patrick Speicher and Milivoj Simeonovski and Michael Backes and Ben Stock and Robert K{\"{u}}nnemann}, title = {Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {18:1--18:36}, year = {2023}, url = {https://doi.org/10.1145/3567595}, doi = {10.1145/3567595}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/TizioSSBSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/UsyninRK23, author = {Dmitrii Usynin and Daniel Rueckert and Georgios Kaissis}, title = {Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {38:1--38:30}, year = {2023}, url = {https://doi.org/10.1145/3592800}, doi = {10.1145/3592800}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/UsyninRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/VenkatesaramaniWMV23, author = {Rajagopal Venkatesaramani and Zhiyu Wan and Bradley A. Malin and Yevgeniy Vorobeychik}, title = {Defending Against Membership Inference Attacks on Beacon Services}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {42:1--42:32}, year = {2023}, url = {https://doi.org/10.1145/3603627}, doi = {10.1145/3603627}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/VenkatesaramaniWMV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/VidanageCRS23, author = {Anushka Vidanage and Peter Christen and Thilina Ranbaduge and Rainer Schnell}, title = {A Vulnerability Assessment Framework for Privacy-preserving Record Linkage}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {36:1--36:31}, year = {2023}, url = {https://doi.org/10.1145/3589641}, doi = {10.1145/3589641}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/VidanageCRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Wagner23, author = {Isabel Wagner}, title = {Privacy Policies across the Ages: Content of Privacy Policies 1996-2021}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {32:1--32:32}, year = {2023}, url = {https://doi.org/10.1145/3590152}, doi = {10.1145/3590152}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Wagner23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangYWML23, author = {Huanran Wang and Wu Yang and Wei Wang and Dapeng Man and Jiguang Lv}, title = {A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {1}, pages = {7:1--7:32}, year = {2023}, url = {https://doi.org/10.1145/3548685}, doi = {10.1145/3548685}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WangYWML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WieflingJTI23, author = {Stephan Wiefling and Paul Ren{\'{e}} J{\o}rgensen and Sigurd Thunem and Luigi Lo Iacono}, title = {Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {1}, pages = {6:1--6:36}, year = {2023}, url = {https://doi.org/10.1145/3546069}, doi = {10.1145/3546069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WieflingJTI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangKL23, author = {Xueru Zhang and Mohammad Mahdi Khalili and Mingyan Liu}, title = {Differentially Private Real-Time Release of Sequential Data}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {1}, pages = {1:1--1:29}, year = {2023}, url = {https://doi.org/10.1145/3544837}, doi = {10.1145/3544837}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhangKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangZYY23, author = {Chenhan Zhang and Shiyao Zhang and James J. Q. Yu and Shui Yu}, title = {{SAM:} Query-efficient Adversarial Attacks against Graph Neural Networks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {4}, pages = {49:1--49:19}, year = {2023}, url = {https://doi.org/10.1145/3611307}, doi = {10.1145/3611307}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZhangZYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhuoBKLR23, author = {Sijie Zhuo and Robert Biddle and Yun Sing Koh and Danielle M. Lottridge and Giovanni Russello}, title = {SoK: Human-centered Phishing Susceptibility}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {24:1--24:27}, year = {2023}, url = {https://doi.org/10.1145/3575797}, doi = {10.1145/3575797}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhuoBKLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AkaviaLRRSV22, author = {Adi Akavia and Max Leibovich and Yehezkel S. Resheff and Roey Ron and Moni Shahar and Margarita Vald}, title = {Privacy-Preserving Decision Trees Training and Prediction}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {3}, pages = {24:1--24:30}, year = {2022}, url = {https://doi.org/10.1145/3517197}, doi = {10.1145/3517197}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AkaviaLRRSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AlperK22, author = {Handan Kilin{\c{c}} Alper and Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, title = {Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {1}, pages = {3:1--3:34}, year = {2022}, url = {https://doi.org/10.1145/3477530}, doi = {10.1145/3477530}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AlperK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AlvimCKP22, author = {M{\'{a}}rio S. Alvim and Konstantinos Chatzikokolakis and Yusuke Kawamoto and Catuscia Palamidessi}, title = {Information Leakage Games: Exploring Information as a Utility Function}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {3}, pages = {20:1--20:36}, year = {2022}, url = {https://doi.org/10.1145/3517330}, doi = {10.1145/3517330}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AlvimCKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BazaiJA22, author = {Sibghat Ullah Bazai and Julian Jang{-}Jaccard and Hooman Alavizadeh}, title = {A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {1}, pages = {5:1--5:25}, year = {2022}, url = {https://doi.org/10.1145/3484945}, doi = {10.1145/3484945}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BazaiJA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BerlatoCLR22, author = {Stefano Berlato and Roberto Carbone and Adam J. Lee and Silvio Ranise}, title = {Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {1}, pages = {2:1--2:37}, year = {2022}, url = {https://doi.org/10.1145/3474056}, doi = {10.1145/3474056}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BerlatoCLR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BlairMAW0KE22, author = {William Blair and Andrea Mambretti and Sajjad Arshad and Michael Weissbacher and William Robertson and Engin Kirda and Manuel Egele}, title = {HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {4}, pages = {33:1--33:35}, year = {2022}, url = {https://doi.org/10.1145/3532184}, doi = {10.1145/3532184}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BlairMAW0KE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BotacinMNGA22, author = {Marcus Botacin and Francis B. Moreira and Philippe O. A. Navaux and Andr{\'{e}} Gr{\'{e}}gio and Marco A. Z. Alves}, title = {Terminator: {A} Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {2}, pages = {9:1--9:34}, year = {2022}, url = {https://doi.org/10.1145/3494535}, doi = {10.1145/3494535}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BotacinMNGA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BraunDST22, author = {Lennart Braun and Daniel Demmler and Thomas Schneider and Oleksandr Tkachenko}, title = {{MOTION} - {A} Framework for Mixed-Protocol Multi-Party Computation}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {2}, pages = {8:1--8:35}, year = {2022}, url = {https://doi.org/10.1145/3490390}, doi = {10.1145/3490390}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BraunDST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BrisenoSS22, author = {Julian de Gortari Briseno and Akash Deep Singh and Mani Srivastava}, title = {InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {2}, pages = {15:1--15:26}, year = {2022}, url = {https://doi.org/10.1145/3510583}, doi = {10.1145/3510583}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BrisenoSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChenZYZCWG22, author = {Yuxuan Chen and Jiangshan Zhang and Xuejing Yuan and Shengzhi Zhang and Kai Chen and Xiaofeng Wang and Shanqing Guo}, title = {SoK: {A} Modularized Approach to Study the Security of Automatic Speech Recognition Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {3}, pages = {17:1--17:31}, year = {2022}, url = {https://doi.org/10.1145/3510582}, doi = {10.1145/3510582}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChenZYZCWG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChernikovaO22, author = {Alesia Chernikova and Alina Oprea}, title = {{FENCE:} Feasible Evasion Attacks on Neural Networks in Constrained Environments}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {4}, pages = {34:1--34:34}, year = {2022}, url = {https://doi.org/10.1145/3544746}, doi = {10.1145/3544746}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChernikovaO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CliftonHMM22, author = {Chris Clifton and Eric J. Hanson and Keith Merrill and Shawn Merrill}, title = {Differentially Private \emph{k}-Nearest Neighbor Missing Data Imputation}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {3}, pages = {16:1--16:23}, year = {2022}, url = {https://doi.org/10.1145/3507952}, doi = {10.1145/3507952}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CliftonHMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CramptonEGKM22, author = {Jason Crampton and Eduard Eiben and Gregory Z. Gutin and Daniel Karapetyan and Diptapriyo Majumdar}, title = {Valued Authorization Policy Existence Problem: Theory and Experiments}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {4}, pages = {28:1--28:32}, year = {2022}, url = {https://doi.org/10.1145/3528101}, doi = {10.1145/3528101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CramptonEGKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CuiSSSY22, author = {Jinhua Cui and Shweta Shinde and Satyaki Sen and Prateek Saxena and Pinghai Yuan}, title = {Dynamic Binary Translation for {SGX} Enclaves}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {4}, pages = {32:1--32:40}, year = {2022}, url = {https://doi.org/10.1145/3532862}, doi = {10.1145/3532862}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CuiSSSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DaoudiABK22, author = {Nadia Daoudi and Kevin Allix and Tegawend{\'{e}} Fran{\c{c}}ois D. Assise Bissyand{\'{e}} and Jacques Klein}, title = {A Deep Dive Inside {DREBIN:} An Explorative Analysis beyond Android Malware Detection Scores}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {2}, pages = {13:1--13:28}, year = {2022}, url = {https://doi.org/10.1145/3503463}, doi = {10.1145/3503463}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DaoudiABK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DebantDW22, author = {Alexandre Debant and St{\'{e}}phanie Delaune and Cyrille Wiedling}, title = {So Near and Yet So Far - Symbolic Verification of Distance-Bounding Protocols}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {2}, pages = {11:1--11:39}, year = {2022}, url = {https://doi.org/10.1145/3501402}, doi = {10.1145/3501402}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DebantDW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FenskeM0S22, author = {Ellis Fenske and Akshaya Mani and Aaron Johnson and Micah Sherr}, title = {Accountable Private Set Cardinality for Distributed Measurement}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {4}, pages = {25:1--25:35}, year = {2022}, url = {https://doi.org/10.1145/3477531}, doi = {10.1145/3477531}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/FenskeM0S22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FischerFKJKB22, author = {Andreas Fischer and Benny Fuhry and J{\"{o}}rn Ku{\ss}maul and Jonas Janneck and Florian Kerschbaum and Eric Bodden}, title = {Computation on Encrypted Data Using Dataflow Authentication}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {3}, pages = {21:1--21:36}, year = {2022}, url = {https://doi.org/10.1145/3513005}, doi = {10.1145/3513005}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/FischerFKJKB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/IdanF22, author = {Lihi Idan and Joan Feigenbaum}, title = {PRShare: {A} Framework for Privacy-preserving, Interorganizational Data Sharing}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {4}, pages = {29:1--29:38}, year = {2022}, url = {https://doi.org/10.1145/3531225}, doi = {10.1145/3531225}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/IdanF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/IyerM22, author = {Padmavathi Iyer and Amirreza Masoumzadeh}, title = {Learning Relationship-Based Access Control Policies from Black-Box Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {3}, pages = {22:1--22:36}, year = {2022}, url = {https://doi.org/10.1145/3517121}, doi = {10.1145/3517121}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/IyerM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LandauerSWR22, author = {Max Landauer and Florian Skopik and Markus Wurzenberger and Andreas Rauber}, title = {Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {3}, pages = {18:1--18:36}, year = {2022}, url = {https://doi.org/10.1145/3510581}, doi = {10.1145/3510581}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LandauerSWR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LehmanAKL022, author = {Sarah M. Lehman and Abrar S. Alrumayh and Kunal Kolhe and Haibin Ling and Chiu C. Tan}, title = {Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {4}, pages = {26:1--26:35}, year = {2022}, url = {https://doi.org/10.1145/3524020}, doi = {10.1145/3524020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LehmanAKL022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MartinsM22, author = {Cl{\'{a}}udio Martins and Ib{\'{e}}ria Medeiros}, title = {Generating Quality Threat Intelligence Leveraging {OSINT} and a Cyber Threat Unified Taxonomy}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {3}, pages = {19:1--19:39}, year = {2022}, url = {https://doi.org/10.1145/3530977}, doi = {10.1145/3530977}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MartinsM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Nussbaum022, author = {Eyal Nussbaum and Michael Segal}, title = {Privacy Analysis of Query-Set-Size Control}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {4}, pages = {31:1--31:19}, year = {2022}, url = {https://doi.org/10.1145/3532774}, doi = {10.1145/3532774}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Nussbaum022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OliveriB22, author = {Andrea Oliveri and Davide Balzarotti}, title = {In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {4}, pages = {27:1--27:32}, year = {2022}, url = {https://doi.org/10.1145/3528102}, doi = {10.1145/3528102}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/OliveriB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OserHLK22, author = {Pascal Oser and Rens W. van der Heijden and Stefan L{\"{u}}ders and Frank Kargl}, title = {Risk Prediction of IoT Devices Based on Vulnerability Analysis}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {2}, pages = {14:1--14:36}, year = {2022}, url = {https://doi.org/10.1145/3510360}, doi = {10.1145/3510360}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/OserHLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PaganiB22, author = {Fabio Pagani and Davide Balzarotti}, title = {AutoProfile: Towards Automated Profile Generation for Memory Analysis}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {1}, pages = {6:1--6:26}, year = {2022}, url = {https://doi.org/10.1145/3485471}, doi = {10.1145/3485471}, timestamp = {Wed, 19 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PaganiB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PerilloPT22, author = {Angelo Massimo Perillo and Giuseppe Persiano and Alberto Trombetta}, title = {Secure Selections on Encrypted Multi-writer Streams}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {1}, pages = {7:1--7:33}, year = {2022}, url = {https://doi.org/10.1145/3485470}, doi = {10.1145/3485470}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/PerilloPT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/QianGSWWGLW22, author = {Yaguan Qian and Yankai Guo and Qiqi Shao and Jiamin Wang and Bin Wang and Zhaoquan Gu and Xiang Ling and Chunming Wu}, title = {{EI-MTD:} Moving Target Defense for Edge Intelligence against Adversarial Attacks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {3}, pages = {23:1--23:24}, year = {2022}, url = {https://doi.org/10.1145/3517806}, doi = {10.1145/3517806}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/QianGSWWGLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/QinPLRB22, author = {Le Qin and Fei Peng and Min Long and Raghavendra Ramachandra and Christoph Busch}, title = {Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {1}, pages = {4:1--4:28}, year = {2022}, url = {https://doi.org/10.1145/3491199}, doi = {10.1145/3491199}, timestamp = {Wed, 06 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/QinPLRB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SavvidesKSE22, author = {Savvas Savvides and Seema Kumar and Julian James Stephen and Patrick Eugster}, title = {{C3PO:} Cloud-based Confidentiality-preserving Continuous Query Processing}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {1}, pages = {1:1--1:36}, year = {2022}, url = {https://doi.org/10.1145/3472717}, doi = {10.1145/3472717}, timestamp = {Wed, 19 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SavvidesKSE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/StojmenovicSSB22, author = {Milica Stojmenovic and Eric Spero and Milos Stojmenovic and Robert Biddle}, title = {What is Beautiful is Secure}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {4}, pages = {30:1--30:30}, year = {2022}, url = {https://doi.org/10.1145/3533047}, doi = {10.1145/3533047}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/StojmenovicSSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangHRTO22, author = {Xueou Wang and Xiaolu Hou and Ruben Rios and Nils Ole Tippenhauer and Mart{\'{\i}}n Ochoa}, title = {Constrained Proximity Attacks on Mobile Targets}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {2}, pages = {10:1--10:29}, year = {2022}, url = {https://doi.org/10.1145/3498543}, doi = {10.1145/3498543}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WangHRTO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZolotavkinJKSD22, author = {Yevhen Zolotavkin and Jongkil Jay Jeong and Veronika Kuchta and Maksym Slavnenko and Robin Doss}, title = {Improving Unlinkability of Attribute-based Authentication through Game Theory}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {2}, pages = {12:1--12:36}, year = {2022}, url = {https://doi.org/10.1145/3501260}, doi = {10.1145/3501260}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZolotavkinJKSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AbuhamadAMN21, author = {Mohammed Abuhamad and Tamer AbuHmed and David Mohaisen and Daehun Nyang}, title = {Large-scale and Robust Code Authorship Identification with Deep Feature Learning}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {23:1--23:35}, year = {2021}, url = {https://doi.org/10.1145/3461666}, doi = {10.1145/3461666}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AbuhamadAMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AcarAKKAAU21, author = {Abbas Acar and Shoukat Ali and Koray Karabina and Cengiz Kaygusuz and Hidayet Aksu and Kemal Akkaya and Arif Selcuk Uluagac}, title = {A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {24:1--24:28}, year = {2021}, url = {https://doi.org/10.1145/3464690}, doi = {10.1145/3464690}, timestamp = {Mon, 18 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AcarAKKAAU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AmiKMNP21, author = {Amit Seal Ami and Kaushal Kafle and Kevin Moran and Adwait Nadkarni and Denys Poshyvanyk}, title = {Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {15:1--15:37}, year = {2021}, url = {https://doi.org/10.1145/3439802}, doi = {10.1145/3439802}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AmiKMNP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ArceriM21, author = {Vincenzo Arceri and Isabella Mastroeni}, title = {Analyzing Dynamic Code: {A} Sound Abstract Interpreter for \emph{Evil} Eval}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {2}, pages = {10:1--10:38}, year = {2021}, url = {https://doi.org/10.1145/3426470}, doi = {10.1145/3426470}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ArceriM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BalliuMPS21, author = {Musard Balliu and Massimo Merro and Michele Pasqua and Mikhail Shcherbakov}, title = {Friendly Fire: Cross-app Interactions in IoT Platforms}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {16:1--16:40}, year = {2021}, url = {https://doi.org/10.1145/3444963}, doi = {10.1145/3444963}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BalliuMPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BhattacharjeeMS21, author = {Shameek Bhattacharjee and Venkata Praveen Kumar Madhavarapu and Simone Silvestri and Sajal K. Das}, title = {Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {2}, pages = {9:1--9:36}, year = {2021}, url = {https://doi.org/10.1145/3426739}, doi = {10.1145/3426739}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BhattacharjeeMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BirnbachBEM21, author = {Simon Birnbach and Richard Baker and Simon Eberz and Ivan Martinovic}, title = {{\#}PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {31:1--31:34}, year = {2021}, url = {https://doi.org/10.1145/3473672}, doi = {10.1145/3473672}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BirnbachBEM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BotacinAOKVOGG21, author = {Marcus Botacin and Hojjat Aghakhani and Stefano Ortolani and Christopher Kruegel and Giovanni Vigna and Daniela Oliveira and Paulo L{\'{\i}}cio de Geus and Andr{\'{e}} Gr{\'{e}}gio}, title = {One Size Does Not Fit All: {A} Longitudinal Analysis of Brazilian Financial Malware}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {2}, pages = {11:1--11:31}, year = {2021}, url = {https://doi.org/10.1145/3429741}, doi = {10.1145/3429741}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BotacinAOKVOGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChaddadCEK21, author = {Louma Chaddad and Ali Chehab and Imad H. Elhajj and Ayman I. Kayssi}, title = {Optimal Packet Camouflage Against Traffic Analysis}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {22:1--22:23}, year = {2021}, url = {https://doi.org/10.1145/3442697}, doi = {10.1145/3442697}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ChaddadCEK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChengALNCJAY21, author = {Long Cheng and Salman Ahmed and Hans Liljestrand and Thomas Nyman and Haipeng Cai and Trent Jaeger and N. Asokan and Danfeng (Daphne) Yao}, title = {Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {26:1--26:36}, year = {2021}, url = {https://doi.org/10.1145/3462699}, doi = {10.1145/3462699}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChengALNCJAY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CorderoVWMN21, author = {Carlos Garcia Cordero and Emmanouil Vasilomanolakis and Aidmar Wainakh and Max M{\"{u}}hlh{\"{a}}user and Simin Nadjm{-}Tehrani}, title = {On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {2}, pages = {8:1--8:39}, year = {2021}, url = {https://doi.org/10.1145/3424155}, doi = {10.1145/3424155}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CorderoVWMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CramptonGM21, author = {Jason Crampton and Gregory Z. Gutin and Diptapriyo Majumdar}, title = {Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {21:1--21:22}, year = {2021}, url = {https://doi.org/10.1145/3450768}, doi = {10.1145/3450768}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CramptonGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CuiSAGR21, author = {Shujie Cui and Xiangfu Song and Muhammad Rizwan Asghar and Steven D. Galbraith and Giovanni Russello}, title = {Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {18:1--18:35}, year = {2021}, url = {https://doi.org/10.1145/3446920}, doi = {10.1145/3446920}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CuiSAGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DemetrioCBLAR21, author = {Luca Demetrio and Scott E. Coull and Battista Biggio and Giovanni Lagorio and Alessandro Armando and Fabio Roli}, title = {Adversarial EXEmples: {A} Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {27:1--27:31}, year = {2021}, url = {https://doi.org/10.1145/3473039}, doi = {10.1145/3473039}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DemetrioCBLAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HelbleKLRRA21, author = {Sarah C. Helble and Ian D. Kretz and Peter A. Loscocco and John D. Ramsdell and Paul D. Rowe and Perry Alexander}, title = {Flexible Mechanisms for Remote Attestation}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {29:1--29:23}, year = {2021}, url = {https://doi.org/10.1145/3470535}, doi = {10.1145/3470535}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/HelbleKLRRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JacommeK21, author = {Charlie Jacomme and Steve Kremer}, title = {An Extensive Formal Analysis of Multi-factor Authentication Protocols}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {2}, pages = {13:1--13:34}, year = {2021}, url = {https://doi.org/10.1145/3440712}, doi = {10.1145/3440712}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JacommeK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JareckiJKSS21, author = {Stanislaw Jarecki and Mohammed Jubur and Hugo Krawczyk and Nitesh Saxena and Maliheh Shirvanian}, title = {Two-factor Password-authenticated Key Exchange with End-to-end Security}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {17:1--17:37}, year = {2021}, url = {https://doi.org/10.1145/3446807}, doi = {10.1145/3446807}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JareckiJKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MaqsoodC21, author = {Sana Maqsood and Sonia Chiasson}, title = {Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {28:1--28:37}, year = {2021}, url = {https://doi.org/10.1145/3469821}, doi = {10.1145/3469821}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MaqsoodC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MarkertBGDA21, author = {Philipp Markert and Daniel V. Bailey and Maximilian Golla and Markus D{\"{u}}rmuth and Adam J. Aviv}, title = {On the Security of Smartphone Unlock PINs}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {30:1--30:36}, year = {2021}, url = {https://doi.org/10.1145/3473040}, doi = {10.1145/3473040}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MarkertBGDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MayrhoferSBK21, author = {Ren{\'{e}} Mayrhofer and Jeffrey Vander Stoep and Chad Brubaker and Nick Kralevich}, title = {The Android Platform Security Model}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {19:1--19:35}, year = {2021}, url = {https://doi.org/10.1145/3448609}, doi = {10.1145/3448609}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MayrhoferSBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MohammadyOWHLPD21, author = {Meisam Mohammady and Momen Oqaily and Lingyu Wang and Yuan Hong and Habib Louafi and Makan Pourzandi and Mourad Debbabi}, title = {A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {14:1--14:36}, year = {2021}, url = {https://doi.org/10.1145/3439732}, doi = {10.1145/3439732}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MohammadyOWHLPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PapaevripidesA21, author = {Michalis Papaevripides and Elias Athanasopoulos}, title = {Exploiting Mixed Binaries}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {2}, pages = {7:1--7:29}, year = {2021}, url = {https://doi.org/10.1145/3418898}, doi = {10.1145/3418898}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PapaevripidesA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SalemBP21, author = {Aleieldin Salem and Sebastian Banescu and Alexander Pretschner}, title = {Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {25:1--25:35}, year = {2021}, url = {https://doi.org/10.1145/3465361}, doi = {10.1145/3465361}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SalemBP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/VerasCT21, author = {Rafael Veras and Christopher Collins and Julie Thorpe}, title = {A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {20:1--20:21}, year = {2021}, url = {https://doi.org/10.1145/3448608}, doi = {10.1145/3448608}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/VerasCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WagnerY21, author = {Isabel Wagner and Iryna Yevseyeva}, title = {Designing Strong Privacy Metrics Suites Using Evolutionary Optimization}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {2}, pages = {12:1--12:35}, year = {2021}, url = {https://doi.org/10.1145/3439405}, doi = {10.1145/3439405}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WagnerY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AbrathCBWCFS20, author = {Bert Abrath and Bart Coppens and Jens Van den Broeck and Brecht Wyseur and Alessandro Cabutto and Paolo Falcarin and Bjorn De Sutter}, title = {Code Renewability for Native Software Protection}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {4}, pages = {20:1--20:31}, year = {2020}, url = {https://doi.org/10.1145/3404891}, doi = {10.1145/3404891}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AbrathCBWCFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AhmedMO20, author = {Chuadhry Mujeeb Ahmed and Aditya P. Mathur and Mart{\'{\i}}n Ochoa}, title = {\emph{NoiSense Print}: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {1}, pages = {2:1--2:35}, year = {2020}, url = {https://doi.org/10.1145/3410447}, doi = {10.1145/3410447}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AhmedMO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AlexopoulosHSM20, author = {Nikolaos Alexopoulos and Sheikh Mahbub Habib and Steffen Schulz and Max M{\"{u}}hlh{\"{a}}user}, title = {The Tip of the Iceberg: On the Merits of Finding Security Bugs}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {1}, pages = {3:1--3:33}, year = {2020}, url = {https://doi.org/10.1145/3406112}, doi = {10.1145/3406112}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AlexopoulosHSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AntonioliTR20, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen}, title = {Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {3}, pages = {14:1--14:28}, year = {2020}, url = {https://doi.org/10.1145/3394497}, doi = {10.1145/3394497}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AntonioliTR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AnwarS20, author = {Fatima M. Anwar and Mani B. Srivastava}, title = {A Case for Feedforward Control with Feedback Trim to Mitigate Time Transfer Attacks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {2}, pages = {11:1--11:25}, year = {2020}, url = {https://doi.org/10.1145/3382503}, doi = {10.1145/3382503}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AnwarS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BelmanP20, author = {Amith K. Belman and Vir V. Phoha}, title = {Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {1}, pages = {4:1--4:36}, year = {2020}, url = {https://doi.org/10.1145/3377404}, doi = {10.1145/3377404}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BelmanP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BoshrooyehKO20, author = {Sanaz Taheri Boshrooyeh and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and {\"{O}}znur {\"{O}}zkasap}, title = {Privado: Privacy-preserving Group-based Advertising Using Multiple Independent Social Network Providers}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {3}, pages = {12:1--12:36}, year = {2020}, url = {https://doi.org/10.1145/3386154}, doi = {10.1145/3386154}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BoshrooyehKO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChoHKCPLBK20, author = {Geumhwan Cho and Jun Ho Huh and Soolin Kim and Junsung Cho and Heesung Park and Yenah Lee and Konstantin Beznosov and Hyoungshick Kim}, title = {On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {4}, pages = {22:1--22:32}, year = {2020}, url = {https://doi.org/10.1145/3410155}, doi = {10.1145/3410155}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChoHKCPLBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DiamantarisMIP20, author = {Michalis Diamantaris and Francesco Marcantoni and Sotiris Ioannidis and Jason Polakis}, title = {The Seven Deadly Sins of the {HTML5} WebAPI: {A} Large-scale Study on the Risks of Mobile Sensor-based Attacks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {4}, pages = {19:1--19:31}, year = {2020}, url = {https://doi.org/10.1145/3403947}, doi = {10.1145/3403947}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DiamantarisMIP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HoangYG20, author = {Thang Hoang and Attila A. Yavuz and Jorge Guajardo}, title = {A Multi-server {ORAM} Framework with Constant Client Bandwidth Blowup}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {1}, pages = {1:1--1:35}, year = {2020}, url = {https://doi.org/10.1145/3369108}, doi = {10.1145/3369108}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/HoangYG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HuZL20, author = {Zhisheng Hu and Minghui Zhu and Peng Liu}, title = {Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based {POMDP}}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {1}, pages = {6:1--6:25}, year = {2020}, url = {https://doi.org/10.1145/3418897}, doi = {10.1145/3418897}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HuZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Hurley-SmithH20, author = {Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {3}, pages = {16:1--16:25}, year = {2020}, url = {https://doi.org/10.1145/3398726}, doi = {10.1145/3398726}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Hurley-SmithH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/IkramMTKLE20, author = {Muhammad Ikram and Rahat Masood and Gareth Tyson and Mohamed Ali K{\^{a}}afar and Noha Loizon and Roya Ensafi}, title = {Measuring and Analysing the Chain of Implicit Trust: {A} Study of Third-party Resources Loading}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {2}, pages = {8:1--8:27}, year = {2020}, url = {https://doi.org/10.1145/3380466}, doi = {10.1145/3380466}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/IkramMTKLE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KaregarPF20, author = {Farzaneh Karegar and John S{\"{o}}ren Pettersson and Simone Fischer{-}H{\"{u}}bner}, title = {The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {1}, pages = {5:1--5:38}, year = {2020}, url = {https://doi.org/10.1145/3372296}, doi = {10.1145/3372296}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KaregarPF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KhanHV20, author = {Hassan Khan and Urs Hengartner and Daniel Vogel}, title = {Mimicry Attacks on Smartphone Keystroke Authentication}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {1}, pages = {2:1--2:34}, year = {2020}, url = {https://doi.org/10.1145/3372420}, doi = {10.1145/3372420}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KhanHV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LanotteMMV20, author = {Ruggero Lanotte and Massimo Merro and Andrei Munteanu and Luca Vigan{\`{o}}}, title = {A Formal Approach to Physics-based Attacks in Cyber-physical Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {1}, pages = {3:1--3:41}, year = {2020}, url = {https://doi.org/10.1145/3373270}, doi = {10.1145/3373270}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LanotteMMV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MeylanCCHBH20, author = {Alexandre Meylan and Mauro Cherubini and Bertil Chapuis and Mathias Humbert and Igor Bilogrevic and K{\'{e}}vin Huguenin}, title = {A Study on the Use of Checksums for Integrity Verification of Web Downloads}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {1}, pages = {4:1--4:36}, year = {2020}, url = {https://doi.org/10.1145/3410154}, doi = {10.1145/3410154}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MeylanCCHBH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NabeelKGY20, author = {Mohamed Nabeel and Issa M. Khalil and Bei Guan and Ting Yu}, title = {Following Passive {DNS} Traces to Detect Stealthy Malicious Domains Via Graph Inference}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {4}, pages = {17:1--17:36}, year = {2020}, url = {https://doi.org/10.1145/3401897}, doi = {10.1145/3401897}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/NabeelKGY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NaorRS20, author = {Moni Naor and Lior Rotem and Gil Segev}, title = {The Security of Lazy Users in Out-of-Band Authentication}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {2}, pages = {9:1--9:32}, year = {2020}, url = {https://doi.org/10.1145/3377849}, doi = {10.1145/3377849}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/NaorRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ParkerHRMLVMF20, author = {James Parker and Michael Hicks and Andrew Ruef and Michelle L. Mazurek and Dave Levin and Daniel Votipka and Piotr Mardziel and Kelsey R. Fulton}, title = {Build It, Break It, Fix It: Contesting Secure Development}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {2}, pages = {10:1--10:36}, year = {2020}, url = {https://doi.org/10.1145/3383773}, doi = {10.1145/3383773}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ParkerHRMLVMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RizviF20, author = {Syed Zain R. Rizvi and Philip W. L. Fong}, title = {Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {4}, pages = {18:1--18:33}, year = {2020}, url = {https://doi.org/10.1145/3401027}, doi = {10.1145/3401027}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/RizviF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SamtaniZC20, author = {Sagar Samtani and Hongyi Zhu and Hsinchun Chen}, title = {Proactively Identifying Emerging Hacker Threats from the Dark Web: {A} Diachronic Graph Embedding Framework {(D-GEF)}}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {4}, pages = {21:1--21:33}, year = {2020}, url = {https://doi.org/10.1145/3409289}, doi = {10.1145/3409289}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SamtaniZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SciarrettaCRV20, author = {Giada Sciarretta and Roberto Carbone and Silvio Ranise and Luca Vigan{\`{o}}}, title = {Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {3}, pages = {13:1--13:37}, year = {2020}, url = {https://doi.org/10.1145/3386685}, doi = {10.1145/3386685}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SciarrettaCRV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShinNKK20, author = {Hocheol Shin and Juhwan Noh and Dohyun Kim and Yongdae Kim}, title = {The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {3}, pages = {15:1--15:32}, year = {2020}, url = {https://doi.org/10.1145/3393926}, doi = {10.1145/3393926}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ShinNKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShreeveHEAFR20, author = {Benjamin Shreeve and Joseph Hallett and Matthew Edwards and Pauline Anthonysamy and Sylvain Frey and Awais Rashid}, title = {"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {1}, pages = {5:1--5:29}, year = {2020}, url = {https://doi.org/10.1145/3419101}, doi = {10.1145/3419101}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ShreeveHEAFR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WuL20, author = {Fang{-}Jing Wu and Tie Luo}, title = {CrowdPrivacy: Publish More Useful Data with Less Privacy Exposure in Crowdsourced Location-Based Services}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {1}, pages = {6:1--6:25}, year = {2020}, url = {https://doi.org/10.1145/3375752}, doi = {10.1145/3375752}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WuL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YeTFZFXCHW20, author = {Guixin Ye and Zhanyong Tang and Dingyi Fang and Zhanxing Zhu and Yansong Feng and Pengfei Xu and Xiaojiang Chen and Jungong Han and Zheng Wang}, title = {Using Generative Adversarial Networks to Break and Protect Text Captchas}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {2}, pages = {7:1--7:29}, year = {2020}, url = {https://doi.org/10.1145/3378446}, doi = {10.1145/3378446}, timestamp = {Mon, 16 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YeTFZFXCHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhaoAKTY20, author = {Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar and Francesca Trevisan and Haiyue Yuan}, title = {Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {1}, pages = {1:1--1:33}, year = {2020}, url = {https://doi.org/10.1145/3414844}, doi = {10.1145/3414844}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZhaoAKTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CantaliECE19, author = {Gokcan Cantali and Orhan Ermis and Mehmet Ufuk {\c{C}}aglayan and Cem Ersoy}, title = {Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {4}, pages = {20:1--20:36}, year = {2019}, url = {https://doi.org/10.1145/3342998}, doi = {10.1145/3342998}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CantaliECE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CecconelloCCLT19, author = {Stefano Cecconello and Alberto Compagno and Mauro Conti and Daniele Lain and Gene Tsudik}, title = {Skype {\&} Type: Keyboard Eavesdropping in Voice-over-IP}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {4}, pages = {24:1--24:34}, year = {2019}, url = {https://doi.org/10.1145/3365366}, doi = {10.1145/3365366}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CecconelloCCLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JansenTGWSS18, author = {Rob Jansen and Matthew Traudt and John Geddes and Chris Wacek and Micah Sherr and Paul Syverson}, title = {{KIST:} Kernel-Informed Socket Transport for Tor}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {3:1--3:37}, year = {2019}, url = {https://doi.org/10.1145/3278121}, doi = {10.1145/3278121}, timestamp = {Fri, 10 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JansenTGWSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JinP19, author = {Hongyu Jin and Panos Papadimitratos}, title = {Resilient Privacy Protection for Location-Based Services through Decentralization}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {4}, pages = {21:1--21:36}, year = {2019}, url = {https://doi.org/10.1145/3319401}, doi = {10.1145/3319401}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/JinP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KreutzYRV19, author = {Diego Kreutz and Jiangshan Yu and Fernando M. V. Ramos and Paulo Jorge Esteves Ver{\'{\i}}ssimo}, title = {{ANCHOR:} Logically Centralized Security for Software-Defined Networks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {2}, pages = {8:1--8:36}, year = {2019}, url = {https://doi.org/10.1145/3301305}, doi = {10.1145/3301305}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KreutzYRV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KwonYCP19, author = {Donghyun Kwon and Hayoon Yi and Yeongpil Cho and Yunheung Paek}, title = {Safe and Efficient Implementation of a Security System on {ARM} using Intra-level Privilege Separation}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {2}, pages = {10:1--10:30}, year = {2019}, url = {https://doi.org/10.1145/3309698}, doi = {10.1145/3309698}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KwonYCP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MadiJAMWPWD18, author = {Taous Madi and Yosr Jarraya and Amir Alimohammadifar and Suryadipta Majumdar and Yushun Wang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {{ISOTOP:} Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {1:1--1:35}, year = {2019}, url = {https://doi.org/10.1145/3267339}, doi = {10.1145/3267339}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MadiJAMWPWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ModersheimV18, author = {Sebastian M{\"{o}}dersheim and Luca Vigan{\`{o}}}, title = {Alpha-Beta Privacy}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {7:1--7:35}, year = {2019}, url = {https://doi.org/10.1145/3289255}, doi = {10.1145/3289255}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ModersheimV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NohKSSKCK19, author = {Juhwan Noh and Yujin Kwon and Yunmok Son and Hocheol Shin and Dohyun Kim and Jaeyeong Choi and Yongdae Kim}, title = {Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive {GPS} Spoofing}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {2}, pages = {12:1--12:26}, year = {2019}, url = {https://doi.org/10.1145/3309735}, doi = {10.1145/3309735}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/NohKSSKCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OnwuzurikeMACRS19, author = {Lucky Onwuzurike and Enrico Mariconti and Panagiotis Andriotis and Emiliano De Cristofaro and Gordon J. Ross and Gianluca Stringhini}, title = {MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {2}, pages = {14:1--14:34}, year = {2019}, url = {https://doi.org/10.1145/3313391}, doi = {10.1145/3313391}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/OnwuzurikeMACRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OutkinEGWVHHW19, author = {Alexander V. Outkin and Brandon K. Eames and Meghan A. Galiardi and Sarah Walsh and Eric D. Vugrin and Byron Heersink and Jacob A. Hobbs and Gregory D. Wyss}, title = {{GPLADD:} Quantifying Trust in Government and Commercial Systems {A} Game-Theoretic Approach}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {3}, pages = {18:1--18:27}, year = {2019}, url = {https://doi.org/10.1145/3326283}, doi = {10.1145/3326283}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/OutkinEGWVHHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PaganiFB19, author = {Fabio Pagani and Oleksii Fedorov and Davide Balzarotti}, title = {Introducing the Temporal Dimension to Memory Forensics}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {2}, pages = {9:1--9:21}, year = {2019}, url = {https://doi.org/10.1145/3310355}, doi = {10.1145/3310355}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PaganiFB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PomonisPKPK18, author = {Marios Pomonis and Theofilos Petsios and Angelos D. Keromytis and Michalis Polychronakis and Vasileios P. Kemerlis}, title = {Kernel Protection Against Just-In-Time Code Reuse}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {5:1--5:28}, year = {2019}, url = {https://doi.org/10.1145/3277592}, doi = {10.1145/3277592}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PomonisPKPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Powell19, author = {Brian A. Powell}, title = {Malicious Overtones: Hunting Data Theft in the Frequency Domain with One-class Learning}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {4}, pages = {22:1--22:34}, year = {2019}, url = {https://doi.org/10.1145/3360469}, doi = {10.1145/3360469}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Powell19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RaoCBK19, author = {Fang{-}Yu Rao and Jianneng Cao and Elisa Bertino and Murat Kantarcioglu}, title = {Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {3}, pages = {15:1--15:36}, year = {2019}, url = {https://doi.org/10.1145/3318462}, doi = {10.1145/3318462}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/RaoCBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ReavesVSTBTB18, author = {Bradley Reaves and Luis Vargas and Nolen Scaife and Dave Tian and Logan Blue and Patrick Traynor and Kevin R. B. Butler}, title = {Characterizing the Security of the {SMS} Ecosystem with Public Gateways}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {2:1--2:31}, year = {2019}, url = {https://doi.org/10.1145/3268932}, doi = {10.1145/3268932}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ReavesVSTBTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RuotiADHMORSVWZ19, author = {Scott Ruoti and Jeff Andersen and Luke Dickinson and Scott Heidbrink and Tyler Monson and Mark O'Neill and Ken Reese and Brad Spendlove and Elham Vaziripour and Justin Wu and Daniel Zappala and Kent E. Seamons}, title = {A Usability Study of Four Secure Email Tools Using Paired Participants}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {2}, pages = {13:1--13:33}, year = {2019}, url = {https://doi.org/10.1145/3313761}, doi = {10.1145/3313761}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/RuotiADHMORSVWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SenarathGA19, author = {Awanthika Senarath and Marthie Grobler and Nalin Asanka Gamagedara Arachchilage}, title = {Will They Use It or Not? Investigating Software Developers' Intention to Follow Privacy Engineering Methodologies}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {4}, pages = {23:1--23:30}, year = {2019}, url = {https://doi.org/10.1145/3364224}, doi = {10.1145/3364224}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SenarathGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SharifBBR19, author = {Mahmood Sharif and Sruti Bhagavatula and Lujo Bauer and Michael K. Reiter}, title = {A General Framework for Adversarial Examples with Objectives}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {3}, pages = {16:1--16:30}, year = {2019}, url = {https://doi.org/10.1145/3317611}, doi = {10.1145/3317611}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SharifBBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SluganovicRRM18, author = {Ivo Sluganovic and Marc Roeschlin and Kasper Bonne Rasmussen and Ivan Martinovic}, title = {Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {4:1--4:30}, year = {2019}, url = {https://doi.org/10.1145/3281745}, doi = {10.1145/3281745}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SluganovicRRM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Ugarte-PedreroG18, author = {Xabier Ugarte{-}Pedrero and Mariano Graziano and Davide Balzarotti}, title = {A Close Look at a Daily Dataset of Malware Samples}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {6:1--6:30}, year = {2019}, url = {https://doi.org/10.1145/3291061}, doi = {10.1145/3291061}, timestamp = {Fri, 10 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Ugarte-PedreroG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WedajPR19, author = {Samuel Wedaj and Kolin Paul and Vinay J. Ribeiro}, title = {{DADS:} Decentralized Attestation for Device Swarms}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {3}, pages = {19:1--19:29}, year = {2019}, url = {https://doi.org/10.1145/3325822}, doi = {10.1145/3325822}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WedajPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WooAKLM19, author = {Simon S. Woo and Ron Artstein and Elsi Kaiser and Xiao Le and Jelena Mirkovic}, title = {Using Episodic Memory for User Authentication}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {2}, pages = {11:1--11:34}, year = {2019}, url = {https://doi.org/10.1145/3308992}, doi = {10.1145/3308992}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WooAKLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YanLVLFM19, author = {Chao Yan and Bo Li and Yevgeniy Vorobeychik and Aron Laszka and Daniel Fabbri and Bradley A. Malin}, title = {Database Audit Workload Prioritization via Game Theory}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {3}, pages = {17:1--17:21}, year = {2019}, url = {https://doi.org/10.1145/3323924}, doi = {10.1145/3323924}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YanLVLFM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AbdouO18, author = {AbdelRahman Abdou and Paul C. van Oorschot}, title = {Server Location Verification {(SLV)} and Server Location Pinning: Augmenting {TLS} Authentication}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {1}, pages = {1:1--1:26}, year = {2018}, url = {https://doi.org/10.1145/3139294}, doi = {10.1145/3139294}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AbdouO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AlrabaeeSWD18, author = {Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi}, title = {\emph{FOSSIL}: {A} Resilient and Efficient System for Identifying {FOSS} Functions in Malware Binaries}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {8:1--8:34}, year = {2018}, url = {https://doi.org/10.1145/3175492}, doi = {10.1145/3175492}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AlrabaeeSWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BhattacharyaM18, author = {Sarani Bhattacharya and Debdeep Mukhopadhyay}, title = {Utilizing Performance Counters for Compromising Public Key Ciphers}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {1}, pages = {5:1--5:31}, year = {2018}, url = {https://doi.org/10.1145/3156015}, doi = {10.1145/3156015}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BhattacharyaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BotacinGG18, author = {Marcus Botacin and Paulo L{\'{\i}}cio de Geus and Andr{\'{e}} Gr{\'{e}}gio}, title = {Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {1}, pages = {4:1--4:30}, year = {2018}, url = {https://doi.org/10.1145/3152162}, doi = {10.1145/3152162}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BotacinGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CarminatiPCLMZ18, author = {Michele Carminati and Mario Polino and Andrea Continella and Andrea Lanzi and Federico Maggi and Stefano Zanero}, title = {Security Evaluation of a Banking Fraud Analysis System}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {11:1--11:31}, year = {2018}, url = {https://doi.org/10.1145/3178370}, doi = {10.1145/3178370}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CarminatiPCLMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FarrisSCGJ18, author = {Katheryn A. Farris and Ankit Shah and George Cybenko and Rajesh Ganesan and Sushil Jajodia}, title = {{VULCON:} {A} System for Vulnerability Prioritization, Mitigation, and Management}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {4}, pages = {16:1--16:28}, year = {2018}, url = {https://doi.org/10.1145/3196884}, doi = {10.1145/3196884}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/FarrisSCGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GiacobazziM18, author = {Roberto Giacobazzi and Isabella Mastroeni}, title = {Abstract Non-Interference: {A} Unifying Framework for Weakening Information-flow}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {9:1--9:31}, year = {2018}, url = {https://doi.org/10.1145/3175660}, doi = {10.1145/3175660}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GiacobazziM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GongL18, author = {Neil Zhenqiang Gong and Bin Liu}, title = {Attribute Inference Attacks in Online Social Networks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {1}, pages = {3:1--3:30}, year = {2018}, url = {https://doi.org/10.1145/3154793}, doi = {10.1145/3154793}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GongL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KelbertP18, author = {Florian Kelbert and Alexander Pretschner}, title = {Data Usage Control for Distributed Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {12:1--12:32}, year = {2018}, url = {https://doi.org/10.1145/3183342}, doi = {10.1145/3183342}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KelbertP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KimKKYSK18, author = {Jinsu Kim and Dongyoung Koo and Yuna Kim and Hyunsoo Yoon and Junbum Shin and Sungwook Kim}, title = {Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {4}, pages = {17:1--17:30}, year = {2018}, url = {https://doi.org/10.1145/3212509}, doi = {10.1145/3212509}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KimKKYSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LevesqueCSF18, author = {Fanny Lalonde L{\'{e}}vesque and Sonia Chiasson and Anil Somayaji and Jos{\'{e}} M. Fernandez}, title = {Technological and Human Factors of Malware Attacks: {A} Computer Security Clinical Trial Approach}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {4}, pages = {18:1--18:30}, year = {2018}, url = {https://doi.org/10.1145/3210311}, doi = {10.1145/3210311}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LevesqueCSF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PinkasSZ18, author = {Benny Pinkas and Thomas Schneider and Michael Zohner}, title = {Scalable Private Set Intersection Based on {OT} Extension}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {7:1--7:35}, year = {2018}, url = {https://doi.org/10.1145/3154794}, doi = {10.1145/3154794}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PinkasSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShiMA18, author = {Hao Shi and Jelena Mirkovic and Abdulla Alwabel}, title = {Handling Anti-Virtual Machine Techniques in Malicious Software}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {1}, pages = {2:1--2:31}, year = {2018}, url = {https://doi.org/10.1145/3139292}, doi = {10.1145/3139292}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ShiMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SonNCK18, author = {Yunmok Son and Juhwan Noh and Jaeyeong Choi and Yongdae Kim}, title = {GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of {MEMS} Gyroscopes}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {10:1--10:25}, year = {2018}, url = {https://doi.org/10.1145/3177751}, doi = {10.1145/3177751}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SonNCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/StobertB18, author = {Elizabeth Stobert and Robert Biddle}, title = {The Password Life Cycle}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {13:1--13:32}, year = {2018}, url = {https://doi.org/10.1145/3183341}, doi = {10.1145/3183341}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/StobertB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WeiROR18, author = {Fengguo Wei and Sankardas Roy and Xinming Ou and Robby}, title = {Amandroid: {A} Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {14:1--14:32}, year = {2018}, url = {https://doi.org/10.1145/3183575}, doi = {10.1145/3183575}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WeiROR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YeTFCWAW18, author = {Guixin Ye and Zhanyong Tang and Dingyi Fang and Xiaojiang Chen and Willy Wolff and Adam J. Aviv and Zheng Wang}, title = {A Video-based Attack for Android Pattern Lock}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {4}, pages = {19:1--19:31}, year = {2018}, url = {https://doi.org/10.1145/3230740}, doi = {10.1145/3230740}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YeTFCWAW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangBA18, author = {Yihua Zhang and Marina Blanton and Ghada Almashaqbeh}, title = {Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {6:1--6:34}, year = {2018}, url = {https://doi.org/10.1145/3154600}, doi = {10.1145/3154600}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhangBA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangPK18, author = {Yupeng Zhang and Charalampos Papamanthou and Jonathan Katz}, title = {Verifiable Graph Processing}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {4}, pages = {20:1--20:23}, year = {2018}, url = {https://doi.org/10.1145/3233181}, doi = {10.1145/3233181}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhangPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhaoD18, author = {Siqi Zhao and Xuhua Ding}, title = {{FIMCE:} {A} Fully Isolated Micro-Computing Environment for Multicore Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {15:1--15:30}, year = {2018}, url = {https://doi.org/10.1145/3195181}, doi = {10.1145/3195181}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhaoD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ArgyrosPSKP17, author = {George Argyros and Theofilos Petsios and Suphannee Sivakorn and Angelos D. Keromytis and Iasonas Polakis}, title = {Evaluating the Privacy Guarantees of Location Proximity Services}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {4}, pages = {12:1--12:31}, year = {2017}, url = {https://doi.org/10.1145/3007209}, doi = {10.1145/3007209}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ArgyrosPSKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BrandenburgerCK17, author = {Marcus Brandenburger and Christian Cachin and Nikola Knezevic}, title = {Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {3}, pages = {8:1--8:30}, year = {2017}, url = {https://doi.org/10.1145/3079762}, doi = {10.1145/3079762}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BrandenburgerCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CheccoBL17, author = {Alessandro Checco and Giuseppe Bianchi and Douglas J. Leith}, title = {{BLC:} Private Matrix Factorization Recommenders via Automatic Group Learning}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {2}, pages = {4:1--4:25}, year = {2017}, url = {https://doi.org/10.1145/3041760}, doi = {10.1145/3041760}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CheccoBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HumbertAHT17, author = {Mathias Humbert and Erman Ayday and Jean{-}Pierre Hubaux and Amalio Telenti}, title = {Quantifying Interdependent Risks in Genomic Privacy}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {1}, pages = {3:1--3:31}, year = {2017}, url = {https://doi.org/10.1145/3035538}, doi = {10.1145/3035538}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HumbertAHT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/IkramOFCFJKS17, author = {Muhammad Ikram and Lucky Onwuzurike and Shehroze Farooqi and Emiliano De Cristofaro and Arik Friedman and Guillaume Jourjon and Mohamed Ali K{\^{a}}afar and M. Zubair Shafiq}, title = {Measuring, Characterizing, and Detecting Facebook Like Farms}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {4}, pages = {13:1--13:28}, year = {2017}, url = {https://doi.org/10.1145/3121134}, doi = {10.1145/3121134}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/IkramOFCFJKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MartinovicRRT17, author = {Ivan Martinovic and Kasper Bonne Rasmussen and Marc Roeschlin and Gene Tsudik}, title = {Pulse-Response: Exploring Human Body Impedance for Biometric Recognition}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {2}, pages = {6:1--6:31}, year = {2017}, url = {https://doi.org/10.1145/3064645}, doi = {10.1145/3064645}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MartinovicRRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MatsumotoRSKP17, author = {Stephanos Matsumoto and Raphael M. Reischuk and Pawel Szalachowski and Tiffany Hyun{-}Jin Kim and Adrian Perrig}, title = {Authentication Challenges in a Global Environment}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {1}, pages = {1:1--1:34}, year = {2017}, url = {https://doi.org/10.1145/3007208}, doi = {10.1145/3007208}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MatsumotoRSKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MeutznerGNHK17, author = {Hendrik Meutzner and Santosh Gupta and Viet{-}Hung Nguyen and Thorsten Holz and Dorothea Kolossa}, title = {Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language Understanding}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {4}, pages = {10:1--10:31}, year = {2017}, url = {https://doi.org/10.1145/2856820}, doi = {10.1145/2856820}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MeutznerGNHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Munoz-GonzalezS17, author = {Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and Daniele Sgandurra and Andrea Paudice and Emil C. Lupu}, title = {Efficient Attack Graph Analysis through Approximate Inference}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {3}, pages = {10:1--10:30}, year = {2017}, url = {https://doi.org/10.1145/3105760}, doi = {10.1145/3105760}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Munoz-GonzalezS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NoormanBMPMPVGM17, author = {Job Noorman and Jo Van Bulck and Jan Tobias M{\"{u}}hlberg and Frank Piessens and Pieter Maene and Bart Preneel and Ingrid Verbauwhede and Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller and Felix C. Freiling}, title = {Sancus 2.0: {A} Low-Cost Security Architecture for IoT Devices}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {3}, pages = {7:1--7:33}, year = {2017}, url = {https://doi.org/10.1145/3079763}, doi = {10.1145/3079763}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NoormanBMPMPVGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OsterweilBCPSAC17, author = {Leon J. Osterweil and Matt Bishop and Heather M. Conboy and Huong Phan and Borislava I. Simidchieva and George S. Avrunin and Lori A. Clarke and Sean Peisert}, title = {Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {2}, pages = {5:1--5:31}, year = {2017}, url = {https://doi.org/10.1145/3041041}, doi = {10.1145/3041041}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/OsterweilBCPSAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PolyakovRSV17, author = {Yuriy Polyakov and Kurt Rohloff and Gyana Sahu and Vinod Vaikuntanathan}, title = {Fast Proxy Re-Encryption for Publish/Subscribe Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {4}, pages = {14:1--14:31}, year = {2017}, url = {https://doi.org/10.1145/3128607}, doi = {10.1145/3128607}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/PolyakovRSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ReavesBSBBTB17, author = {Bradley Reaves and Jasmine D. Bowers and Nolen Scaife and Adam Bates and Arnav Bhartiya and Patrick Traynor and Kevin R. B. Butler}, title = {Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {3}, pages = {11:1--11:31}, year = {2017}, url = {https://doi.org/10.1145/3092368}, doi = {10.1145/3092368}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ReavesBSBBTB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RulloMSB17, author = {Antonino Rullo and Daniele Midi and Edoardo Serra and Elisa Bertino}, title = {Pareto Optimal Security Resource Allocation for Internet of Things}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {4}, pages = {15:1--15:30}, year = {2017}, url = {https://doi.org/10.1145/3139293}, doi = {10.1145/3139293}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/RulloMSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShokriTT17, author = {Reza Shokri and George Theodorakopoulos and Carmela Troncoso}, title = {Privacy Games Along Location Traces: {A} Game-Theoretic Framework for Optimizing Location Privacy}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {4}, pages = {11:1--11:31}, year = {2017}, url = {https://doi.org/10.1145/3009908}, doi = {10.1145/3009908}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ShokriTT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShuYRJ17, author = {Xiaokui Shu and Danfeng (Daphne) Yao and Naren Ramakrishnan and Trent Jaeger}, title = {Long-Span Program Behavior Modeling and Attack Detection}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {4}, pages = {12:1--12:28}, year = {2017}, url = {https://doi.org/10.1145/3105761}, doi = {10.1145/3105761}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ShuYRJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SuCLBLJ17, author = {Dong Su and Jianneng Cao and Ninghui Li and Elisa Bertino and Min Lyu and Hongxia Jin}, title = {Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {4}, pages = {16:1--16:33}, year = {2017}, url = {https://doi.org/10.1145/3133201}, doi = {10.1145/3133201}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SuCLBLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ToreiniSH17, author = {Ehsan Toreini and Siamak F. Shahandashti and Feng Hao}, title = {Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {3}, pages = {9:1--9:29}, year = {2017}, url = {https://doi.org/10.1145/3092816}, doi = {10.1145/3092816}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ToreiniSH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Wagner17, author = {Isabel Wagner}, title = {Evaluating the Strength of Genomic Privacy Metrics}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {1}, pages = {2:1--2:34}, year = {2017}, url = {https://doi.org/10.1145/3020003}, doi = {10.1145/3020003}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Wagner17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AonghusaL16, author = {Pol Mac Aonghusa and Douglas J. Leith}, title = {Don't Let Google Know I'm Lonely}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {1}, pages = {3:1--3:25}, year = {2016}, url = {https://doi.org/10.1145/2937754}, doi = {10.1145/2937754}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AonghusaL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BenhamoudaJL16, author = {Fabrice Benhamouda and Marc Joye and Beno{\^{\i}}t Libert}, title = {A New Framework for Privacy-Preserving Aggregation of Time-Series Data}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {3}, pages = {10:1--10:21}, year = {2016}, url = {https://doi.org/10.1145/2873069}, doi = {10.1145/2873069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BenhamoudaJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CramptonGGJW16, author = {Jason Crampton and Andrei Gagarin and Gregory Z. Gutin and Mark Jones and Magnus Wahlstr{\"{o}}m}, title = {On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {3}, pages = {8:1--8:29}, year = {2016}, url = {https://doi.org/10.1145/2988239}, doi = {10.1145/2988239}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CramptonGGJW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DongKC16, author = {Zheng Dong and Kevin Kane and L. Jean Camp}, title = {Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {2}, pages = {5:1--5:31}, year = {2016}, url = {https://doi.org/10.1145/2975591}, doi = {10.1145/2975591}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/DongKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/EberzRLM16, author = {Simon Eberz and Kasper Bonne Rasmussen and Vincent Lenders and Ivan Martinovic}, title = {Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {1}, pages = {1:1--1:31}, year = {2016}, url = {https://doi.org/10.1145/2904018}, doi = {10.1145/2904018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/EberzRLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GarayKM16, author = {Juan A. Garay and Vladimir Kolesnikov and Rae McLellan}, title = {{MAC} Precomputation with Applications to Secure Memory}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {2}, pages = {6:1--6:21}, year = {2016}, url = {https://doi.org/10.1145/2943780}, doi = {10.1145/2943780}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GarayKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GutierrezASAA16, author = {Christopher N. Gutierrez and Mohammed H. Almeshekah and Eugene H. Spafford and Mikhail J. Atallah and Jeffrey Avery}, title = {Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {3}, pages = {9:1--9:30}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2996457}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/GutierrezASAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JiLSHB16, author = {Shouling Ji and Weiqing Li and Mudhakar Srivatsa and Jing (Selena) He and Raheem A. Beyah}, title = {General Graph Data De-Anonymization: From Mobility Traces to Social Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {4}, pages = {12:1--12:29}, year = {2016}, url = {https://doi.org/10.1145/2894760}, doi = {10.1145/2894760}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JiLSHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MitropoulosSSK16, author = {Dimitris Mitropoulos and Konstantinos Stroggylos and Diomidis Spinellis and Angelos D. Keromytis}, title = {How to Train Your Browser: Preventing {XSS} Attacks Using Contextual Script Fingerprints}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {1}, pages = {2:1--2:31}, year = {2016}, url = {https://doi.org/10.1145/2939374}, doi = {10.1145/2939374}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MitropoulosSSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OzalpGNS16, author = {Ismet Ozalp and Mehmet Emre Gursoy and Mehmet Ercan Nergiz and Y{\"{u}}cel Saygin}, title = {Privacy-Preserving Publishing of Hierarchical Data}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {3}, pages = {7:1--7:29}, year = {2016}, url = {https://doi.org/10.1145/2976738}, doi = {10.1145/2976738}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/OzalpGNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RahbariniaPA16, author = {Babak Rahbarinia and Roberto Perdisci and Manos Antonakakis}, title = {Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large {ISP} Networks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {2}, pages = {4:1--4:31}, year = {2016}, url = {https://doi.org/10.1145/2960409}, doi = {10.1145/2960409}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/RahbariniaPA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SerwaddaPWKS16, author = {Abdul Serwadda and Vir V. Phoha and Zibo Wang and Rajesh Kumar and Diksha Shukla}, title = {Toward Robotic Robbery on the Touch Screen}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {4}, pages = {14:1--14:25}, year = {2016}, url = {https://doi.org/10.1145/2898353}, doi = {10.1145/2898353}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SerwaddaPWKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShabtaiBRGES16, author = {Asaf Shabtai and Maya Bercovitch and Lior Rokach and Ya'akov (Kobi) Gal and Yuval Elovici and Erez Shmueli}, title = {Behavioral Study of Users When Interacting with Active Honeytokens}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {3}, pages = {9:1--9:21}, year = {2016}, url = {https://doi.org/10.1145/2854152}, doi = {10.1145/2854152}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ShabtaiBRGES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShayKDHMSUBCC16, author = {Richard Shay and Saranga Komanduri and Adam L. Durity and Phillip (Seyoung) Huh and Michelle L. Mazurek and Sean M. Segreti and Blase Ur and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, title = {Designing Password Policies for Strength and Usability}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {4}, pages = {13:1--13:34}, year = {2016}, url = {https://doi.org/10.1145/2891411}, doi = {10.1145/2891411}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ShayKDHMSUBCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhengPW16, author = {Nan Zheng and Aaron Paloski and Haining Wang}, title = {An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {3}, pages = {11:1--11:27}, year = {2016}, url = {https://doi.org/10.1145/2893185}, doi = {10.1145/2893185}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhengPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AlexanderPLC15, author = {Perry Alexander and Lee Pike and Peter A. Loscocco and George Coker}, title = {Model Checking Distributed Mandatory Access Control Policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {2}, pages = {6:1--6:25}, year = {2015}, url = {https://doi.org/10.1145/2785966}, doi = {10.1145/2785966}, timestamp = {Mon, 18 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AlexanderPLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AliA15, author = {Muhammad Qasim Ali and Ehab Al{-}Shaer}, title = {Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {2}, pages = {7:1--7:30}, year = {2015}, url = {https://doi.org/10.1145/2814936}, doi = {10.1145/2814936}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AliA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CarnavaletM15, author = {Xavier de Carn{\'{e}} de Carnavalet and Mohammad Mannan}, title = {A Large-Scale Evaluation of High-Impact Password Strength Meters}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {1}, pages = {1:1--1:32}, year = {2015}, url = {https://doi.org/10.1145/2739044}, doi = {10.1145/2739044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CarnavaletM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChongM15, author = {Stephen Chong and Ron van der Meyden}, title = {Using Architecture to Reason about Information Security}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {2}, pages = {8:1--8:30}, year = {2015}, url = {https://doi.org/10.1145/2829949}, doi = {10.1145/2829949}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChongM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CulnaneRST15, author = {Chris Culnane and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {vVote: {A} Verifiable Voting System}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {1}, pages = {3:1--3:30}, year = {2015}, url = {https://doi.org/10.1145/2746338}, doi = {10.1145/2746338}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CulnaneRST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DingFD15, author = {Steven H. H. Ding and Benjamin C. M. Fung and Mourad Debbabi}, title = {A Visualizable Evidence-Driven Approach for Authorship Attribution}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {3}, pages = {12:1--12:30}, year = {2015}, url = {https://doi.org/10.1145/2699910}, doi = {10.1145/2699910}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DingFD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DoychevKMR15, author = {Goran Doychev and Boris K{\"{o}}pf and Laurent Mauborgne and Jan Reineke}, title = {CacheAudit: {A} Tool for the Static Analysis of Cache Side Channels}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {1}, pages = {4:1--4:32}, year = {2015}, url = {https://doi.org/10.1145/2756550}, doi = {10.1145/2756550}, timestamp = {Wed, 04 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/DoychevKMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ErwayKPT15, author = {C. Christopher Erway and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Charalampos Papamanthou and Roberto Tamassia}, title = {Dynamic Provable Data Possession}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {4}, pages = {15:1--15:29}, year = {2015}, url = {https://doi.org/10.1145/2699909}, doi = {10.1145/2699909}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ErwayKPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KarameARGC15, author = {Ghassan O. Karame and Elli Androulaki and Marc Roeschlin and Arthur Gervais and Srdjan Capkun}, title = {Misbehavior in Bitcoin: {A} Study of Double-Spending and Accountability}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {1}, pages = {2:1--2:32}, year = {2015}, url = {https://doi.org/10.1145/2732196}, doi = {10.1145/2732196}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KarameARGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeeSFKN15, author = {Hyojeong Lee and Jeff Seibert and Dylan Fistrovic and Charles Edwin Killian and Cristina Nita{-}Rotaru}, title = {Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {4}, pages = {13:1--13:34}, year = {2015}, url = {https://doi.org/10.1145/2714565}, doi = {10.1145/2714565}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LeeSFKN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OrenK15, author = {Yossef Oren and Angelos D. Keromytis}, title = {Attacking the Internet Using Broadcast Digital Television}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {4}, pages = {16:1--16:27}, year = {2015}, url = {https://doi.org/10.1145/2723159}, doi = {10.1145/2723159}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/OrenK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PietroO15, author = {Roberto Di Pietro and Gabriele Oligeri}, title = {Silence is Golden: Exploiting Jamming and Radio Silence to Communicate}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {3}, pages = {9:1--9:24}, year = {2015}, url = {https://doi.org/10.1145/2699906}, doi = {10.1145/2699906}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/PietroO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RuppBHP15, author = {Andy Rupp and Foteini Baldimtsi and Gesine Hinterw{\"{a}}lder and Christof Paar}, title = {Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {3}, pages = {10:1--10:31}, year = {2015}, url = {https://doi.org/10.1145/2699904}, doi = {10.1145/2699904}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/RuppBHP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SerraJPRS15, author = {Edoardo Serra and Sushil Jajodia and Andrea Pugliese and Antonino Rullo and V. S. Subrahmanian}, title = {Pareto-Optimal Adversarial Defense of Enterprise Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {3}, pages = {11:1--11:39}, year = {2015}, url = {https://doi.org/10.1145/2699907}, doi = {10.1145/2699907}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SerraJPRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/TanKYK15, author = {Rui Tan and Varun Badrinath Krishna and David K. Y. Yau and Zbigniew T. Kalbarczyk}, title = {Integrity Attacks on Real-Time Pricing in Electric Power Grids}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {2}, pages = {5:1--5:33}, year = {2015}, url = {https://doi.org/10.1145/2790298}, doi = {10.1145/2790298}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/TanKYK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhaoAH15, author = {Ziming Zhao and Gail{-}Joon Ahn and Hongxin Hu}, title = {Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {4}, pages = {14:1--14:37}, year = {2015}, url = {https://doi.org/10.1145/2701423}, doi = {10.1145/2701423}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhaoAH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AllodiM14, author = {Luca Allodi and Fabio Massacci}, title = {Comparing Vulnerability Severity and Exploits Using Case-Control Studies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {1}, pages = {1:1--1:20}, year = {2014}, url = {https://doi.org/10.1145/2630069}, doi = {10.1145/2630069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AllodiM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ArkoudasCC14, author = {Konstantine Arkoudas and Ritu Chadha and C. Jason Chiang}, title = {Sophisticated Access Control via {SMT} and Logical Frameworks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {4}, pages = {17}, year = {2014}, url = {https://doi.org/10.1145/2595222}, doi = {10.1145/2595222}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ArkoudasCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BasinC14, author = {David A. Basin and Cas Cremers}, title = {Know Your Enemy: Compromising Adversaries in Protocol Analysis}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {2}, pages = {7:1--7:31}, year = {2014}, url = {https://doi.org/10.1145/2658996}, doi = {10.1145/2658996}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BasinC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BilgeSBKK14, author = {Leyla Bilge and Sevil Sen and Davide Balzarotti and Engin Kirda and Christopher Kruegel}, title = {Exposure: {A} Passive {DNS} Analysis Service to Detect and Report Malicious Domains}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {4}, pages = {14}, year = {2014}, url = {https://doi.org/10.1145/2584679}, doi = {10.1145/2584679}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BilgeSBKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChapinS14, author = {Peter C. Chapin and Christian Skalka}, title = {SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {2}, pages = {5:1--5:30}, year = {2014}, url = {https://doi.org/10.1145/2644809}, doi = {10.1145/2644809}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ChapinS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChenLY14, author = {Liqun Chen and Hoon Wei Lim and Guomin Yang}, title = {Cross-Domain Password-Based Authenticated Key Exchange Revisited}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {4}, pages = {15}, year = {2014}, url = {https://doi.org/10.1145/2584681}, doi = {10.1145/2584681}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChenLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChenSDM14, author = {Teh{-}Chung Chen and Torin Stepan and Scott Dick and James Miller}, title = {An Anti-Phishing System Employing Diffused Information}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {4}, pages = {16}, year = {2014}, url = {https://doi.org/10.1145/2584680}, doi = {10.1145/2584680}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChenSDM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GiladH14, author = {Yossi Gilad and Amir Herzberg}, title = {Off-Path {TCP} Injection Attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {4}, pages = {13}, year = {2014}, url = {https://doi.org/10.1145/2597173}, doi = {10.1145/2597173}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/GiladH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GotzfriedM14, author = {Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller}, title = {Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {2}, pages = {6:1--6:23}, year = {2014}, url = {https://doi.org/10.1145/2663348}, doi = {10.1145/2663348}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/GotzfriedM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JafariSFB14, author = {Mohammad Jafari and Reihaneh Safavi{-}Naini and Philip W. L. Fong and Ken Barker}, title = {A Framework for Expressing and Enforcing Purpose-Based Privacy Policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {1}, pages = {3:1--3:31}, year = {2014}, url = {https://doi.org/10.1145/2629689}, doi = {10.1145/2629689}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JafariSFB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiGR14, author = {Peng Li and Debin Gao and Michael K. Reiter}, title = {StopWatch: {A} Cloud Architecture for Timing Channel Mitigation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {2}, pages = {8:1--8:28}, year = {2014}, url = {https://doi.org/10.1145/2670940}, doi = {10.1145/2670940}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MarinovicDS14, author = {Srdjan Marinovic and Naranker Dulay and Morris Sloman}, title = {Rumpole: An Introspective Break-Glass Access Control Language}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {1}, pages = {2:1--2:32}, year = {2014}, url = {https://doi.org/10.1145/2629502}, doi = {10.1145/2629502}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MarinovicDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SytaCWWFJ14, author = {Ewa Syta and Henry Corrigan{-}Gibbs and Shu{-}Chun Weng and David Wolinsky and Bryan Ford and Aaron Johnson}, title = {Security Analysis of Accountable Anonymity in Dissent}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {1}, pages = {4:1--4:35}, year = {2014}, url = {https://doi.org/10.1145/2629621}, doi = {10.1145/2629621}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SytaCWWFJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AliAKK13, author = {Muhammad Qasim Ali and Ehab Al{-}Shaer and Hassan Khan and Syed Ali Khayam}, title = {Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {4}, pages = {17:1--17:30}, year = {2013}, url = {https://doi.org/10.1145/2445566.2445569}, doi = {10.1145/2445566.2445569}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AliAKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BasinJKZ13, author = {David A. Basin and Vincent Jug{\'{e}} and Felix Klaedtke and Eugen Zalinescu}, title = {Enforceable Security Policies Revisited}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {1}, pages = {3}, year = {2013}, url = {https://doi.org/10.1145/2487222.2487225}, doi = {10.1145/2487222.2487225}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BasinJKZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BlantonZF13, author = {Marina Blanton and Yihua Zhang and Keith B. Frikken}, title = {Secure and verifiable outsourcing of large-scale biometric computations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {3}, pages = {11}, year = {2013}, url = {https://doi.org/10.1145/2535523}, doi = {10.1145/2535523}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BlantonZF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChengDD13, author = {Yueqiang Cheng and Xuhua Ding and Robert H. Deng}, title = {DriverGuard: Virtualization-Based Fine-Grained Protection on {I/O} Flows}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {2}, pages = {6}, year = {2013}, url = {https://doi.org/10.1145/2516951.2505123}, doi = {10.1145/2516951.2505123}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChengDD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CobbBL13, author = {William E. Cobb and Rusty O. Baldwin and Eric D. Laspe}, title = {Leakage Mapping: {A} Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {1}, pages = {2}, year = {2013}, url = {https://doi.org/10.1145/2487222.2487224}, doi = {10.1145/2487222.2487224}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CobbBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CramptonGY13, author = {Jason Crampton and Gregory Z. Gutin and Anders Yeo}, title = {On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {1}, pages = {4}, year = {2013}, url = {https://doi.org/10.1145/2487222.2487226}, doi = {10.1145/2487222.2487226}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CramptonGY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DriessenHWPH13, author = {Benedikt Driessen and Ralf Hund and Carsten Willems and Christof Paar and Thorsten Holz}, title = {An experimental security analysis of two satphone standards}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {3}, pages = {10}, year = {2013}, url = {https://doi.org/10.1145/2535522}, doi = {10.1145/2535522}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DriessenHWPH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FrankBB13, author = {Mario Frank and Joachim M. Buhmann and David A. Basin}, title = {Role Mining with Probabilistic Models}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {4}, pages = {15:1--15:28}, year = {2013}, url = {https://doi.org/10.1145/2445566.2445567}, doi = {10.1145/2445566.2445567}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/FrankBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FuL13, author = {Yangchun Fu and Zhiqiang Lin}, title = {Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {2}, pages = {7}, year = {2013}, url = {https://doi.org/10.1145/2516951.2505124}, doi = {10.1145/2516951.2505124}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/FuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GiladH13, author = {Yossi Gilad and Amir Herzberg}, title = {Fragmentation Considered Vulnerable}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {4}, pages = {16:1--16:31}, year = {2013}, url = {https://doi.org/10.1145/2445566.2445568}, doi = {10.1145/2445566.2445568}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GiladH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JayaramanTGRC13, author = {Karthick Jayaraman and Mahesh V. Tripunitara and Vijay Ganesh and Martin C. Rinard and Steve J. Chapin}, title = {Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {4}, pages = {18:1--18:28}, year = {2013}, url = {https://doi.org/10.1145/2445566.2445570}, doi = {10.1145/2445566.2445570}, timestamp = {Thu, 27 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JayaramanTGRC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeonardHS13, author = {Thomas Leonard and Martin Hall{-}May and Mike Surridge}, title = {Modelling Access Propagation in Dynamic Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {2}, pages = {5}, year = {2013}, url = {https://doi.org/10.1145/2516951.2516952}, doi = {10.1145/2516951.2516952}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LeonardHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PhilippaertsYMPLW13, author = {Pieter Philippaerts and Yves Younan and Stijn Muylle and Frank Piessens and Sven Lachmund and Thomas Walter}, title = {{CPM:} Masking Code Pointers to Prevent Code Injection Attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {1}, pages = {1}, year = {2013}, url = {https://doi.org/10.1145/2487222.2487223}, doi = {10.1145/2487222.2487223}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/PhilippaertsYMPLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SerwaddaP13, author = {Abdul Serwadda and Vir V. Phoha}, title = {Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {2}, pages = {8}, year = {2013}, url = {https://doi.org/10.1145/2516951.2516960}, doi = {10.1145/2516951.2516960}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SerwaddaP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SunTS0M13, author = {Mengtao Sun and Gang Tan and Joseph Siefers and Bin Zeng and Greg Morrisett}, title = {Bringing java's wild native world under control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {3}, pages = {9}, year = {2013}, url = {https://doi.org/10.1145/2535505}, doi = {10.1145/2535505}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SunTS0M13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WilliamsS13, author = {Peter Williams and Radu Sion}, title = {Access privacy and correctness on untrusted storage}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {3}, pages = {12}, year = {2013}, url = {https://doi.org/10.1145/2535524}, doi = {10.1145/2535524}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WilliamsS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AbadiP12, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, title = {On Protection by Layout Randomization}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {2}, pages = {8:1--8:29}, year = {2012}, url = {https://doi.org/10.1145/2240276.2240279}, doi = {10.1145/2240276.2240279}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AbadiP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BasinBK12, author = {David A. Basin and Samuel J. Burri and G{\"{u}}nter Karjoth}, title = {Dynamic enforcement of abstract separation of duty constraints}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {3}, pages = {13:1--13:30}, year = {2012}, url = {https://doi.org/10.1145/2382448.2382451}, doi = {10.1145/2382448.2382451}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BasinBK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BhargavanFCZ12, author = {Karthikeyan Bhargavan and C{\'{e}}dric Fournet and Ricardo Corin and Eugen Zalinescu}, title = {Verified Cryptographic Implementations for {TLS}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {1}, pages = {3:1--3:32}, year = {2012}, url = {https://doi.org/10.1145/2133375.2133378}, doi = {10.1145/2133375.2133378}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BhargavanFCZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BrennanAG12, author = {Michael Brennan and Sadia Afroz and Rachel Greenstadt}, title = {Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {3}, pages = {12:1--12:22}, year = {2012}, url = {https://doi.org/10.1145/2382448.2382450}, doi = {10.1145/2382448.2382450}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BrennanAG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CamenischG12, author = {Jan Camenisch and Thomas Gro{\ss}}, title = {Efficient Attributes for Anonymous Credentials}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {1}, pages = {4:1--4:30}, year = {2012}, url = {https://doi.org/10.1145/2133375.2133379}, doi = {10.1145/2133375.2133379}, timestamp = {Tue, 12 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CamenischG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DanevCMB12, author = {Boris Danev and Srdjan Capkun and Ramya Jayaram Masti and Thomas S. Benjamin}, title = {Towards Practical Identification of {HF} {RFID} Devices}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {2}, pages = {7:1--7:24}, year = {2012}, url = {https://doi.org/10.1145/2240276.2240278}, doi = {10.1145/2240276.2240278}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/DanevCMB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DannerDKL12, author = {Norman Danner and Sam DeFabbia{-}Kane and Danny Krizanc and Marc Liberatore}, title = {Effectiveness and detection of denial-of-service attacks in tor}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {3}, pages = {11:1--11:25}, year = {2012}, url = {https://doi.org/10.1145/2382448.2382449}, doi = {10.1145/2382448.2382449}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/DannerDKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FeigenbaumJS12, author = {Joan Feigenbaum and Aaron Johnson and Paul F. Syverson}, title = {Probabilistic analysis of onion routing in a black-box model}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {3}, pages = {14:1--14:28}, year = {2012}, url = {https://doi.org/10.1145/2382448.2382452}, doi = {10.1145/2382448.2382452}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/FeigenbaumJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GiladH12, author = {Yossi Gilad and Amir Herzberg}, title = {{LOT:} {A} Defense Against {IP} Spoofing and Flooding Attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {2}, pages = {6:1--6:30}, year = {2012}, url = {https://doi.org/10.1145/2240276.2240277}, doi = {10.1145/2240276.2240277}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GiladH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KhouryT12, author = {Rapha{\"{e}}l Khoury and Nadia Tawbi}, title = {Corrective Enforcement: {A} New Paradigm of Security Policy Enforcement by Monitors}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {2}, pages = {10:1--10:27}, year = {2012}, url = {https://doi.org/10.1145/2240276.2240281}, doi = {10.1145/2240276.2240281}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KhouryT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MittalB12, author = {Prateek Mittal and Nikita Borisov}, title = {Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {1}, pages = {5:1--5:28}, year = {2012}, url = {https://doi.org/10.1145/2133375.2133380}, doi = {10.1145/2133375.2133380}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MittalB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RoemerBSS12, author = {Ryan Roemer and Erik Buchanan and Hovav Shacham and Stefan Savage}, title = {Return-Oriented Programming: Systems, Languages, and Applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {1}, pages = {2:1--2:34}, year = {2012}, url = {https://doi.org/10.1145/2133375.2133377}, doi = {10.1145/2133375.2133377}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/RoemerBSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SyversonJ12, author = {Paul F. Syverson and Somesh Jha}, title = {Guest Editorial: Special Issue on Computer and Communications Security}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {1}, pages = {1:1--1:2}, year = {2012}, url = {https://doi.org/10.1145/2133375.2133376}, doi = {10.1145/2133375.2133376}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SyversonJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YavuzNR12, author = {Attila Altay Yavuz and Peng Ning and Michael K. Reiter}, title = {{BAF} and {FI-BAF:} Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {2}, pages = {9:1--9:28}, year = {2012}, url = {https://doi.org/10.1145/2240276.2240280}, doi = {10.1145/2240276.2240280}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YavuzNR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Appel11, author = {Andrew W. Appel}, title = {Security Seals on Voting Machines: {A} Case Study}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {2}, pages = {18:1--18:29}, year = {2011}, url = {https://doi.org/10.1145/2019599.2019603}, doi = {10.1145/2019599.2019603}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Appel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AtenieseBCHKKPS11, author = {Giuseppe Ateniese and Randal C. Burns and Reza Curtmola and Joseph Herring and Osama Khan and Lea Kissner and Zachary N. J. Peterson and Dawn Song}, title = {Remote data checking using provable data possession}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {12:1--12:34}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952994}, doi = {10.1145/1952982.1952994}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AtenieseBCHKKPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AuTK11, author = {Man Ho Au and Patrick P. Tsang and Apu Kapadia}, title = {{PEREA:} Practical TTP-free revocation of repeatedly misbehaving anonymous users}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {4}, pages = {29:1--29:34}, year = {2011}, url = {https://doi.org/10.1145/2043628.2043630}, doi = {10.1145/2043628.2043630}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AuTK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BasinCSS11, author = {David A. Basin and Srdjan Capkun and Patrick Schaller and Benedikt Schmidt}, title = {Formal Reasoning about Physical Properties of Security Protocols}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {2}, pages = {16:1--16:28}, year = {2011}, url = {https://doi.org/10.1145/2019599.2019601}, doi = {10.1145/2019599.2019601}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BasinCSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BauerGR11, author = {Lujo Bauer and Scott Garriss and Michael K. Reiter}, title = {Detecting and resolving policy misconfigurations in access-control systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {2:1--2:28}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952984}, doi = {10.1145/1952982.1952984}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BauerGR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BetheaCR11, author = {Darrell Bethea and Robert A. Cochran and Michael K. Reiter}, title = {Server-side verification of client behavior in online games}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {4}, pages = {32:1--32:27}, year = {2011}, url = {https://doi.org/10.1145/2043628.2043633}, doi = {10.1145/2043628.2043633}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BetheaCR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BohliP11, author = {Jens{-}Matthias Bohli and Andreas Pashalidis}, title = {Relations among privacy notions}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {4:1--4:24}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952986}, doi = {10.1145/1952982.1952986}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BohliP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BrunsH11, author = {Glenn Bruns and Michael Huth}, title = {Access control via belnap logic: Intuitive, expressive, and analyzable policy composition}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {9:1--9:27}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952991}, doi = {10.1145/1952982.1952991}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BrunsH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BurkhartD11, author = {Martin Burkhart and Xenofontas A. Dimitropoulos}, title = {Privacy-preserving distributed network troubleshooting - bridging the gap between theory and practice}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {4}, pages = {31:1--31:30}, year = {2011}, url = {https://doi.org/10.1145/2043628.2043632}, doi = {10.1145/2043628.2043632}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BurkhartD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BurmesterM11, author = {Mike Burmester and Jorge Munilla}, title = {Lightweight {RFID} authentication with forward and backward security}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {11:1--11:26}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952993}, doi = {10.1145/1952982.1952993}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BurmesterM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Chan-TinHHK11, author = {Eric Chan{-}Tin and Victor Heorhiadi and Nicholas Hopper and Yongdae Kim}, title = {The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {3}, pages = {27:1--27:23}, year = {2011}, url = {https://doi.org/10.1145/2043621.2043627}, doi = {10.1145/2043621.2043627}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Chan-TinHHK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChanSS11, author = {T.{-}H. Hubert Chan and Elaine Shi and Dawn Song}, title = {Private and Continual Release of Statistics}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {3}, pages = {26:1--26:24}, year = {2011}, url = {https://doi.org/10.1145/2043621.2043626}, doi = {10.1145/2043621.2043626}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ChanSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CoullGH11, author = {Scott E. Coull and Matthew Green and Susan Hohenberger}, title = {Access controls for oblivious and anonymous systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {10:1--10:28}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952992}, doi = {10.1145/1952982.1952992}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CoullGH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Crampton11, author = {Jason Crampton}, title = {Practical and efficient cryptographic enforcement of interval-based access control policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {14:1--14:30}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952996}, doi = {10.1145/1952982.1952996}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Crampton11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CrosbyW11, author = {Scott A. Crosby and Dan S. Wallach}, title = {Authenticated Dictionaries: Real-World Costs and Trade-Offs}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {2}, pages = {17:1--17:30}, year = {2011}, url = {https://doi.org/10.1145/2019599.2019602}, doi = {10.1145/2019599.2019602}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CrosbyW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Demsky11, author = {Brian Demsky}, title = {Cross-application data provenance and policy enforcement}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {6:1--6:22}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952988}, doi = {10.1145/1952982.1952988}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Demsky11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DongCN11, author = {Jing Dong and Reza Curtmola and Cristina Nita{-}Rotaru}, title = {Practical defenses against pollution attacks in wireless network coding}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {7:1--7:31}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952989}, doi = {10.1145/1952982.1952989}, timestamp = {Thu, 06 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DongCN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GorantlaBNM11, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis}, title = {Modeling key compromise impersonation attacks on group key exchange protocols}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {4}, pages = {28:1--28:24}, year = {2011}, url = {https://doi.org/10.1145/2043628.2043629}, doi = {10.1145/2043628.2043629}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GorantlaBNM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JoshiC11, author = {James Joshi and Barbara Carminati}, title = {Guest Editorial {SACMAT} 2009 and 2010}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {3}, pages = {22:1--22:2}, year = {2011}, url = {https://doi.org/10.1145/2043621.2043622}, doi = {10.1145/2043621.2043622}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/JoshiC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KrishnanNSW11, author = {Ram Krishnan and Jianwei Niu and Ravi S. Sandhu and William H. Winsborough}, title = {Group-Centric Secure Information-Sharing Models for Isolated Groups}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {3}, pages = {23:1--23:29}, year = {2011}, url = {https://doi.org/10.1145/2043621.2043623}, doi = {10.1145/2043621.2043623}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KrishnanNSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeightonB11, author = {Gregory Leighton and Denilson Barbosa}, title = {Access Control Policy Translation, Verification, and Minimization within Heterogeneous Data Federations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {3}, pages = {25:1--25:28}, year = {2011}, url = {https://doi.org/10.1145/2043621.2043625}, doi = {10.1145/2043621.2043625}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LeightonB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Li11, author = {Ninghui Li}, title = {Introduction to special section SACMAT'08}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {1:1}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952983}, doi = {10.1145/1952982.1952983}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Li11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiDLM11, author = {Yingjiu Li and Robert H. Deng and Junzuo Lai and Changshe Ma}, title = {On two {RFID} privacy notions and their relations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {4}, pages = {30:1--30:23}, year = {2011}, url = {https://doi.org/10.1145/2043628.2043631}, doi = {10.1145/2043628.2043631}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LiDLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiuNR11, author = {Yao Liu and Peng Ning and Michael K. Reiter}, title = {False data injection attacks against state estimation in electric power grids}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {13:1--13:33}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952995}, doi = {10.1145/1952982.1952995}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiuNR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MaoLCJ11, author = {Ziqing Mao and Ninghui Li and Hong Chen and Xuxian Jiang}, title = {Combining Discretionary Policy with Mandatory Information Flow in Operating Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {3}, pages = {24:1--24:27}, year = {2011}, url = {https://doi.org/10.1145/2043621.2043624}, doi = {10.1145/2043621.2043624}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MaoLCJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OligeriCPG11, author = {Gabriele Oligeri and Stefano Chessa and Roberto Di Pietro and Gaetano Giunta}, title = {Robust and efficient authentication of video stream broadcasting}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {5:1--5:25}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952987}, doi = {10.1145/1952982.1952987}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/OligeriCPG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SchneiderWS11, author = {Fred B. Schneider and Kevin Walsh and Emin G{\"{u}}n Sirer}, title = {Nexus authorization logic {(NAL):} Design rationale and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {8:1--8:28}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952990}, doi = {10.1145/1952982.1952990}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SchneiderWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SchreudersMP11, author = {Z. Cliffe Schreuders and Tanya Jane McGill and Christian Payne}, title = {Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and {FBAC-LSM}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {2}, pages = {19:1--19:28}, year = {2011}, url = {https://doi.org/10.1145/2019599.2019604}, doi = {10.1145/2019599.2019604}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SchreudersMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangWGZ11, author = {Tielei Wang and Tao Wei and Guofei Gu and Wei Zou}, title = {Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {2}, pages = {15:1--15:28}, year = {2011}, url = {https://doi.org/10.1145/2019599.2019600}, doi = {10.1145/2019599.2019600}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WangWGZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WeiCBR11, author = {Qiang Wei and Jason Crampton and Konstantin Beznosov and Matei Ripeanu}, title = {Authorization recycling in hierarchical {RBAC} systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {3:1--3:29}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952985}, doi = {10.1145/1952982.1952985}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WeiCBR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WilliamsSS11, author = {Peter Williams and Radu Sion and Miroslava Sot{\'{a}}kov{\'{a}}}, title = {Practical Oblivious Outsourced Storage}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {2}, pages = {20:1--20:28}, year = {2011}, url = {https://doi.org/10.1145/2019599.2019605}, doi = {10.1145/2019599.2019605}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WilliamsSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/XiangHRC11, author = {Guang Xiang and Jason I. Hong and Carolyn P. Ros{\'{e}} and Lorrie Faith Cranor}, title = {{CANTINA+:} {A} Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {2}, pages = {21:1--21:28}, year = {2011}, url = {https://doi.org/10.1145/2019599.2019606}, doi = {10.1145/2019599.2019606}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/XiangHRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BartheRRS10, author = {Gilles Barthe and Tamara Rezk and Alejandro Russo and Andrei Sabelfeld}, title = {Security of multithreaded programs by compilation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {21:1--21:32}, year = {2010}, url = {https://doi.org/10.1145/1805974.1895977}, doi = {10.1145/1805974.1895977}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BartheRRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BeckerN10, author = {Moritz Y. Becker and Sebastian Nanz}, title = {A logic for state-modifying authorization policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {20:1--20:28}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805976}, doi = {10.1145/1805974.1805976}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BeckerN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BishtMV10, author = {Prithvi Bisht and Parthasarathy Madhusudan and V. N. Venkatakrishnan}, title = {{CANDID:} Dynamic candidate evaluations for automatic prevention of {SQL} injection attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {14:1--14:39}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698754}, doi = {10.1145/1698750.1698754}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BishtMV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BiskupL10, author = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Editorial {ESORICS} 2007}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {19:1--19:2}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805975}, doi = {10.1145/1805974.1805975}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BiskupL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BobbaFKKGKP10, author = {Rakeshbabu Bobba and Omid Fatemieh and Fariba Khan and Arindam Khan and Carl A. Gunter and Himanshu Khurana and Manoj Prabhakaran}, title = {Attribute-Based Messaging: Access Control and Confidentiality}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {31:1--31:35}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880025}, doi = {10.1145/1880022.1880025}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BobbaFKKGKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CarminatiFCT10, author = {Barbara Carminati and Elena Ferrari and Jianneng Cao and Kian{-}Lee Tan}, title = {A framework to enforce access control over data streams}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {28:1--28:31}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805984}, doi = {10.1145/1805974.1805984}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CarminatiFCT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CirianiVFJPS10, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Combining fragmentation and encryption to protect privacy in data storage}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {22:1--22:33}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805978}, doi = {10.1145/1805974.1805978}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CirianiVFJPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HicksRCJM10, author = {Boniface Hicks and Sandra Julieta Rueda and Luke St. Clair and Trent Jaeger and Patrick D. McDaniel}, title = {A logical specification and analysis for SELinux {MLS} policy}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {26:1--26:31}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805982}, doi = {10.1145/1805974.1805982}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HicksRCJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HopperVC10, author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan{-}Tin}, title = {How much anonymity does network latency leak?}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {13:1--13:28}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698753}, doi = {10.1145/1698750.1698753}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HopperVC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JiangWX10, author = {Xuxian Jiang and Xinyuan Wang and Dongyan Xu}, title = {Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {12:1--12:28}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698752}, doi = {10.1145/1698750.1698752}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JiangWX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KateZG10, author = {Aniket Kate and Gregory M. Zaverucha and Ian Goldberg}, title = {Pairing-Based Onion Routing with Improved Forward Secrecy}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {29:1--29:32}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880023}, doi = {10.1145/1880022.1880023}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KateZG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeeMW10, author = {Adam J. Lee and Kazuhiro Minami and Marianne Winslett}, title = {On the consistency of distributed proofs with hidden subtrees}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {25:1--25:32}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805981}, doi = {10.1145/1805974.1805981}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LeeMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiHKR10, author = {Feifei Li and Marios Hadjieleftheriou and George Kollios and Leonid Reyzin}, title = {Authenticated Index Structures for Aggregation Queries}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {32:1--32:35}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880026}, doi = {10.1145/1880022.1880026}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LiHKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LibertQY10, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, title = {Key Evolution Systems in Untrusted Update Environments}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {37:1--37:34}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880031}, doi = {10.1145/1880022.1880031}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LibertQY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LysyanskayaTT10, author = {Anna Lysyanskaya and Roberto Tamassia and Nikos Triandopoulos}, title = {Authenticated error-correcting codes with applications to multicast authentication}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {17:1--17:34}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698757}, doi = {10.1145/1698750.1698757}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LysyanskayaTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MolloyCLWLBCL10, author = {Ian M. Molloy and Hong Chen and Tiancheng Li and Qihua Wang and Ninghui Li and Elisa Bertino and Seraphin B. Calo and Jorge Lobo}, title = {Mining Roles with Multiple Objectives}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {36:1--36:35}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880030}, doi = {10.1145/1880022.1880030}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MolloyCLWLBCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MoranN10, author = {Tal Moran and Moni Naor}, title = {Split-ballot voting: Everlasting privacy with distributed trust}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {16:1--16:43}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698756}, doi = {10.1145/1698750.1698756}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MoranN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MukhamedovR10, author = {Aybek Mukhamedov and Mark Dermot Ryan}, title = {Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {41:1--41:29}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880035}, doi = {10.1145/1880022.1880035}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MukhamedovR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NiBLBKKT10, author = {Qun Ni and Elisa Bertino and Jorge Lobo and Carolyn Brodie and Clare{-}Marie Karat and John Karat and Alberto Trombetta}, title = {Privacy-aware role-based access control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {24:1--24:31}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805980}, doi = {10.1145/1805974.1805980}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NiBLBKKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PenningtonGBSG10, author = {Adam G. Pennington and John Linwood Griffin and John S. Bucy and John D. Strunk and Gregory R. Ganger}, title = {Storage-Based Intrusion Detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {30:1--30:27}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880024}, doi = {10.1145/1880022.1880024}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PenningtonGBSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PonecGWB10, author = {Miroslav Ponec and Paul Giura and Joel Wein and Herv{\'{e}} Br{\"{o}}nnimann}, title = {New payload attribution methods for network forensic investigations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {15:1--15:32}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698755}, doi = {10.1145/1698750.1698755}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PonecGWB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Sarkar10, author = {Palash Sarkar}, title = {A Simple and Generic Construction of Authenticated Encryption with Associated Data}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {33:1--33:16}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880027}, doi = {10.1145/1880022.1880027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Sarkar10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SchultzLL10, author = {David A. Schultz and Barbara Liskov and Moses D. Liskov}, title = {{MPSS:} Mobile Proactive Secret Sharing}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {34:1--34:32}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880028}, doi = {10.1145/1880022.1880028}, timestamp = {Fri, 25 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SchultzLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Thuraisingham10, author = {Bhavani Thuraisingham}, title = {Editorial {SACMAT} 2007}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {23:1--23:2}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805979}, doi = {10.1145/1805974.1805979}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Thuraisingham10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/TsangAKS10, author = {Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean W. Smith}, title = {{BLAC:} Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {39:1--39:33}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880033}, doi = {10.1145/1880022.1880033}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/TsangAKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/VaidyaAG10, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo}, title = {The role mining problem: {A} formal perspective}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {27:1--27:31}, year = {2010}, url = {https://doi.org/10.1145/1805974.1895983}, doi = {10.1145/1805974.1895983}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/VaidyaAG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/VimercatiS10, author = {Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Guest editorial: Special issue on computer and communications security}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {11:1--11:2}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698751}, doi = {10.1145/1698750.1698751}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/VimercatiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangGJT10, author = {XiaoFeng Wang and Philippe Golle and Markus Jakobsson and Alex Tsow}, title = {Deterring voluntary trace disclosure in re-encryption mix-networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {18:1--18:24}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698758}, doi = {10.1145/1698750.1698758}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WangGJT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangL10, author = {Qihua Wang and Ninghui Li}, title = {Satisfiability and Resiliency in Workflow Authorization Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {40:1--40:35}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880034}, doi = {10.1145/1880022.1880034}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WangL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WrightBCMM10, author = {Charles V. Wright and Lucas Ballard and Scott E. Coull and Fabian Monrose and Gerald M. Masson}, title = {Uncovering Spoken Phrases in Encrypted Voice over {IP} Conversations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {35:1--35:30}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880029}, doi = {10.1145/1880022.1880029}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WrightBCMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZageN10, author = {David Zage and Cristina Nita{-}Rotaru}, title = {Robust Decentralized Virtual Coordinate Systems in Adversarial Environments}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {38:1--38:34}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880032}, doi = {10.1145/1880022.1880032}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZageN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AbadiBEL09, author = {Mart{\'{\i}}n Abadi and Mihai Budiu and {\'{U}}lfar Erlingsson and Jay Ligatti}, title = {Control-flow integrity principles, implementations, and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {4:1--4:40}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609960}, doi = {10.1145/1609956.1609960}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AbadiBEL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AtallahBFF09, author = {Mikhail J. Atallah and Marina Blanton and Nelly Fazio and Keith B. Frikken}, title = {Dynamic and Efficient Key Management for Access Hierarchies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {18:1--18:43}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455531}, doi = {10.1145/1455526.1455531}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AtallahBFF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BethencourtSW09, author = {John Bethencourt and Dawn Xiaodong Song and Brent Waters}, title = {New Techniques for Private Stream Searching}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {16:1--16:32}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455529}, doi = {10.1145/1455526.1455529}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BethencourtSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BurmesterLMT09, author = {Mike Burmester and Tri Van Le and Breno de Medeiros and Gene Tsudik}, title = {Universally Composable {RFID} Identification and Authentication Protocols}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {4}, pages = {21:1--21:33}, year = {2009}, url = {https://doi.org/10.1145/1513601.1513603}, doi = {10.1145/1513601.1513603}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BurmesterLMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CabukBS09, author = {Serdar Cabuk and Carla E. Brodley and Clay Shields}, title = {{IP} Covert Channel Detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {4}, pages = {22:1--22:29}, year = {2009}, url = {https://doi.org/10.1145/1513601.1513604}, doi = {10.1145/1513601.1513604}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CabukBS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CarminatiFP09, author = {Barbara Carminati and Elena Ferrari and Andrea Perego}, title = {Enforcing access control in Web-based social networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {6:1--6:38}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609962}, doi = {10.1145/1609956.1609962}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CarminatiFP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CrosbyWR09, author = {Scott A. Crosby and Dan S. Wallach and Rudolf H. Riedi}, title = {Opportunities and Limits of Remote Timing Attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {17:1--17:29}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455530}, doi = {10.1145/1455526.1455530}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CrosbyWR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DorrendorfGP09, author = {Leo Dorrendorf and Zvi Gutterman and Benny Pinkas}, title = {Cryptanalysis of the random number generator of the Windows operating system}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {10:1--10:32}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609966}, doi = {10.1145/1609956.1609966}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/DorrendorfGP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/EtalleW09, author = {Sandro Etalle and William H. Winsborough}, title = {Maintaining control while delegating trust: Integrity constraints in trust management}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {5:1--5:27}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609961}, doi = {10.1145/1609956.1609961}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/EtalleW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JuelsW09, author = {Ari Juels and Stephen A. Weis}, title = {Defining strong privacy for {RFID}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {7:1--7:23}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609963}, doi = {10.1145/1609956.1609963}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JuelsW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiLW09, author = {Jiangtao Li and Ninghui Li and William H. Winsborough}, title = {Automated trust negotiation using cryptographic credentials}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {2:1--2:35}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609958}, doi = {10.1145/1609956.1609958}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiWT09, author = {Ninghui Li and Qihua Wang and Mahesh V. Tripunitara}, title = {Resiliency Policies in Access Control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {4}, pages = {20:1--20:34}, year = {2009}, url = {https://doi.org/10.1145/1513601.1513602}, doi = {10.1145/1513601.1513602}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiWT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiangSVS09, author = {Zhenkai Liang and Weiqing Sun and V. N. Venkatakrishnan and R. Sekar}, title = {Alcatraz: An Isolated Environment for Experimenting with Untrusted Software}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {14:1--14:37}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455527}, doi = {10.1145/1455526.1455527}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LiangSVS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LigattiBW09, author = {Jay Ligatti and Lujo Bauer and David Walker}, title = {Run-Time Enforcement of Nonsafety Policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {19:1--19:41}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455532}, doi = {10.1145/1455526.1455532}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LigattiBW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Meadows09, author = {Catherine Meadows}, title = {Introduction to {ACM} {TISSEC} special issue on {CCS} 2005}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {1:1--1:2}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609957}, doi = {10.1145/1609956.1609957}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Meadows09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SangS09, author = {Yingpeng Sang and Hong Shen}, title = {Efficient and secure protocols for privacy-preserving set operations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {9:1--9:35}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609965}, doi = {10.1145/1609956.1609965}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SangS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YaoT09, author = {Danfeng Yao and Roberto Tamassia}, title = {Compact and Anonymous Role-Based Authorization Chain}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {15:1--15:27}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455528}, doi = {10.1145/1455526.1455528}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YaoT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhuB09, author = {Ye Zhu and Riccardo Bettati}, title = {Compromising anonymous communication systems using blind source separation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {8:1--8:31}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609964}, doi = {10.1145/1609956.1609964}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhuB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhuangZT09, author = {Li Zhuang and Feng Zhou and J. D. Tygar}, title = {Keyboard acoustic emanations revisited}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {3:1--3:26}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609959}, doi = {10.1145/1609956.1609959}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZhuangZT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AntonatosALA08, author = {Spyros Antonatos and Periklis Akritidis and Vinh The Lam and Kostas G. Anagnostakis}, title = {Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {12:1--12:38}, year = {2008}, url = {https://doi.org/10.1145/1455518.1477941}, doi = {10.1145/1455518.1477941}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AntonatosALA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AvoineJO08, author = {Gildas Avoine and Pascal Junod and Philippe Oechslin}, title = {Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {4}, pages = {17:1--17:22}, year = {2008}, url = {https://doi.org/10.1145/1380564.1380565}, doi = {10.1145/1380564.1380565}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AvoineJO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AwerbuchCHNR08, author = {Baruch Awerbuch and Reza Curtmola and David Holmer and Cristina Nita{-}Rotaru and Herbert Rubens}, title = {{ODSBR:} An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {4}, pages = {6:1--6:35}, year = {2008}, url = {https://doi.org/10.1145/1284680.1341892}, doi = {10.1145/1284680.1341892}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AwerbuchCHNR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BarkerSW08, author = {Steve Barker and Marek J. Sergot and Duminda Wijesekera}, title = {Status-Based Access Control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {1:1--1:47}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410235}, doi = {10.1145/1410234.1410235}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BarkerSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BoldyrevaGOY08, author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum}, title = {New Multiparty Signature Schemes for Network Routing Applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {3:1--3:39}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410237}, doi = {10.1145/1410234.1410237}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BoldyrevaGOY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BouganimNP08, author = {Luc Bouganim and Fran{\c{c}}ois Dang Ngoc and Philippe Pucheral}, title = {Dynamic access-control policies on {XML} encrypted data}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {4}, pages = {4:1--4:37}, year = {2008}, url = {https://doi.org/10.1145/1284680.1284684}, doi = {10.1145/1284680.1284684}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BouganimNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BrandtS08, author = {Felix Brandt and Tuomas Sandholm}, title = {On the Existence of Unconditionally Privacy-Preserving Auction Protocols}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {2}, pages = {6:1--6:21}, year = {2008}, url = {https://doi.org/10.1145/1330332.1330338}, doi = {10.1145/1330332.1330338}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BrandtS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CadarGPDE08, author = {Cristian Cadar and Vijay Ganesh and Peter M. Pawlowski and David L. Dill and Dawson R. Engler}, title = {{EXE:} Automatically Generating Inputs of Death}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {10:1--10:38}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455522}, doi = {10.1145/1455518.1455522}, timestamp = {Thu, 27 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CadarGPDE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChakrabartiWWLF08, author = {Deepayan Chakrabarti and Yang Wang and Chenxi Wang and Jure Leskovec and Christos Faloutsos}, title = {Epidemic thresholds in real networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {4}, pages = {1:1--1:26}, year = {2008}, url = {https://doi.org/10.1145/1284680.1284681}, doi = {10.1145/1284680.1284681}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChakrabartiWWLF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChangS08, author = {Katharine Chang and Kang G. Shin}, title = {Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {3}, pages = {14:1--14:35}, year = {2008}, url = {https://doi.org/10.1145/1341731.1341735}, doi = {10.1145/1341731.1341735}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ChangS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CheonHKO08, author = {Jung Hee Cheon and Nicholas Hopper and Yongdae Kim and Ivan Osipkov}, title = {Provably Secure Timed-Release Public Key Encryption}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {2}, pages = {4:1--4:44}, year = {2008}, url = {https://doi.org/10.1145/1330332.1330336}, doi = {10.1145/1330332.1330336}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CheonHKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GaneriwalPCS08, author = {Saurabh Ganeriwal and Christina P{\"{o}}pper and Srdjan Capkun and Mani B. Srivastava}, title = {Secure Time Synchronization in Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {4}, pages = {23:1--23:35}, year = {2008}, url = {https://doi.org/10.1145/1380564.1380571}, doi = {10.1145/1380564.1380571}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GaneriwalPCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GassendDCTDT08, author = {Blaise Gassend and Marten van Dijk and Dwaine E. Clarke and Emina Torlak and Srinivas Devadas and Pim Tuyls}, title = {Controlled physical random functions and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {4}, pages = {3:1--3:22}, year = {2008}, url = {https://doi.org/10.1145/1284680.1284683}, doi = {10.1145/1284680.1284683}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GassendDCTDT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GolleMM08, author = {Philippe Golle and Frank McSherry and Ilya Mironov}, title = {Data Collection with Self-Enforcing Privacy}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {9:1--9:24}, year = {2008}, url = {https://doi.org/10.1145/1455518.1477940}, doi = {10.1145/1455518.1477940}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/GolleMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HalpernO08, author = {Joseph Y. Halpern and Kevin R. O'Neill}, title = {Secrecy in Multiagent Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {5:1--5:47}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410239}, doi = {10.1145/1410234.1410239}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HalpernO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HalpernW08, author = {Joseph Y. Halpern and Vicky Weissman}, title = {Using First-Order Logic to Reason about Policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {4}, pages = {21:1--21:41}, year = {2008}, url = {https://doi.org/10.1145/1380564.1380569}, doi = {10.1145/1380564.1380569}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HalpernW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JoshiBGZ08, author = {James B. D. Joshi and Elisa Bertino and Arif Ghafoor and Yue Zhang}, title = {Formal foundations for hybrid hierarchies in {GTRBAC}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {4}, pages = {2:1--2:39}, year = {2008}, url = {https://doi.org/10.1145/1284680.1284682}, doi = {10.1145/1284680.1284682}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/JoshiBGZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeeS08, author = {Jooyoung Lee and Douglas R. Stinson}, title = {On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {2}, pages = {1:1--1:35}, year = {2008}, url = {https://doi.org/10.1145/1330332.1330333}, doi = {10.1145/1330332.1330333}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LeeS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeeW08, author = {Adam J. Lee and Marianne Winslett}, title = {Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {8:1--8:33}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455520}, doi = {10.1145/1455518.1455520}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LeeW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeeWBW08, author = {Adam J. Lee and Marianne Winslett and Jim Basney and Von Welch}, title = {The Traust Authorization Service}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {1}, pages = {2:1--2:33}, year = {2008}, url = {https://doi.org/10.1145/1330295.1330297}, doi = {10.1145/1330295.1330297}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LeeWBW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiuNLWD08, author = {Donggang Liu and Peng Ning and An Liu and Cliff Wang and Wenliang Du}, title = {Attack-Resistant Location Estimation in Wireless Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {4}, pages = {22:1--22:39}, year = {2008}, url = {https://doi.org/10.1145/1380564.1380570}, doi = {10.1145/1380564.1380570}, timestamp = {Thu, 15 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LiuNLWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ManoBLJCSS08, author = {Chad D. Mano and Andrew Blaich and Qi Liao and Yingxin Jiang and David A. Cieslak and David Salyers and Aaron Striegel}, title = {{RIPPS:} Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {2}, pages = {2:1--2:23}, year = {2008}, url = {https://doi.org/10.1145/1330332.1330334}, doi = {10.1145/1330332.1330334}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ManoBLJCSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MazzoleniCSB08, author = {Pietro Mazzoleni and Bruno Crispo and Swaminathan Sivasubramanian and Elisa Bertino}, title = {{XACML} Policy Integration Algorithms}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {1}, pages = {4:1--4:29}, year = {2008}, url = {https://doi.org/10.1145/1330295.1330299}, doi = {10.1145/1330295.1330299}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MazzoleniCSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OorschotT08, author = {Paul C. van Oorschot and Julie Thorpe}, title = {On predictive models and user-drawn graphical passwords}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {4}, pages = {5:1--5:33}, year = {2008}, url = {https://doi.org/10.1145/1284680.1284685}, doi = {10.1145/1284680.1284685}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/OorschotT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PangT08, author = {HweeHwa Pang and Kian{-}Lee Tan}, title = {Verifying Completeness of Relational Query Answers from Online Servers}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {2}, pages = {5:1--5:50}, year = {2008}, url = {https://doi.org/10.1145/1330332.1330337}, doi = {10.1145/1330332.1330337}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/PangT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PietroMMPR08, author = {Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei and Alessandro Panconesi and Jaikumar Radhakrishnan}, title = {Redoubtable Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {3}, pages = {13:1--13:22}, year = {2008}, url = {https://doi.org/10.1145/1341731.1341734}, doi = {10.1145/1341731.1341734}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/PietroMMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RadosavacMBK08, author = {Svetlana Radosavac and George V. Moustakides and John S. Baras and Iordanis Koutsopoulos}, title = {An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {4}, pages = {19:1--19:28}, year = {2008}, url = {https://doi.org/10.1145/1380564.1380567}, doi = {10.1145/1380564.1380567}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/RadosavacMBK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Ray08, author = {Indrakshi Ray}, title = {Editorial}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {1}, pages = {1:1}, year = {2008}, url = {https://doi.org/10.1145/1330295.1330296}, doi = {10.1145/1330295.1330296}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Ray08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RyuR08, author = {Young U. Ryu and Hyeun{-}Suk Rhee}, title = {Evaluation of Intrusion Detection Systems Under a Resource Constraint}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {4}, pages = {20:1--20:24}, year = {2008}, url = {https://doi.org/10.1145/1380564.1380566}, doi = {10.1145/1380564.1380566}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/RyuR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/TraynorCWHM08, author = {Patrick Traynor and Michael Chien and Scott Weaver and Boniface Hicks and Patrick D. McDaniel}, title = {Noninvasive Methods for Host Certification}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {3}, pages = {16:1--16:23}, year = {2008}, url = {https://doi.org/10.1145/1341731.1341737}, doi = {10.1145/1341731.1341737}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/TraynorCWHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Tsudik08, author = {Gene Tsudik}, title = {Editorial}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {3}, pages = {11:1}, year = {2008}, url = {https://doi.org/10.1145/1341731.1341732}, doi = {10.1145/1341731.1341732}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Tsudik08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangD08, author = {Wei Wang and Thomas E. Daniels}, title = {A Graph Based Approach Toward Network Forensics Analysis}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {4:1--4:33}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410238}, doi = {10.1145/1410234.1410238}, timestamp = {Wed, 11 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WangD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangLCXRK08, author = {XiaoFeng Wang and Zhuowei Li and Jong Youl Choi and Jun Xu and Michael K. Reiter and Chongkyung Kil}, title = {Fast and Black-box Exploit Detection and Signature Generation for Commodity Software}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {11:1--11:35}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455523}, doi = {10.1145/1455518.1455523}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WangLCXRK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WrightALS08, author = {Matthew K. Wright and Micah Adler and Brian Neil Levine and Clay Shields}, title = {Passive-Logging Attacks Against Anonymous Communications Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {2}, pages = {3:1--3:34}, year = {2008}, url = {https://doi.org/10.1145/1330332.1330335}, doi = {10.1145/1330332.1330335}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WrightALS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WrightV08, author = {Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Guest Editorial: Special Issue on Computer and Communications Security}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {7:1--7:2}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455519}, doi = {10.1145/1455518.1455519}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WrightV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/XieYW08, author = {Mengjun Xie and Heng Yin and Haining Wang}, title = {Thwarting E-mail Spam Laundering}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {13:1--13:32}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455525}, doi = {10.1145/1455518.1455525}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/XieYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/XieZ08, author = {Liang Xie and Sencun Zhu}, title = {Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {3}, pages = {15:1--15:30}, year = {2008}, url = {https://doi.org/10.1145/1341731.1341736}, doi = {10.1145/1341731.1341736}, timestamp = {Sun, 19 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/XieZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/XuC08, author = {Shouhuai Xu and Srdjan Capkun}, title = {Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {2:1--2:37}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410236}, doi = {10.1145/1410234.1410236}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/XuC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YangWZC08, author = {Yi Yang and Xinran Wang and Sencun Zhu and Guohong Cao}, title = {{SDAP:} {A} Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {4}, pages = {18:1--18:43}, year = {2008}, url = {https://doi.org/10.1145/1380564.1380568}, doi = {10.1145/1380564.1380568}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YangWZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YaoFAT08, author = {Danfeng Yao and Keith B. Frikken and Mikhail J. Atallah and Roberto Tamassia}, title = {Private Information: To Reveal or not to Reveal}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {6:1--6:27}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410240}, doi = {10.1145/1410234.1410240}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YaoFAT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangNCS08, author = {Xinwen Zhang and Masayuki Nakae and Michael J. Covington and Ravi S. Sandhu}, title = {Toward a Usage-Based Security Framework for Collaborative Computing Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {1}, pages = {3:1--3:36}, year = {2008}, url = {https://doi.org/10.1145/1330295.1330298}, doi = {10.1145/1330295.1330298}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZhangNCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangYN08, author = {Qing Zhang and Ting Yu and Peng Ning}, title = {A Framework for Identifying Compromised Nodes in Wireless Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {3}, pages = {12:1--12:37}, year = {2008}, url = {https://doi.org/10.1145/1341731.1341733}, doi = {10.1145/1341731.1341733}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZhangYN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AbadiBF07, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet and C{\'{e}}dric Fournet}, title = {Just fast keying in the pi calculus}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {3}, pages = {9}, year = {2007}, url = {https://doi.org/10.1145/1266977.1266978}, doi = {10.1145/1266977.1266978}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AbadiBF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AhmedT07, author = {Tanvir Ahmed and Anand R. Tripathi}, title = {Specification and verification of security requirements in a programming model for decentralized {CSCW} systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {2}, pages = {7}, year = {2007}, url = {https://doi.org/10.1145/1237500.1237503}, doi = {10.1145/1237500.1237503}, timestamp = {Fri, 11 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AhmedT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Ahn07, author = {Gail{-}Joon Ahn}, title = {Guest editorial: Special issue on access control models and technologies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {1}, pages = {1}, year = {2007}, url = {https://doi.org/10.1145/1210263.1216576}, doi = {10.1145/1210263.1216576}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Ahn07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BhargavanCFG07, author = {Karthikeyan Bhargavan and Ricardo Corin and C{\'{e}}dric Fournet and Andrew D. Gordon}, title = {Secure sessions for Web services}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {2}, pages = {8}, year = {2007}, url = {https://doi.org/10.1145/1237500.1237504}, doi = {10.1145/1237500.1237504}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BhargavanCFG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BressonCP07, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, title = {Provably secure authenticated group Diffie-Hellman key exchange}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {3}, pages = {10}, year = {2007}, url = {https://doi.org/10.1145/1266977.1266979}, doi = {10.1145/1266977.1266979}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BressonCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DamianiBCP07, author = {Maria Luisa Damiani and Elisa Bertino and Barbara Catania and Paolo Perlasca}, title = {{GEO-RBAC:} {A} spatially aware {RBAC}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {1}, pages = {2}, year = {2007}, url = {https://doi.org/10.1145/1210263.1210265}, doi = {10.1145/1210263.1210265}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DamianiBCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/IwaiharaHCAW07, author = {Mizuho Iwaihara and Ryotaro Hayashi and Somchai Chatvichienchai and Chutiporn Anutariya and Vilas Wuwongse}, title = {Relevancy-based access control and its evaluation on versioned {XML} documents}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {1}, pages = {3}, year = {2007}, url = {https://doi.org/10.1145/1210263.1210266}, doi = {10.1145/1210263.1210266}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/IwaiharaHCAW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiTB07, author = {Ninghui Li and Mahesh V. Tripunitara and Ziad Bizri}, title = {On mutually exclusive roles and separation-of-duty}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {2}, pages = {5}, year = {2007}, url = {https://doi.org/10.1145/1237500.1237501}, doi = {10.1145/1237500.1237501}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiTB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OorschotWK07, author = {Paul C. van Oorschot and Tao Wan and Evangelos Kranakis}, title = {On interdomain routing security and pretty secure {BGP} (psBGP)}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {3}, pages = {11}, year = {2007}, url = {https://doi.org/10.1145/1266977.1266980}, doi = {10.1145/1266977.1266980}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/OorschotWK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PengBD07, author = {Kun Peng and Colin Boyd and Ed Dawson}, title = {Batch zero-knowledge proof and verification and its applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {2}, pages = {6}, year = {2007}, url = {https://doi.org/10.1145/1237500.1237502}, doi = {10.1145/1237500.1237502}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/PengBD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SquicciariniBFPT07, author = {Anna Cinzia Squicciarini and Elisa Bertino and Elena Ferrari and Federica Paci and Bhavani Thuraisingham}, title = {PP-trust-X: {A} system for privacy preserving trust negotiations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {3}, pages = {12}, year = {2007}, url = {https://doi.org/10.1145/1266977.1266981}, doi = {10.1145/1266977.1266981}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SquicciariniBFPT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhouHRCB07, author = {Jingmin Zhou and Mark R. Heckman and Brennen Reynolds and Adam Carlson and Matt Bishop}, title = {Modeling network intrusion detection alerts for correlation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {1}, pages = {4}, year = {2007}, url = {https://doi.org/10.1145/1210263.1210267}, doi = {10.1145/1210263.1210267}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZhouHRCB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AtenieseFGH06, author = {Giuseppe Ateniese and Kevin Fu and Matthew Green and Susan Hohenberger}, title = {Improved proxy re-encryption schemes with applications to secure distributed storage}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {1}, pages = {1--30}, year = {2006}, url = {https://doi.org/10.1145/1127345.1127346}, doi = {10.1145/1127345.1127346}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AtenieseFGH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BellaP06, author = {Giampaolo Bella and Lawrence C. Paulson}, title = {Accountability protocols: Formalized and verified}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {2}, pages = {138--161}, year = {2006}, url = {https://doi.org/10.1145/1151414.1151416}, doi = {10.1145/1151414.1151416}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BellaP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChandramouliBSU06, author = {Rajarathnam Chandramouli and Satish Bapatla and K. P. Subbalakshmi and R. N. Uma}, title = {Battery power-aware encryption}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {2}, pages = {162--180}, year = {2006}, url = {https://doi.org/10.1145/1151414.1151417}, doi = {10.1145/1151414.1151417}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChandramouliBSU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FutoranskyKSW06, author = {Ariel Futoransky and Emiliano Kargieman and Carlos Sarraute and Ariel Waissbein}, title = {Foundations and applications for secure triggers}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {1}, pages = {94--112}, year = {2006}, url = {https://doi.org/10.1145/1127345.1127349}, doi = {10.1145/1127345.1127349}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/FutoranskyKSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GennaroL06, author = {Rosario Gennaro and Yehuda Lindell}, title = {A framework for password-based authenticated key exchange\({}^{\mbox{1}}\)}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {2}, pages = {181--234}, year = {2006}, url = {https://doi.org/10.1145/1151414.1151418}, doi = {10.1145/1151414.1151418}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GennaroL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KoganSW06, author = {Noam Kogan and Yuval Shavitt and Avishai Wool}, title = {A practical revocation scheme for broadcast encryption using smartcards}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {3}, pages = {325--351}, year = {2006}, url = {https://doi.org/10.1145/1178618.1178622}, doi = {10.1145/1178618.1178622}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KoganSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KoganT06, author = {Noam Kogan and Tamir Tassa}, title = {Improved efficiency for revocation schemes via Newton interpolation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {4}, pages = {461--486}, year = {2006}, url = {https://doi.org/10.1145/1187441.1187444}, doi = {10.1145/1187441.1187444}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KoganT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiT06, author = {Ninghui Li and Mahesh V. Tripunitara}, title = {Security analysis in role-based access control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {4}, pages = {391--420}, year = {2006}, url = {https://doi.org/10.1145/1187441.1187442}, doi = {10.1145/1187441.1187442}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MalvestutoMM06, author = {Francesco M. Malvestuto and Mauro Mezzini and Marina Moscarini}, title = {Auditing sum-queries to make a statistical database secure}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {1}, pages = {31--60}, year = {2006}, url = {https://doi.org/10.1145/1127345.1127347}, doi = {10.1145/1127345.1127347}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MalvestutoMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/McDanielP06, author = {Patrick D. McDaniel and Atul Prakash}, title = {Methods and limitations of security policy reconciliation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {3}, pages = {259--291}, year = {2006}, url = {https://doi.org/10.1145/1178618.1178620}, doi = {10.1145/1178618.1178620}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/McDanielP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MellaFBK06, author = {Giovanni Mella and Elena Ferrari and Elisa Bertino and Yunhua Koglin}, title = {Controlled and cooperative updates of {XML} documents in byzantine and failure-prone distributed systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {4}, pages = {421--460}, year = {2006}, url = {https://doi.org/10.1145/1187441.1187443}, doi = {10.1145/1187441.1187443}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MellaFBK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MurataTKH06, author = {Makoto Murata and Akihiko Tozawa and Michiharu Kudo and Satoshi Hada}, title = {{XML} access control using static analysis}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {3}, pages = {292--324}, year = {2006}, url = {https://doi.org/10.1145/1178618.1178621}, doi = {10.1145/1178618.1178621}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MurataTKH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MutzVVK06, author = {Darren Mutz and Fredrik Valeur and Giovanni Vigna and Christopher Kr{\"{u}}gel}, title = {Anomalous system call detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {1}, pages = {61--93}, year = {2006}, url = {https://doi.org/10.1145/1127345.1127348}, doi = {10.1145/1127345.1127348}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MutzVVK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OhSZ06, author = {Sejong Oh and Ravi S. Sandhu and Xinwen Zhang}, title = {An effective role administration model using organization structure}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {2}, pages = {113--137}, year = {2006}, url = {https://doi.org/10.1145/1151414.1151415}, doi = {10.1145/1151414.1151415}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/OhSZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OorschotS06, author = {Paul C. van Oorschot and Stuart G. Stubblebine}, title = {On countering online dictionary attacks with login histories and humans-in-the-loop}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {3}, pages = {235--258}, year = {2006}, url = {https://doi.org/10.1145/1178618.1178619}, doi = {10.1145/1178618.1178619}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/OorschotS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WinsboroughL06, author = {William H. Winsborough and Ninghui Li}, title = {Safety in automated trust negotiation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {3}, pages = {352--390}, year = {2006}, url = {https://doi.org/10.1145/1178618.1178623}, doi = {10.1145/1178618.1178623}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WinsboroughL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Atluri05, author = {Vijay Atluri}, title = {Preface}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {1}, pages = {2}, year = {2005}, url = {https://doi.org/10.1145/1053283.1053285}, doi = {10.1145/1053283.1053285}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Atluri05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BarrantesAFS05, author = {Elena Gabriela Barrantes and David H. Ackley and Stephanie Forrest and Darko Stefanovic}, title = {Randomized instruction set emulation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {1}, pages = {3--40}, year = {2005}, url = {https://doi.org/10.1145/1053283.1053286}, doi = {10.1145/1053283.1053286}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BarrantesAFS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BhattiGBJ05, author = {Rafae Bhatti and Arif Ghafoor and Elisa Bertino and James Joshi}, title = {{X-GTRBAC:} an XML-based policy specification framework and architecture for enterprise-wide access control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {2}, pages = {187--227}, year = {2005}, url = {https://doi.org/10.1145/1065545.1065547}, doi = {10.1145/1065545.1065547}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BhattiGBJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BhattiSBGJ05, author = {Rafae Bhatti and Basit Shafiq and Elisa Bertino and Arif Ghafoor and James Joshi}, title = {X-gtrbac admin: {A} decentralized administration model for enterprise-wide access control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {4}, pages = {388--423}, year = {2005}, url = {https://doi.org/10.1145/1108906.1108909}, doi = {10.1145/1108906.1108909}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BhattiSBGJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CeselliDVJPS05, author = {Alberto Ceselli and Ernesto Damiani and Sabrina De Capitani di Vimercati and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Modeling and assessing inference exposure in encrypted databases}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {1}, pages = {119--152}, year = {2005}, url = {https://doi.org/10.1145/1053283.1053289}, doi = {10.1145/1053283.1053289}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CeselliDVJPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DojenC05, author = {Reiner Dojen and Tom Coffey}, title = {The concept of layered proving trees and its application to the automation of security protocol verification}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {3}, pages = {287--311}, year = {2005}, url = {https://doi.org/10.1145/1085126.1085128}, doi = {10.1145/1085126.1085128}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/DojenC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DuDHVKK05, author = {Wenliang Du and Jing Deng and Yunghsiang S. Han and Pramod K. Varshney and Jonathan Katz and Aram Khalili}, title = {A pairwise key predistribution scheme for wireless sensor networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {2}, pages = {228--258}, year = {2005}, url = {https://doi.org/10.1145/1065545.1065548}, doi = {10.1145/1065545.1065548}, timestamp = {Tue, 03 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DuDHVKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Ferrari05, author = {Elena Ferrari}, title = {Guest editorial: Special issue on access control models and technologies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {4}, pages = {349--350}, year = {2005}, url = {https://doi.org/10.1145/1108906.1108907}, doi = {10.1145/1108906.1108907}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Ferrari05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GunettiP05, author = {Daniele Gunetti and Claudia Picardi}, title = {Keystroke analysis of free text}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {3}, pages = {312--347}, year = {2005}, url = {https://doi.org/10.1145/1085126.1085129}, doi = {10.1145/1085126.1085129}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/GunettiP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HengartnerS05, author = {Urs Hengartner and Peter Steenkiste}, title = {Access control to people location information}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {4}, pages = {424--456}, year = {2005}, url = {https://doi.org/10.1145/1108906.1108910}, doi = {10.1145/1108906.1108910}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/HengartnerS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiuNL05, author = {Donggang Liu and Peng Ning and Rongfang Li}, title = {Establishing pairwise keys in distributed sensor networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {1}, pages = {41--77}, year = {2005}, url = {https://doi.org/10.1145/1053283.1053287}, doi = {10.1145/1053283.1053287}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiuNL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiuZY05, author = {Peng Liu and Wanyu Zang and Meng Yu}, title = {Incentive-based modeling and inference of attacker intent, objectives, and strategies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {1}, pages = {78--118}, year = {2005}, url = {https://doi.org/10.1145/1053283.1053288}, doi = {10.1145/1053283.1053288}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LiuZY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Sandhu05, author = {Ravi S. Sandhu}, title = {Editorial}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {1}, pages = {1}, year = {2005}, url = {https://doi.org/10.1145/1053283.1053284}, doi = {10.1145/1053283.1053284}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Sandhu05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YeSA05, author = {Zishuang (Eileen) Ye and Sean W. Smith and Denise L. Anthony}, title = {Trusted paths for browsers}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {2}, pages = {153--186}, year = {2005}, url = {https://doi.org/10.1145/1065545.1065546}, doi = {10.1145/1065545.1065546}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/YeSA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangPSP05, author = {Xinwen Zhang and Francesco Parisi{-}Presicce and Ravi S. Sandhu and Jaehong Park}, title = {Formal model and policy specification of usage control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {4}, pages = {351--387}, year = {2005}, url = {https://doi.org/10.1145/1108906.1108908}, doi = {10.1145/1108906.1108908}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZhangPSP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhouSR05, author = {Lidong Zhou and Fred B. Schneider and Robbert van Renesse}, title = {{APSS:} proactive secret sharing in asynchronous systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {3}, pages = {259--286}, year = {2005}, url = {https://doi.org/10.1145/1085126.1085127}, doi = {10.1145/1085126.1085127}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZhouSR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AielloBBCIKR04, author = {William Aiello and Steven M. Bellovin and Matt Blaze and Ran Canetti and John Ioannidis and Angelos D. Keromytis and Omer Reingold}, title = {Just fast keying: Key agreement in a hostile internet}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {242--273}, year = {2004}, url = {https://doi.org/10.1145/996943.996946}, doi = {10.1145/996943.996946}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AielloBBCIKR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AmirKNT04, author = {Yair Amir and Yongdae Kim and Cristina Nita{-}Rotaru and Gene Tsudik}, title = {On the performance of group key agreement protocols}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {3}, pages = {457--488}, year = {2004}, url = {https://doi.org/10.1145/1015040.1015045}, doi = {10.1145/1015040.1015045}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AmirKNT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Ateniese04, author = {Giuseppe Ateniese}, title = {Verifiable encryption of digital signatures and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {1--20}, year = {2004}, url = {https://doi.org/10.1145/984334.984335}, doi = {10.1145/984334.984335}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Ateniese04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BellareKN04, author = {Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre}, title = {Breaking and provably repairing the {SSH} authenticated encryption scheme: {A} case study of the Encode-then-Encrypt-and-MAC paradigm}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {206--241}, year = {2004}, url = {https://doi.org/10.1145/996943.996945}, doi = {10.1145/996943.996945}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BellareKN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CarrierS04, author = {Brian D. Carrier and Clay Shields}, title = {The session token protocol for forensics and traceback}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {3}, pages = {333--362}, year = {2004}, url = {https://doi.org/10.1145/1015040.1015041}, doi = {10.1145/1015040.1015041}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CarrierS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HessHJS04, author = {Adam Hess and Jason E. Holt and Jared Jacobson and Kent E. Seamons}, title = {Content-triggered trust negotiation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {3}, pages = {428--456}, year = {2004}, url = {https://doi.org/10.1145/1015040.1015044}, doi = {10.1145/1015040.1015044}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HessHJS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HuangM04, author = {Dijiang Huang and Deep Medhi}, title = {A key-chain-based keying scheme for many-to-many secure group communication}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {523--552}, year = {2004}, url = {https://doi.org/10.1145/1042031.1042033}, doi = {10.1145/1042031.1042033}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/HuangM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JaegerEZ04, author = {Trent Jaeger and Antony Edwards and Xiaolan Zhang}, title = {Consistency analysis of authorization hook placement in the Linux security modules framework}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {175--205}, year = {2004}, url = {https://doi.org/10.1145/996943.996944}, doi = {10.1145/996943.996944}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/JaegerEZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KimPT04, author = {Yongdae Kim and Adrian Perrig and Gene Tsudik}, title = {Tree-based group key agreement}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {60--96}, year = {2004}, url = {https://doi.org/10.1145/984334.984337}, doi = {10.1145/984334.984337}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KimPT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeviCK04, author = {Albert Levi and M. Ufuk {\c{C}}aglayan and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {21--59}, year = {2004}, url = {https://doi.org/10.1145/984334.984336}, doi = {10.1145/984334.984336}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LeviCK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MontenegroC04, author = {Gabriel Montenegro and Claude Castelluccia}, title = {Crypto-based identifiers (CBIDs): Concepts and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {97--127}, year = {2004}, url = {https://doi.org/10.1145/984334.984338}, doi = {10.1145/984334.984338}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MontenegroC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NingCRX04, author = {Peng Ning and Yun Cui and Douglas S. Reeves and Dingbang Xu}, title = {Techniques and tools for analyzing intrusion alerts}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {274--318}, year = {2004}, url = {https://doi.org/10.1145/996943.996947}, doi = {10.1145/996943.996947}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NingCRX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NingX04, author = {Peng Ning and Dingbang Xu}, title = {Hypothesizing and reasoning about attacks missed by intrusion detection systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {591--627}, year = {2004}, url = {https://doi.org/10.1145/1042031.1042036}, doi = {10.1145/1042031.1042036}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NingX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ParkS04, author = {Jaehong Park and Ravi S. Sandhu}, title = {The UCON\({}_{\mbox{ABC}}\) usage control model}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {128--174}, year = {2004}, url = {https://doi.org/10.1145/984334.984339}, doi = {10.1145/984334.984339}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ParkS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShachamBR04, author = {Hovav Shacham and Dan Boneh and Eric Rescorla}, title = {Client-side caching for {TLS}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {553--575}, year = {2004}, url = {https://doi.org/10.1145/1042031.1042034}, doi = {10.1145/1042031.1042034}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ShachamBR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/StrembeckN04, author = {Mark Strembeck and Gustaf Neumann}, title = {An integrated approach to engineer and enforce context constraints in {RBAC} environments}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {3}, pages = {392--427}, year = {2004}, url = {https://doi.org/10.1145/1015040.1015043}, doi = {10.1145/1015040.1015043}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/StrembeckN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/StubblefieldIR04, author = {Adam Stubblefield and John Ioannidis and Aviel D. Rubin}, title = {A key recovery attack on the 802.11b wired equivalent privacy protocol {(WEP)}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {319--332}, year = {2004}, url = {https://doi.org/10.1145/996943.996948}, doi = {10.1145/996943.996948}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/StubblefieldIR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WalcottB04, author = {Tom Walcott and Matt Bishop}, title = {Traducement: {A} model for record security}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {576--590}, year = {2004}, url = {https://doi.org/10.1145/1042031.1042035}, doi = {10.1145/1042031.1042035}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WalcottB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WeddeL04, author = {Horst F. Wedde and Mario Lischka}, title = {Modular authorization and administration}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {3}, pages = {363--391}, year = {2004}, url = {https://doi.org/10.1145/1015040.1015042}, doi = {10.1145/1015040.1015042}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WeddeL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WrightALS04, author = {Matthew K. Wright and Micah Adler and Brian Neil Levine and Clay Shields}, title = {The predecessor attack: An analysis of a threat to anonymous communications systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {489--522}, year = {2004}, url = {https://doi.org/10.1145/1042031.1042032}, doi = {10.1145/1042031.1042032}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WrightALS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BarkerS03, author = {Steve Barker and Peter J. Stuckey}, title = {Flexible access control policy specification with constraint logic programming}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {4}, pages = {501--546}, year = {2003}, url = {https://doi.org/10.1145/950191.950194}, doi = {10.1145/950191.950194}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BarkerS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BertinoCFP03, author = {Elisa Bertino and Barbara Catania and Elena Ferrari and Paolo Perlasca}, title = {A logical framework for reasoning about access control models}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {1}, pages = {71--127}, year = {2003}, url = {https://doi.org/10.1145/605434.605437}, doi = {10.1145/605434.605437}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BertinoCFP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChariC03, author = {Suresh Chari and Pau{-}Chen Cheng}, title = {BlueBoX: {A} policy-driven, host-based intrusion detection system}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {2}, pages = {173--200}, year = {2003}, url = {https://doi.org/10.1145/762476.762477}, doi = {10.1145/762476.762477}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ChariC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CramptonL03, author = {Jason Crampton and George Loizou}, title = {Administrative scope: {A} foundation for role-based administrative models}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {2}, pages = {201--231}, year = {2003}, url = {https://doi.org/10.1145/762476.762478}, doi = {10.1145/762476.762478}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CramptonL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/EllisonD03, author = {Carl M. Ellison and Steve Dohrmann}, title = {Public-key support for group collaboration}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {4}, pages = {547--565}, year = {2003}, url = {https://doi.org/10.1145/950191.950195}, doi = {10.1145/950191.950195}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/EllisonD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HalpernP03, author = {Joseph Y. Halpern and Riccardo Pucella}, title = {On the relationship between strand spaces and multi-agent systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {1}, pages = {43--70}, year = {2003}, url = {https://doi.org/10.1145/605434.605436}, doi = {10.1145/605434.605436}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HalpernP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JaegerZC03, author = {Trent Jaeger and Xiaolan Zhang and Antony Edwards}, title = {Policy management using access control spaces}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {3}, pages = {327--364}, year = {2003}, url = {https://doi.org/10.1145/937527.937528}, doi = {10.1145/937527.937528}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/JaegerZC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Julisch03, author = {Klaus Julisch}, title = {Clustering intrusion detection alarms to support root cause analysis}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {4}, pages = {443--471}, year = {2003}, url = {https://doi.org/10.1145/950191.950192}, doi = {10.1145/950191.950192}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Julisch03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Karjoth03, author = {G{\"{u}}nter Karjoth}, title = {Access control with {IBM} Tivoli access manager}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {2}, pages = {232--257}, year = {2003}, url = {https://doi.org/10.1145/762476.762479}, doi = {10.1145/762476.762479}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Karjoth03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiGF03, author = {Ninghui Li and Benjamin N. Grosof and Joan Feigenbaum}, title = {Delegation logic: {A} logic-based approach to distributed authorization}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {1}, pages = {128--171}, year = {2003}, url = {https://doi.org/10.1145/605434.605438}, doi = {10.1145/605434.605438}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiGF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ParkCS03, author = {Jung{-}Min Park and Edwin K. P. Chong and Howard Jay Siegel}, title = {Efficient multicast stream authentication using erasure codes}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {2}, pages = {258--285}, year = {2003}, url = {https://doi.org/10.1145/762476.762480}, doi = {10.1145/762476.762480}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ParkCS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PersianoV03, author = {Pino Persiano and Ivan Visconti}, title = {A secure and private system for subscription-based remote services}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {4}, pages = {472--500}, year = {2003}, url = {https://doi.org/10.1145/950191.950193}, doi = {10.1145/950191.950193}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PersianoV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RogawayBB03, author = {Phillip Rogaway and Mihir Bellare and John Black}, title = {{OCB:} {A} block-cipher mode of operation for efficient authenticated encryption}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {3}, pages = {365--403}, year = {2003}, url = {https://doi.org/10.1145/937527.937529}, doi = {10.1145/937527.937529}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/RogawayBB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ThompsonEM03, author = {Mary R. Thompson and Abdelilah Essiari and Srilekha Mudumbai}, title = {Certificate-based authorization policy in a {PKI} environment}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {4}, pages = {566--588}, year = {2003}, url = {https://doi.org/10.1145/950191.950196}, doi = {10.1145/950191.950196}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ThompsonEM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WijesekeraJ03, author = {Duminda Wijesekera and Sushil Jajodia}, title = {A propositional policy algebra for access control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {2}, pages = {286--325}, year = {2003}, url = {https://doi.org/10.1145/762476.762481}, doi = {10.1145/762476.762481}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WijesekeraJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YuWS03, author = {Ting Yu and Marianne Winslett and Kent E. Seamons}, title = {Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {1}, pages = {1--42}, year = {2003}, url = {https://doi.org/10.1145/605434.605435}, doi = {10.1145/605434.605435}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YuWS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangAC03, author = {Longhua Zhang and Gail{-}Joon Ahn and Bei{-}tseng Chu}, title = {A rule-based framework for role-based delegation and revocation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {3}, pages = {404--441}, year = {2003}, url = {https://doi.org/10.1145/937527.937530}, doi = {10.1145/937527.937530}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhangAC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AtluriG02, author = {Vijayalakshmi Atluri and Avigdor Gal}, title = {An authorization model for temporal and derived data: securing information portals}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {1}, pages = {62--94}, year = {2002}, url = {https://doi.org/10.1145/504909.504912}, doi = {10.1145/504909.504912}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AtluriG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BaconMY02, author = {Jean Bacon and Ken Moody and Walt Yao}, title = {A model of {OASIS} role-based access control and its support for active security}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {4}, pages = {492--540}, year = {2002}, url = {https://doi.org/10.1145/581271.581276}, doi = {10.1145/581271.581276}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BaconMY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BergadanoGP02, author = {Francesco Bergadano and Daniele Gunetti and Claudia Picardi}, title = {User authentication through keystroke dynamics}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {4}, pages = {367--397}, year = {2002}, url = {https://doi.org/10.1145/581271.581272}, doi = {10.1145/581271.581272}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BergadanoGP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BernaschiGM02, author = {Massimo Bernaschi and Emanuele Gabrielli and Luigi V. Mancini}, title = {Remus: a security-enhanced operating system}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {1}, pages = {36--61}, year = {2002}, url = {https://doi.org/10.1145/504909.504911}, doi = {10.1145/504909.504911}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BernaschiGM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BertinoF02, author = {Elisa Bertino and Elena Ferrari}, title = {Secure and selective dissemination of {XML} documents}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {3}, pages = {290--331}, year = {2002}, url = {https://doi.org/10.1145/545186.545190}, doi = {10.1145/545186.545190}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BertinoF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BlazeIK02, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis}, title = {Trust management for IPsec}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {2}, pages = {95--118}, year = {2002}, url = {https://doi.org/10.1145/505586.505587}, doi = {10.1145/505586.505587}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BlazeIK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BonattiVS02, author = {Piero A. Bonatti and Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {An algebra for composing access control policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {1}, pages = {1--35}, year = {2002}, url = {https://doi.org/10.1145/504909.504910}, doi = {10.1145/504909.504910}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BonattiVS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DamianiVPS02, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Stefano Paraboschi and Pierangela Samarati}, title = {A fine-grained access control system for {XML} documents}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {2}, pages = {169--202}, year = {2002}, url = {https://doi.org/10.1145/505586.505590}, doi = {10.1145/505586.505590}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/DamianiVPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DeanFS02, author = {Drew Dean and Matthew K. Franklin and Adam Stubblefield}, title = {An algebraic approach to {IP} traceback}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {2}, pages = {119--137}, year = {2002}, url = {https://doi.org/10.1145/505586.505588}, doi = {10.1145/505586.505588}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/DeanFS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GordonL02, author = {Lawrence A. Gordon and Martin P. Loeb}, title = {The economics of information security investment}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {4}, pages = {438--457}, year = {2002}, url = {https://doi.org/10.1145/581271.581274}, doi = {10.1145/581271.581274}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GordonL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HarbitterM02, author = {Alan Harbitter and Daniel A. Menasc{\'{e}}}, title = {A methodology for analyzing the performance of authentication protocols}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {4}, pages = {458--491}, year = {2002}, url = {https://doi.org/10.1145/581271.581275}, doi = {10.1145/581271.581275}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HarbitterM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KochMP02, author = {Manuel Koch and Luigi V. Mancini and Francesco Parisi{-}Presicce}, title = {A graph-based formalism for {RBAC}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {3}, pages = {332--365}, year = {2002}, url = {https://doi.org/10.1145/545186.545191}, doi = {10.1145/545186.545191}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KochMP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LoughryU02, author = {Joe Loughry and David A. Umphress}, title = {Information leakage from optical emanations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {3}, pages = {262--289}, year = {2002}, url = {https://doi.org/10.1145/545186.545189}, doi = {10.1145/545186.545189}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LoughryU02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MichaelG02, author = {Christoph C. Michael and Anup K. Ghosh}, title = {Simple, state-based approaches to program-based anomaly detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {3}, pages = {203--237}, year = {2002}, url = {https://doi.org/10.1145/545186.545187}, doi = {10.1145/545186.545187}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MichaelG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RudysW02, author = {Algis Rudys and Dan S. Wallach}, title = {Termination in language-based systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {2}, pages = {138--168}, year = {2002}, url = {https://doi.org/10.1145/505586.505589}, doi = {10.1145/505586.505589}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/RudysW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SwiftHBDGCGJ02, author = {Michael M. Swift and Anne Hopkins and Peter Brundrett and Cliff Van Dyke and Praerit Garg and Shannon Chan and Mario Goertzel and Gregory Jensenworth}, title = {Improving the granularity of access control for Windows 2000}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {4}, pages = {398--437}, year = {2002}, url = {https://doi.org/10.1145/581271.581273}, doi = {10.1145/581271.581273}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SwiftHBDGCGJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ViegaBKM02, author = {John Viega and J. T. Bloch and Tadayoshi Kohno and Gary McGraw}, title = {Token-based scanning of source code for security problems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {3}, pages = {238--261}, year = {2002}, url = {https://doi.org/10.1145/545186.545188}, doi = {10.1145/545186.545188}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ViegaBKM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BertinoBF01, author = {Elisa Bertino and Piero A. Bonatti and Elena Ferrari}, title = {{TRBAC:} {A} temporal role-based access control model}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {3}, pages = {191--233}, year = {2001}, url = {https://doi.org/10.1145/501978.501979}, doi = {10.1145/501978.501979}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BertinoBF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BertinoCF01, author = {Elisa Bertino and Barbara Catania and Elena Ferrari}, title = {A nested transaction model for multilevel secure database management systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {4}, pages = {321--370}, year = {2001}, url = {https://doi.org/10.1145/503339.503340}, doi = {10.1145/503339.503340}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BertinoCF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChangWJ01, author = {Ho{-}Yen Chang and Shyhtsun Felix Wu and Y. Frank Jou}, title = {Real-time protocol analysis for detecting link-state routing protocol attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {1}, pages = {1--36}, year = {2001}, url = {https://doi.org/10.1145/383775.383776}, doi = {10.1145/383775.383776}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ChangWJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FerraioloSGKC01, author = {David F. Ferraiolo and Ravi S. Sandhu and Serban I. Gavrila and D. Richard Kuhn and Ramaswamy Chandramouli}, title = {Proposed {NIST} standard for role-based access control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {3}, pages = {224--274}, year = {2001}, url = {https://doi.org/10.1145/501978.501980}, doi = {10.1145/501978.501980}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/FerraioloSGKC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JaegerT01, author = {Trent Jaeger and Jonathon Tidswell}, title = {Practical safety in flexible access control models}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {2}, pages = {158--190}, year = {2001}, url = {https://doi.org/10.1145/501963.501966}, doi = {10.1145/501963.501966}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/JaegerT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Kaliski01, author = {Burton S. Kaliski Jr.}, title = {An unknown key-share attack on the {MQV} key agreement protocol}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {3}, pages = {275--288}, year = {2001}, url = {https://doi.org/10.1145/501978.501981}, doi = {10.1145/501978.501981}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Kaliski01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KihlstromMM01, author = {Kim Potter Kihlstrom and Louise E. Moser and P. M. Melliar{-}Smith}, title = {The SecureRing group communication system}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {4}, pages = {371--406}, year = {2001}, url = {https://doi.org/10.1145/503339.503341}, doi = {10.1145/503339.503341}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KihlstromMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NingJW01, author = {Peng Ning and Sushil Jajodia and Xiaoyang Sean Wang}, title = {Abstraction-based intrusion detection in distributed environments}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {4}, pages = {407--452}, year = {2001}, url = {https://doi.org/10.1145/503339.503342}, doi = {10.1145/503339.503342}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NingJW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ParkSA01, author = {Joon S. Park and Ravi S. Sandhu and Gail{-}Joon Ahn}, title = {Role-based access control on the web}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {1}, pages = {37--71}, year = {2001}, url = {https://doi.org/10.1145/383775.383777}, doi = {10.1145/383775.383777}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ParkSA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RodehBD01, author = {Ohad Rodeh and Kenneth P. Birman and Danny Dolev}, title = {The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {3}, pages = {289--319}, year = {2001}, url = {https://doi.org/10.1145/501978.501982}, doi = {10.1145/501978.501982}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/RodehBD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SamaratiRJ01, author = {Pierangela Samarati and Michael K. Reiter and Sushil Jajodia}, title = {An authorization model for a public key management service}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {4}, pages = {453--482}, year = {2001}, url = {https://doi.org/10.1145/503339.503343}, doi = {10.1145/503339.503343}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SamaratiRJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShandsJYS01, author = {Deborah Shands and Jay Jacobs and Richard Yee and E. John Sebes}, title = {Secure virtual enclaves: Supporting coalition use of distributed application technologies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {2}, pages = {103--133}, year = {2001}, url = {https://doi.org/10.1145/501963.501964}, doi = {10.1145/501963.501964}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ShandsJYS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Smith01, author = {Richard E. Smith}, title = {Cost profile of a highly assured, secure operating system}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {1}, pages = {72--101}, year = {2001}, url = {https://doi.org/10.1145/383775.383778}, doi = {10.1145/383775.383778}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Smith01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SteinerBEW01, author = {Michael Steiner and Peter Buhler and Thomas Eirich and Michael Waidner}, title = {Secure password-based cipher suite for {TLS}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {2}, pages = {134--157}, year = {2001}, url = {https://doi.org/10.1145/501963.501965}, doi = {10.1145/501963.501965}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SteinerBEW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AhnS00, author = {Gail{-}Joon Ahn and Ravi S. Sandhu}, title = {Role-based authorization constraints specification}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {4}, pages = {207--226}, year = {2000}, url = {https://doi.org/10.1145/382912.382913}, doi = {10.1145/382912.382913}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AhnS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Axelsson00, author = {Stefan Axelsson}, title = {The base-rate fallacy and the difficulty of intrusion detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {3}, pages = {186--205}, year = {2000}, url = {https://doi.org/10.1145/357830.357849}, doi = {10.1145/357830.357849}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Axelsson00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CramerS00, author = {Ronald Cramer and Victor Shoup}, title = {Signature schemes based on the strong {RSA} assumption}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {3}, pages = {161--185}, year = {2000}, url = {https://doi.org/10.1145/357830.357847}, doi = {10.1145/357830.357847}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CramerS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DolevO00, author = {Shlomi Dolev and Rafail Ostrovsky}, title = {Xor-trees for efficient anonymous multicast and reception}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {2}, pages = {63--84}, year = {2000}, url = {https://doi.org/10.1145/354876.354877}, doi = {10.1145/354876.354877}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DolevO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Frincke00, author = {Deborah A. Frincke}, title = {Balancing cooperation and risk in intrusion detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {1}, pages = {1--29}, year = {2000}, url = {https://doi.org/10.1145/353323.353324}, doi = {10.1145/353323.353324}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Frincke00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeeS00, author = {Wenke Lee and Salvatore J. Stolfo}, title = {A framework for constructing features and models for intrusion detection systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {4}, pages = {227--261}, year = {2000}, url = {https://doi.org/10.1145/382912.382914}, doi = {10.1145/382912.382914}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LeeS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/McHugh00, author = {John McHugh}, title = {Testing Intrusion detection systems: a critique of the 1998 and 1999 {DARPA} intrusion detection system evaluations as performed by Lincoln Laboratory}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {4}, pages = {262--294}, year = {2000}, url = {https://doi.org/10.1145/382912.382923}, doi = {10.1145/382912.382923}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/McHugh00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MolvaP00, author = {Refik Molva and Alain Pannetrat}, title = {Scalable multicast security with dynamic recipient groups}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {3}, pages = {136--160}, year = {2000}, url = {https://doi.org/10.1145/357830.357834}, doi = {10.1145/357830.357834}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MolvaP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OsbornSM00, author = {Sylvia L. Osborn and Ravi S. Sandhu and Qamar Munawer}, title = {Configuring role-based access control to enforce mandatory and discretionary access control policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {2}, pages = {85--106}, year = {2000}, url = {https://doi.org/10.1145/354876.354878}, doi = {10.1145/354876.354878}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/OsbornSM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Schneider00, author = {Fred B. Schneider}, title = {Enforceable security policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {1}, pages = {30--50}, year = {2000}, url = {https://doi.org/10.1145/353323.353382}, doi = {10.1145/353323.353382}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Schneider00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Spinellis00, author = {Diomidis Spinellis}, title = {Reflection as a mechanism for software integrity verification}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {1}, pages = {51--62}, year = {2000}, url = {https://doi.org/10.1145/353323.353383}, doi = {10.1145/353323.353383}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Spinellis00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Wool00, author = {Avishai Wool}, title = {Key management for encrypted broadcast}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {2}, pages = {107--134}, year = {2000}, url = {https://doi.org/10.1145/354876.354879}, doi = {10.1145/354876.354879}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Wool00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BertinoFA99, author = {Elisa Bertino and Elena Ferrari and Vijayalakshmi Atluri}, title = {The Specification and Enforcement of Authorization Constraints in Workflow Management Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {1}, pages = {65--104}, year = {1999}, url = {https://doi.org/10.1145/300830.300837}, doi = {10.1145/300830.300837}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BertinoFA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FerraioloBK99, author = {David F. Ferraiolo and John F. Barkley and D. Richard Kuhn}, title = {A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {1}, pages = {34--64}, year = {1999}, url = {https://doi.org/10.1145/300830.300834}, doi = {10.1145/300830.300834}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/FerraioloBK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GabberGKMM99, author = {Eran Gabber and Phillip B. Gibbons and David M. Kristol and Yossi Matias and Alain J. Mayer}, title = {On secure and pseudonymous client-relationships with multiple servers}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {4}, pages = {390--415}, year = {1999}, url = {https://doi.org/10.1145/330382.330386}, doi = {10.1145/330382.330386}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GabberGKMM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HaleviK99, author = {Shai Halevi and Hugo Krawczyk}, title = {Public-Key Cryptography and Password Protocols}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {3}, pages = {230--268}, year = {1999}, url = {https://doi.org/10.1145/322510.322514}, doi = {10.1145/322510.322514}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/HaleviK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HeviaK99, author = {Alejandro Hevia and Marcos A. Kiwi}, title = {Strength of two data encryption standard implementations under timing attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {4}, pages = {416--437}, year = {1999}, url = {https://doi.org/10.1145/330382.330390}, doi = {10.1145/330382.330390}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/HeviaK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JaegerPLI99, author = {Trent Jaeger and Atul Prakash and Jochen Liedtke and Nayeem Islam}, title = {Flexible Control of Downloaded Executable Content}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {2}, pages = {177--228}, year = {1999}, url = {https://doi.org/10.1145/317087.317091}, doi = {10.1145/317087.317091}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JaegerPLI99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LaneB99, author = {Terran Lane and Carla E. Brodley}, title = {Temporal Sequence Learning and Data Reduction for Anomaly Detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {3}, pages = {295--331}, year = {1999}, url = {https://doi.org/10.1145/322510.322526}, doi = {10.1145/322510.322526}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LaneB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NyanchamaO99, author = {Matunda Nyanchama and Sylvia L. Osborn}, title = {The Role Graph Model and Conflict of Interest}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {1}, pages = {3--33}, year = {1999}, url = {https://doi.org/10.1145/300830.300832}, doi = {10.1145/300830.300832}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NyanchamaO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Paulson99, author = {Lawrence C. Paulson}, title = {Inductive Analysis of the Internet Protocol {TLS}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {3}, pages = {332--351}, year = {1999}, url = {https://doi.org/10.1145/322510.322530}, doi = {10.1145/322510.322530}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Paulson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ReiterS99, author = {Michael K. Reiter and Stuart G. Stubblebine}, title = {Authentication Metric Analysis and Design}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {2}, pages = {138--158}, year = {1999}, url = {https://doi.org/10.1145/317087.317088}, doi = {10.1145/317087.317088}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ReiterS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Sandhu99, author = {Ravi S. Sandhu}, title = {Editorial}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {1}, pages = {1--2}, year = {1999}, url = {https://doi.org/10.1145/300830.317086}, doi = {10.1145/300830.317086}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Sandhu99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SandhuBM99, author = {Ravi S. Sandhu and Venkata Bhamidipati and Qamar Munawer}, title = {The {ARBAC97} Model for Role-Based Administration of Roles}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {1}, pages = {105--135}, year = {1999}, url = {https://doi.org/10.1145/300830.300839}, doi = {10.1145/300830.300839}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SandhuBM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SchneierK99, author = {Bruce Schneier and John Kelsey}, title = {Secure Audit Logs to Support Computer Forensics}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {2}, pages = {159--176}, year = {1999}, url = {https://doi.org/10.1145/317087.317089}, doi = {10.1145/317087.317089}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SchneierK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/StubblebineSG99, author = {Stuart G. Stubblebine and Paul F. Syverson and David M. Goldschlag}, title = {Unlinkable serial transactions: protocols and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {4}, pages = {354--389}, year = {1999}, url = {https://doi.org/10.1145/330382.330384}, doi = {10.1145/330382.330384}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/StubblebineSG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/XuS99, author = {Jun Xu and Mukesh Singhal}, title = {Design of a High-Performance {ATM} Firewall}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {3}, pages = {269--294}, year = {1999}, url = {https://doi.org/10.1145/322510.322520}, doi = {10.1145/322510.322520}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/XuS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BergadanoCR98, author = {Francesco Bergadano and Bruno Crispo and Giancarlo Ruffo}, title = {High Dictionary Compression for Proactive Password Checking}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {1}, number = {1}, pages = {3--25}, year = {1998}, url = {https://doi.org/10.1145/290163.290164}, doi = {10.1145/290163.290164}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BergadanoCR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BertinoVFS98, author = {Elisa Bertino and Sabrina De Capitani di Vimercati and Elena Ferrari and Pierangela Samarati}, title = {Exception-Based Information Flow Control in Object-Oriented Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {1}, number = {1}, pages = {26--65}, year = {1998}, url = {https://doi.org/10.1145/290163.290167}, doi = {10.1145/290163.290167}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BertinoVFS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ReiterR98, author = {Michael K. Reiter and Aviel D. Rubin}, title = {Crowds: Anonymity for Web Transactions}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {1}, number = {1}, pages = {66--92}, year = {1998}, url = {https://doi.org/10.1145/290163.290168}, doi = {10.1145/290163.290168}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ReiterR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Sandhu98, author = {Ravi S. Sandhu}, title = {Editorial}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {1}, number = {1}, pages = {1--2}, year = {1998}, url = {https://doi.org/10.1145/290163.290166}, doi = {10.1145/290163.290166}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Sandhu98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SandhuC98, author = {Ravi S. Sandhu and Fang Chen}, title = {The Multilevel Relational {(MLR)} Data Model}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {1}, number = {1}, pages = {93--132}, year = {1998}, url = {https://doi.org/10.1145/290163.290171}, doi = {10.1145/290163.290171}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SandhuC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.