


default search action
ACM Transactions on Information and System Security, Volume 14
Volume 14, Number 1, May 2011
- Ninghui Li:

Introduction to special section SACMAT'08. 1:1 - Lujo Bauer

, Scott Garriss, Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems. 2:1-2:28 - Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu:

Authorization recycling in hierarchical RBAC systems. 3:1-3:29 - Jens-Matthias Bohli, Andreas Pashalidis:

Relations among privacy notions. 4:1-4:24 - Gabriele Oligeri, Stefano Chessa

, Roberto Di Pietro
, Gaetano Giunta
:
Robust and efficient authentication of video stream broadcasting. 5:1-5:25 - Brian Demsky:

Cross-application data provenance and policy enforcement. 6:1-6:22 - Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:

Practical defenses against pollution attacks in wireless network coding. 7:1-7:31 - Fred B. Schneider, Kevin Walsh, Emin Gün Sirer:

Nexus authorization logic (NAL): Design rationale and applications. 8:1-8:28 - Glenn Bruns, Michael Huth:

Access control via belnap logic: Intuitive, expressive, and analyzable policy composition. 9:1-9:27 - Scott E. Coull, Matthew Green, Susan Hohenberger:

Access controls for oblivious and anonymous systems. 10:1-10:28 - Mike Burmester, Jorge Munilla:

Lightweight RFID authentication with forward and backward security. 11:1-11:26 - Giuseppe Ateniese

, Randal C. Burns
, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary N. J. Peterson, Dawn Song:
Remote data checking using provable data possession. 12:1-12:34 - Yao Liu, Peng Ning, Michael K. Reiter:

False data injection attacks against state estimation in electric power grids. 13:1-13:33 - Jason Crampton:

Practical and efficient cryptographic enforcement of interval-based access control policies. 14:1-14:30
Volume 14, Number 2, September 2011
- Tielei Wang, Tao Wei, Guofei Gu, Wei Zou:

Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution. 15:1-15:28 - David A. Basin, Srdjan Capkun, Patrick Schaller, Benedikt Schmidt:

Formal Reasoning about Physical Properties of Security Protocols. 16:1-16:28 - Scott A. Crosby, Dan S. Wallach:

Authenticated Dictionaries: Real-World Costs and Trade-Offs. 17:1-17:30 - Andrew W. Appel

:
Security Seals on Voting Machines: A Case Study. 18:1-18:29 - Z. Cliffe Schreuders, Tanya Jane McGill

, Christian Payne:
Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM. 19:1-19:28 - Peter Williams, Radu Sion

, Miroslava Sotáková:
Practical Oblivious Outsourced Storage. 20:1-20:28 - Guang Xiang, Jason I. Hong

, Carolyn P. Rosé
, Lorrie Faith Cranor
:
CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites. 21:1-21:28
Volume 14, Number 3, November 2011
- James Joshi, Barbara Carminati

:
Guest Editorial SACMAT 2009 and 2010. 22:1-22:2 - Ram Krishnan

, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough:
Group-Centric Secure Information-Sharing Models for Isolated Groups. 23:1-23:29 - Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang:

Combining Discretionary Policy with Mandatory Information Flow in Operating Systems. 24:1-24:27 - Gregory Leighton, Denilson Barbosa

:
Access Control Policy Translation, Verification, and Minimization within Heterogeneous Data Federations. 25:1-25:28 - T.-H. Hubert Chan, Elaine Shi, Dawn Song:

Private and Continual Release of Statistics. 26:1-26:24 - Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim

:
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems. 27:1-27:23
Volume 14, Number 4, December 2011
- M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis

:
Modeling key compromise impersonation attacks on group key exchange protocols. 28:1-28:24 - Man Ho Au

, Patrick P. Tsang, Apu Kapadia:
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users. 29:1-29:34 - Yingjiu Li, Robert H. Deng

, Junzuo Lai, Changshe Ma:
On two RFID privacy notions and their relations. 30:1-30:23 - Martin Burkhart, Xenofontas A. Dimitropoulos:

Privacy-preserving distributed network troubleshooting - bridging the gap between theory and practice. 31:1-31:30 - Darrell Bethea, Robert A. Cochran, Michael K. Reiter:

Server-side verification of client behavior in online games. 32:1-32:27

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














