


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 8
Volume 8, Number 1, February 2005
- Ravi S. Sandhu:

Editorial. 1 - Vijay Atluri

:
Preface. 2 - Elena Gabriela Barrantes, David H. Ackley, Stephanie Forrest

, Darko Stefanovic:
Randomized instruction set emulation. 3-40 - Donggang Liu, Peng Ning, Rongfang Li:

Establishing pairwise keys in distributed sensor networks. 41-77 - Peng Liu, Wanyu Zang, Meng Yu:

Incentive-based modeling and inference of attacker intent, objectives, and strategies. 78-118 - Alberto Ceselli

, Ernesto Damiani
, Sabrina De Capitani di Vimercati
, Sushil Jajodia, Stefano Paraboschi
, Pierangela Samarati
:
Modeling and assessing inference exposure in encrypted databases. 119-152
Volume 8, Number 2, May 2005
- Zishuang (Eileen) Ye, Sean W. Smith, Denise L. Anthony

:
Trusted paths for browsers. 153-186 - Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James Joshi:

X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. 187-227 - Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili:

A pairwise key predistribution scheme for wireless sensor networks. 228-258
Volume 8, Number 3, August 2005
- Lidong Zhou, Fred B. Schneider, Robbert van Renesse:

APSS: proactive secret sharing in asynchronous systems. 259-286 - Reiner Dojen, Tom Coffey:

The concept of layered proving trees and its application to the automation of security protocol verification. 287-311 - Daniele Gunetti

, Claudia Picardi:
Keystroke analysis of free text. 312-347
Volume 8, Number 4, November 2005
- Elena Ferrari

:
Guest editorial: Special issue on access control models and technologies. 349-350 - Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park:

Formal model and policy specification of usage control. 351-387 - Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi:

X-gtrbac admin: A decentralized administration model for enterprise-wide access control. 388-423 - Urs Hengartner, Peter Steenkiste

:
Access control to people location information. 424-456

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














