


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 9
Volume 9, Number 1, February 2006
- Giuseppe Ateniese

, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved proxy re-encryption schemes with applications to secure distributed storage. 1-30 - Francesco M. Malvestuto, Mauro Mezzini

, Marina Moscarini:
Auditing sum-queries to make a statistical database secure. 31-60 - Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel:

Anomalous system call detection. 61-93 - Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute

, Ariel Waissbein:
Foundations and applications for secure triggers. 94-112
Volume 9, Number 2, May 2006
- Sejong Oh, Ravi S. Sandhu, Xinwen Zhang:

An effective role administration model using organization structure. 113-137 - Giampaolo Bella

, Lawrence C. Paulson
:
Accountability protocols: Formalized and verified. 138-161 - Rajarathnam Chandramouli

, Satish Bapatla, K. P. Subbalakshmi
, R. N. Uma:
Battery power-aware encryption. 162-180 - Rosario Gennaro, Yehuda Lindell

:
A framework for password-based authenticated key exchange1. 181-234
Volume 9, Number 3, August 2006
- Paul C. van Oorschot

, Stuart G. Stubblebine:
On countering online dictionary attacks with login histories and humans-in-the-loop. 235-258 - Patrick D. McDaniel, Atul Prakash

:
Methods and limitations of security policy reconciliation. 259-291 - Makoto Murata

, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada:
XML access control using static analysis. 292-324 - Noam Kogan, Yuval Shavitt

, Avishai Wool
:
A practical revocation scheme for broadcast encryption using smartcards. 325-351 - William H. Winsborough, Ninghui Li:

Safety in automated trust negotiation. 352-390
Volume 9, Number 4, November 2006
- Ninghui Li, Mahesh V. Tripunitara:

Security analysis in role-based access control. 391-420 - Giovanni Mella, Elena Ferrari

, Elisa Bertino, Yunhua Koglin:
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems. 421-460 - Noam Kogan, Tamir Tassa:

Improved efficiency for revocation schemes via Newton interpolation. 461-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














