Search dblp for Publications

export results for "toc:db/journals/tissec/tissec8.bht:"

 download as .bib file

@article{DBLP:journals/tissec/Atluri05,
  author    = {Vijay Atluri},
  title     = {Preface},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {2},
  year      = {2005}
}
@article{DBLP:journals/tissec/BarrantesAFS05,
  author    = {Elena Gabriela Barrantes and
               David H. Ackley and
               Stephanie Forrest and
               Darko Stefanovic},
  title     = {Randomized instruction set emulation},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {3--40},
  year      = {2005}
}
@article{DBLP:journals/tissec/BhattiGBJ05,
  author    = {Rafae Bhatti and
               Arif Ghafoor and
               Elisa Bertino and
               James Joshi},
  title     = {{X-GTRBAC:} an XML-based policy specification framework and architecture
               for enterprise-wide access control},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {2},
  pages     = {187--227},
  year      = {2005}
}
@article{DBLP:journals/tissec/BhattiSBGJ05,
  author    = {Rafae Bhatti and
               Basit Shafiq and
               Elisa Bertino and
               Arif Ghafoor and
               James Joshi},
  title     = {X-gtrbac admin: {A} decentralized administration model for enterprise-wide
               access control},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {4},
  pages     = {388--423},
  year      = {2005}
}
@article{DBLP:journals/tissec/CeselliDVJPS05,
  author    = {Alberto Ceselli and
               Ernesto Damiani and
               Sabrina De Capitani di Vimercati and
               Sushil Jajodia and
               Stefano Paraboschi and
               Pierangela Samarati},
  title     = {Modeling and assessing inference exposure in encrypted databases},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {119--152},
  year      = {2005}
}
@article{DBLP:journals/tissec/DojenC05,
  author    = {Reiner Dojen and
               Tom Coffey},
  title     = {The concept of layered proving trees and its application to the automation
               of security protocol verification},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {3},
  pages     = {287--311},
  year      = {2005}
}
@article{DBLP:journals/tissec/DuDHVKK05,
  author    = {Wenliang Du and
               Jing Deng and
               Yunghsiang S. Han and
               Pramod K. Varshney and
               Jonathan Katz and
               Aram Khalili},
  title     = {A pairwise key predistribution scheme for wireless sensor networks},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {2},
  pages     = {228--258},
  year      = {2005}
}
@article{DBLP:journals/tissec/Ferrari05,
  author    = {Elena Ferrari},
  title     = {Guest editorial: Special issue on access control models and technologies},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {4},
  pages     = {349--350},
  year      = {2005}
}
@article{DBLP:journals/tissec/GunettiP05,
  author    = {Daniele Gunetti and
               Claudia Picardi},
  title     = {Keystroke analysis of free text},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {3},
  pages     = {312--347},
  year      = {2005}
}
@article{DBLP:journals/tissec/HengartnerS05,
  author    = {Urs Hengartner and
               Peter Steenkiste},
  title     = {Access control to people location information},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {4},
  pages     = {424--456},
  year      = {2005}
}
@article{DBLP:journals/tissec/LiuNL05,
  author    = {Donggang Liu and
               Peng Ning and
               Rongfang Li},
  title     = {Establishing pairwise keys in distributed sensor networks},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {41--77},
  year      = {2005}
}
@article{DBLP:journals/tissec/LiuZY05,
  author    = {Peng Liu and
               Wanyu Zang and
               Meng Yu},
  title     = {Incentive-based modeling and inference of attacker intent, objectives,
               and strategies},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {78--118},
  year      = {2005}
}
@article{DBLP:journals/tissec/Sandhu05,
  author    = {Ravi S. Sandhu},
  title     = {Editorial},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {1},
  year      = {2005}
}
@article{DBLP:journals/tissec/YeSA05,
  author    = {Zishuang (Eileen) Ye and
               Sean W. Smith and
               Denise Anthony},
  title     = {Trusted paths for browsers},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {2},
  pages     = {153--186},
  year      = {2005}
}
@article{DBLP:journals/tissec/ZhangPSP05,
  author    = {Xinwen Zhang and
               Francesco Parisi{-}Presicce and
               Ravi S. Sandhu and
               Jaehong Park},
  title     = {Formal model and policy specification of usage control},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {4},
  pages     = {351--387},
  year      = {2005}
}
@article{DBLP:journals/tissec/ZhouSR05,
  author    = {Lidong Zhou and
               Fred B. Schneider and
               Robbert van Renesse},
  title     = {{APSS:} proactive secret sharing in asynchronous systems},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {3},
  pages     = {259--286},
  year      = {2005}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics