


default search action
ACM Transactions on Information and System Security, Volume 17
Volume 17, Number 1, August 2014
- Luca Allodi

, Fabio Massacci
:
Comparing Vulnerability Severity and Exploits Using Case-Control Studies. 1:1-1:20 - Srdjan Marinovic, Naranker Dulay, Morris Sloman

:
Rumpole: An Introspective Break-Glass Access Control Language. 2:1-2:32 - Mohammad Jafari, Reihaneh Safavi-Naini, Philip W. L. Fong, Ken Barker:

A Framework for Expressing and Enforcing Purpose-Based Privacy Policies. 3:1-3:31 - Ewa Syta

, Henry Corrigan-Gibbs, Shu-Chun Weng, David Wolinsky, Bryan Ford
, Aaron Johnson:
Security Analysis of Accountable Anonymity in Dissent. 4:1-4:35
Volume 17, Number 2, November 2014
- Peter C. Chapin, Christian Skalka:

SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks. 5:1-5:30 - Johannes Götzfried, Tilo Müller:

Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption. 6:1-6:23 - David A. Basin, Cas Cremers:

Know Your Enemy: Compromising Adversaries in Protocol Analysis. 7:1-7:31 - Peng Li, Debin Gao

, Michael K. Reiter:
StopWatch: A Cloud Architecture for Timing Channel Mitigation. 8:1-8:28
Volume 17, Number 3, March 2015
- Roberto Di Pietro

, Gabriele Oligeri:
Silence is Golden: Exploiting Jamming and Radio Silence to Communicate. 9:1-9:24 - Andy Rupp

, Foteini Baldimtsi, Gesine Hinterwälder, Christof Paar:
Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport. 10:1-10:31 - Edoardo Serra

, Sushil Jajodia
, Andrea Pugliese
, Antonino Rullo
, V. S. Subrahmanian:
Pareto-Optimal Adversarial Defense of Enterprise Systems. 11:1-11:39 - Steven H. H. Ding, Benjamin C. M. Fung, Mourad Debbabi

:
A Visualizable Evidence-Driven Approach for Authorship Attribution. 12:1-12:30
Volume 17, Number 4, April 2015
- Hyojeong Lee

, Jeff Seibert, Dylan Fistrovic, Charles Killian, Cristina Nita-Rotaru:
Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems. 13:1-13:34 - Ziming Zhao, Gail-Joon Ahn

, Hongxin Hu:
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation. 14:1-14:37 - C. Christopher Erway, Alptekin Küpçü

, Charalampos Papamanthou, Roberto Tamassia:
Dynamic Provable Data Possession. 15:1-15:29 - Yossef Oren

, Angelos D. Keromytis:
Attacking the Internet Using Broadcast Digital Television. 16:1-16:27

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














