


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 13
Volume 13, Number 1, October 2009
- Catherine Meadows:

Introduction to ACM TISSEC special issue on CCS 2005. 1:1-1:2 - Jiangtao Li, Ninghui Li, William H. Winsborough:

Automated trust negotiation using cryptographic credentials. 2:1-2:35 - Li Zhuang, Feng Zhou, J. D. Tygar:

Keyboard acoustic emanations revisited. 3:1-3:26 - Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:

Control-flow integrity principles, implementations, and applications. 4:1-4:40 - Sandro Etalle, William H. Winsborough:

Maintaining control while delegating trust: Integrity constraints in trust management. 5:1-5:27 - Barbara Carminati

, Elena Ferrari
, Andrea Perego
:
Enforcing access control in Web-based social networks. 6:1-6:38 - Ari Juels, Stephen A. Weis

:
Defining strong privacy for RFID. 7:1-7:23 - Ye Zhu, Riccardo Bettati:

Compromising anonymous communication systems using blind source separation. 8:1-8:31 - Yingpeng Sang, Hong Shen:

Efficient and secure protocols for privacy-preserving set operations. 9:1-9:35 - Leo Dorrendorf, Zvi Gutterman, Benny Pinkas:

Cryptanalysis of the random number generator of the Windows operating system. 10:1-10:32
Volume 13, Number 2, February 2010
- Sabrina De Capitani di Vimercati

, Paul F. Syverson:
Guest editorial: Special issue on computer and communications security. 11:1-11:2 - Xuxian Jiang, Xinyuan Wang, Dongyan Xu:

Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction. 12:1-12:28 - Nicholas Hopper, Eugene Y. Vasserman

, Eric Chan-Tin:
How much anonymity does network latency leak? 13:1-13:28 - Prithvi Bisht, Parthasarathy Madhusudan, V. N. Venkatakrishnan:

CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks. 14:1-14:39 - Miroslav Ponec, Paul Giura, Joel Wein, Hervé Brönnimann:

New payload attribution methods for network forensic investigations. 15:1-15:32 - Tal Moran, Moni Naor:

Split-ballot voting: Everlasting privacy with distributed trust. 16:1-16:43 - Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:

Authenticated error-correcting codes with applications to multicast authentication. 17:1-17:34 - XiaoFeng Wang, Philippe Golle, Markus Jakobsson, Alex Tsow:

Deterring voluntary trace disclosure in re-encryption mix-networks. 18:1-18:24
Volume 13, Number 3, July 2010
- Joachim Biskup, Javier López:

Editorial ESORICS 2007. 19:1-19:2 - Moritz Y. Becker, Sebastian Nanz:

A logic for state-modifying authorization policies. 20:1-20:28 - Gilles Barthe

, Tamara Rezk, Alejandro Russo
, Andrei Sabelfeld:
Security of multithreaded programs by compilation. 21:1-21:32 - Valentina Ciriani

, Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Stefano Paraboschi
, Pierangela Samarati
:
Combining fragmentation and encryption to protect privacy in data storage. 22:1-22:33 - Bhavani Thuraisingham:

Editorial SACMAT 2007. 23:1-23:2 - Qun Ni, Elisa Bertino, Jorge Lobo

, Carolyn Brodie, Clare-Marie Karat, John Karat, Alberto Trombetta
:
Privacy-aware role-based access control. 24:1-24:31 - Adam J. Lee

, Kazuhiro Minami, Marianne Winslett:
On the consistency of distributed proofs with hidden subtrees. 25:1-25:32 - Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:

A logical specification and analysis for SELinux MLS policy. 26:1-26:31 - Jaideep Vaidya, Vijayalakshmi Atluri

, Qi Guo:
The role mining problem: A formal perspective. 27:1-27:31 - Barbara Carminati

, Elena Ferrari
, Jianneng Cao, Kian-Lee Tan
:
A framework to enforce access control over data streams. 28:1-28:31
Volume 13, Number 4, December 2010
- Aniket Kate, Gregory M. Zaverucha

, Ian Goldberg:
Pairing-Based Onion Routing with Improved Forward Secrecy. 29:1-29:32 - Adam G. Pennington, John Linwood Griffin, John S. Bucy, John D. Strunk, Gregory R. Ganger:

Storage-Based Intrusion Detection. 30:1-30:27 - Rakeshbabu Bobba

, Omid Fatemieh, Fariba Khan, Arindam Khan, Carl A. Gunter, Himanshu Khurana, Manoj Prabhakaran:
Attribute-Based Messaging: Access Control and Confidentiality. 31:1-31:35 - Feifei Li, Marios Hadjieleftheriou, George Kollios

, Leonid Reyzin:
Authenticated Index Structures for Aggregation Queries. 32:1-32:35 - Palash Sarkar:

A Simple and Generic Construction of Authenticated Encryption with Associated Data. 33:1-33:16 - David A. Schultz, Barbara Liskov, Moses D. Liskov:

MPSS: Mobile Proactive Secret Sharing. 34:1-34:32 - Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson:

Uncovering Spoken Phrases in Encrypted Voice over IP Conversations. 35:1-35:30 - Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo

:
Mining Roles with Multiple Objectives. 36:1-36:35 - Benoît Libert, Jean-Jacques Quisquater, Moti Yung:

Key Evolution Systems in Untrusted Update Environments. 37:1-37:34 - David Zage, Cristina Nita-Rotaru:

Robust Decentralized Virtual Coordinate Systems in Adversarial Environments. 38:1-38:34 - Patrick P. Tsang, Man Ho Au

, Apu Kapadia, Sean W. Smith:
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. 39:1-39:33 - Qihua Wang, Ninghui Li:

Satisfiability and Resiliency in Workflow Authorization Systems. 40:1-40:35 - Aybek Mukhamedov, Mark Dermot Ryan

:
Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus. 41:1-41:29

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














