Journal: ACM Trans. Inf. Syst. Secur.

Volume 12, Issue 2

0 -- 0Rebecca N. Wright, Sabrina De Capitani di Vimercati. Guest Editorial: Special Issue on Computer and Communications Security
0 -- 0Adam J. Lee, Marianne Winslett. Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems
0 -- 0Philippe Golle, Frank McSherry, Ilya Mironov. Data Collection with Self-Enforcing Privacy
0 -- 0Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis. Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure
0 -- 0Mengjun Xie, Heng Yin, Haining Wang. Thwarting E-mail Spam Laundering
0 -- 0Xiaofeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil. Fast and Black-box Exploit Detection and Signature Generation for Commodity Software
0 -- 0Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler. EXE: Automatically Generating Inputs of Death