22 | -- | 0 | James Joshi, Barbara Carminati. Guest Editorial SACMAT 2009 and 2010 |
23 | -- | 0 | Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough. Group-Centric Secure Information-Sharing Models for Isolated Groups |
24 | -- | 0 | Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang. Combining Discretionary Policy with Mandatory Information Flow in Operating Systems |
25 | -- | 0 | Gregory Leighton, Denilson Barbosa. Access Control Policy Translation, Verification, and Minimization within Heterogeneous Data Federations |
26 | -- | 0 | T.-H. Hubert Chan, Elaine Shi, Dawn Song. Private and Continual Release of Statistics |
27 | -- | 0 | Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim. The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems |