Journal: ACM Trans. Inf. Syst. Secur.

Volume 15, Issue 4

15 -- 0Mario Frank, Joachim M. Buhmann, David A. Basin. Role Mining with Probabilistic Models
16 -- 0Yossi Gilad, Amir Herzberg. Fragmentation Considered Vulnerable
17 -- 0Muhammad Qasim Ali, Ehab Al-Shaer, Hassan Khan, Syed Ali Khayam. Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning
18 -- 0Karthick Jayaraman, Mahesh V. Tripunitara, Vijay Ganesh, Martin C. Rinard, Steve J. Chapin. Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies