Journal: ACM Trans. Inf. Syst. Secur.

Volume 10, Issue 4

0 -- 0James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang. Formal foundations for hybrid hierarchies in GTRBAC
0 -- 0Blaise Gassend, Marten van Dijk, Dwaine E. Clarke, Emina Torlak, Srinivas Devadas, Pim Tuyls. Controlled physical random functions and applications
0 -- 0Deepayan Chakrabarti, Yang Wang, Chenxi Wang, Jure Leskovec, Christos Faloutsos. Epidemic thresholds in real networks
0 -- 0Luc Bouganim, François Dang Ngoc, Philippe Pucheral. Dynamic access-control policies on XML encrypted data
0 -- 0Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru, Herbert Rubens. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
0 -- 0Paul C. van Oorschot, Julie Thorpe. On predictive models and user-drawn graphical passwords

Volume 10, Issue 3

9 -- 0Martín Abadi, Bruno Blanchet, Cédric Fournet. Just fast keying in the pi calculus
10 -- 0Emmanuel Bresson, Olivier Chevassut, David Pointcheval. Provably secure authenticated group Diffie-Hellman key exchange
11 -- 0Paul C. van Oorschot, Tao Wan, Evangelos Kranakis. On interdomain routing security and pretty secure BGP (psBGP)
12 -- 0Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani M. Thuraisingham. PP-trust-X: A system for privacy preserving trust negotiations

Volume 10, Issue 2

5 -- 0Ninghui Li, Mahesh V. Tripunitara, Ziad Bizri. On mutually exclusive roles and separation-of-duty
6 -- 0Kun Peng, Colin Boyd, Ed Dawson. Batch zero-knowledge proof and verification and its applications
7 -- 0Tanvir Ahmed, Anand R. Tripathi. Specification and verification of security requirements in a programming model for decentralized CSCW systems
8 -- 0Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon. Secure sessions for Web services

Volume 10, Issue 1

1 -- 0Gail-Joon Ahn. Guest editorial: Special issue on access control models and technologies
2 -- 0Maria Luisa Damiani, Elisa Bertino, Barbara Catania, Paolo Perlasca. GEO-RBAC: A spatially aware RBAC
3 -- 0Mizuho Iwaihara, Ryotaro Hayashi 0002, Somchai Chatvichienchai, Chutiporn Anutariya, Vilas Wuwongse. Relevancy-based access control and its evaluation on versioned XML documents
4 -- 0Jingmin Zhou, Mark Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop. Modeling network intrusion detection alerts for correlation