Journal: ACM Trans. Inf. Syst. Secur.

Volume 12, Issue 4

0 -- 0Serdar Cabuk, Carla E. Brodley, Clay Shields. IP Covert Channel Detection
0 -- 0Ninghui Li, Qihua Wang, Mahesh V. Tripunitara. Resiliency Policies in Access Control
0 -- 0Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik. Universally Composable RFID Identification and Authentication Protocols

Volume 12, Issue 3

0 -- 0Scott A. Crosby, Dan S. Wallach, Rudolf H. Riedi. Opportunities and Limits of Remote Timing Attacks
0 -- 0Jay Ligatti, Lujo Bauer, David Walker. Run-Time Enforcement of Nonsafety Policies
0 -- 0John Bethencourt, Dawn Xiaodong Song, Brent Waters. New Techniques for Private Stream Searching
0 -- 0Danfeng Yao, Roberto Tamassia. Compact and Anonymous Role-Based Authorization Chain
0 -- 0Mikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken. Dynamic and Efficient Key Management for Access Hierarchies
0 -- 0Zhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar. Alcatraz: An Isolated Environment for Experimenting with Untrusted Software

Volume 12, Issue 2

0 -- 0Rebecca N. Wright, Sabrina De Capitani di Vimercati. Guest Editorial: Special Issue on Computer and Communications Security
0 -- 0Adam J. Lee, Marianne Winslett. Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems
0 -- 0Philippe Golle, Frank McSherry, Ilya Mironov. Data Collection with Self-Enforcing Privacy
0 -- 0Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis. Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure
0 -- 0Mengjun Xie, Heng Yin, Haining Wang. Thwarting E-mail Spam Laundering
0 -- 0Xiaofeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil. Fast and Black-box Exploit Detection and Signature Generation for Commodity Software
0 -- 0Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler. EXE: Automatically Generating Inputs of Death

Volume 12, Issue 1

0 -- 0Steve Barker, Marek J. Sergot, Duminda Wijesekera. Status-Based Access Control
0 -- 0Alexandra Boldyreva, Craig Gentry, Adam O Neill, Dae Hyun Yum. New Multiparty Signature Schemes for Network Routing Applications
0 -- 0Wei Wang, Thomas E. Daniels. A Graph Based Approach Toward Network Forensics Analysis
0 -- 0Joseph Y. Halpern, Kevin R. O Neill. Secrecy in Multiagent Systems
0 -- 0Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia. Private Information: To Reveal or not to Reveal
0 -- 0Shouhuai Xu, Srdjan Capkun. Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions