2 | -- | 0 | Lujo Bauer, Scott Garriss, Michael K. Reiter. Detecting and resolving policy misconfigurations in access-control systems |
3 | -- | 0 | Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu. Authorization recycling in hierarchical RBAC systems |
4 | -- | 0 | Jens-Matthias Bohli, Andreas Pashalidis. Relations among privacy notions |
5 | -- | 0 | Gabriele Oligeri, Stefano Chessa, Roberto Di Pietro, Gaetano Giunta. Robust and efficient authentication of video stream broadcasting |
6 | -- | 0 | Brian Demsky. Cross-application data provenance and policy enforcement |
7 | -- | 0 | Jing Dong, Reza Curtmola, Cristina Nita-Rotaru. Practical defenses against pollution attacks in wireless network coding |
8 | -- | 0 | Fred B. Schneider, Kevin Walsh, Emin Gün Sirer. Nexus authorization logic (NAL): Design rationale and applications |
9 | -- | 0 | Glenn Bruns, Michael Huth. Access control via belnap logic: Intuitive, expressive, and analyzable policy composition |
10 | -- | 0 | Scott E. Coull, Matthew Green, Susan Hohenberger. Access controls for oblivious and anonymous systems |
11 | -- | 0 | Mike Burmester, Jorge Munilla. Lightweight RFID authentication with forward and backward security |
12 | -- | 0 | Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary N. J. Peterson, Dawn Song. Remote data checking using provable data possession |
13 | -- | 0 | Yao Liu, Peng Ning, Michael K. Reiter. False data injection attacks against state estimation in electric power grids |
14 | -- | 0 | Jason Crampton. Practical and efficient cryptographic enforcement of interval-based access control policies |