Journal: ACM Trans. Inf. Syst. Secur.

Volume 14, Issue 4

28 -- 0M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis. Modeling key compromise impersonation attacks on group key exchange protocols
29 -- 0Man Ho Au, Patrick P. Tsang, Apu Kapadia. PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
30 -- 0Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma. On two RFID privacy notions and their relations
31 -- 0Martin Burkhart, Xenofontas A. Dimitropoulos. Privacy-preserving distributed network troubleshooting - bridging the gap between theory and practice
32 -- 0Darrell Bethea, Robert A. Cochran, Michael K. Reiter. Server-side verification of client behavior in online games

Volume 14, Issue 3

22 -- 0James Joshi, Barbara Carminati. Guest Editorial SACMAT 2009 and 2010
23 -- 0Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough. Group-Centric Secure Information-Sharing Models for Isolated Groups
24 -- 0Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang. Combining Discretionary Policy with Mandatory Information Flow in Operating Systems
25 -- 0Gregory Leighton, Denilson Barbosa. Access Control Policy Translation, Verification, and Minimization within Heterogeneous Data Federations
26 -- 0T.-H. Hubert Chan, Elaine Shi, Dawn Song. Private and Continual Release of Statistics
27 -- 0Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim. The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems

Volume 14, Issue 2

15 -- 0Tielei Wang, Tao Wei, Guofei Gu, Wei Zou. Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution
16 -- 0David A. Basin, Srdjan Capkun, Patrick Schaller, Benedikt Schmidt. Formal Reasoning about Physical Properties of Security Protocols
17 -- 0Scott A. Crosby, Dan S. Wallach. Authenticated Dictionaries: Real-World Costs and Trade-Offs
18 -- 0Andrew W. Appel. Security Seals on Voting Machines: A Case Study
19 -- 0Z. Cliffe Schreuders, Tanya McGill, Christian Payne. Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM
20 -- 0Peter Williams, Radu Sion, Miroslava Sotáková. Practical Oblivious Outsourced Storage
21 -- 0Guang Xiang, Jason I. Hong, Carolyn Penstein Rosé, Lorrie Faith Cranor. CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites

Volume 14, Issue 1

2 -- 0Lujo Bauer, Scott Garriss, Michael K. Reiter. Detecting and resolving policy misconfigurations in access-control systems
3 -- 0Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu. Authorization recycling in hierarchical RBAC systems
4 -- 0Jens-Matthias Bohli, Andreas Pashalidis. Relations among privacy notions
5 -- 0Gabriele Oligeri, Stefano Chessa, Roberto Di Pietro, Gaetano Giunta. Robust and efficient authentication of video stream broadcasting
6 -- 0Brian Demsky. Cross-application data provenance and policy enforcement
7 -- 0Jing Dong, Reza Curtmola, Cristina Nita-Rotaru. Practical defenses against pollution attacks in wireless network coding
8 -- 0Fred B. Schneider, Kevin Walsh, Emin Gün Sirer. Nexus authorization logic (NAL): Design rationale and applications
9 -- 0Glenn Bruns, Michael Huth. Access control via belnap logic: Intuitive, expressive, and analyzable policy composition
10 -- 0Scott E. Coull, Matthew Green, Susan Hohenberger. Access controls for oblivious and anonymous systems
11 -- 0Mike Burmester, Jorge Munilla. Lightweight RFID authentication with forward and backward security
12 -- 0Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary N. J. Peterson, Dawn Song. Remote data checking using provable data possession
13 -- 0Yao Liu, Peng Ning, Michael K. Reiter. False data injection attacks against state estimation in electric power grids
14 -- 0Jason Crampton. Practical and efficient cryptographic enforcement of interval-based access control policies