Journal: ACM Trans. Inf. Syst. Secur.

Volume 15, Issue 4

15 -- 0Mario Frank, Joachim M. Buhmann, David A. Basin. Role Mining with Probabilistic Models
16 -- 0Yossi Gilad, Amir Herzberg. Fragmentation Considered Vulnerable
17 -- 0Muhammad Qasim Ali, Ehab Al-Shaer, Hassan Khan, Syed Ali Khayam. Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning
18 -- 0Karthick Jayaraman, Mahesh V. Tripunitara, Vijay Ganesh, Martin C. Rinard, Steve J. Chapin. Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies

Volume 15, Issue 3

11 -- 0Norman Danner, Sam DeFabbia-Kane, Danny Krizanc, Marc Liberatore. Effectiveness and detection of denial-of-service attacks in tor
12 -- 0Michael Brennan, Sadia Afroz, Rachel Greenstadt. Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity
13 -- 0David A. Basin, Samuel J. Burri, Günter Karjoth. Dynamic enforcement of abstract separation of duty constraints
14 -- 0Joan Feigenbaum, Aaron Johnson, Paul F. Syverson. Probabilistic analysis of onion routing in a black-box model

Volume 15, Issue 2

6 -- 0Yossi Gilad, Amir Herzberg. LOT: A Defense Against IP Spoofing and Flooding Attacks
7 -- 0Boris Danev, Srdjan Capkun, Ramya Jayaram Masti, Thomas S. Benjamin. Towards Practical Identification of HF RFID Devices
8 -- 0Martín Abadi, Gordon D. Plotkin. On Protection by Layout Randomization
9 -- 0Attila Altay Yavuz, Peng Ning, Michael K. Reiter. BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems
10 -- 0Raphael Khoury, Nadia Tawbi. Corrective Enforcement: A New Paradigm of Security Policy Enforcement by Monitors

Volume 15, Issue 1

1 -- 0Paul F. Syverson, Somesh Jha. Guest Editorial: Special Issue on Computer and Communications Security
2 -- 0Ryan Roemer, Erik Buchanan, Hovav Shacham, Stefan Savage. Return-Oriented Programming: Systems, Languages, and Applications
3 -- 0Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu. Verified Cryptographic Implementations for TLS
4 -- 0Jan Camenisch, Thomas Groß. Efficient Attributes for Anonymous Credentials
5 -- 0Prateek Mittal, Nikita Borisov. Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems