Journal: ACM Trans. Inf. Syst. Secur.

Volume 8, Issue 4

349 -- 350Elena Ferrari. Guest editorial: Special issue on access control models and technologies
351 -- 387Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park. Formal model and policy specification of usage control
388 -- 423Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi. X-gtrbac admin: A decentralized administration model for enterprise-wide access control
424 -- 456Urs Hengartner, Peter Steenkiste. Access control to people location information

Volume 8, Issue 3

259 -- 286Lidong Zhou, Fred B. Schneider, Robbert van Renesse. APSS: proactive secret sharing in asynchronous systems
287 -- 311Reiner Dojen, Tom Coffey. The concept of layered proving trees and its application to the automation of security protocol verification
312 -- 347Daniele Gunetti, Claudia Picardi. Keystroke analysis of free text

Volume 8, Issue 2

153 -- 186Zishuang (Eileen) Ye, Sean Smith, Denise Anthony. Trusted paths for browsers
187 -- 227Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James Joshi. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control
228 -- 258Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili. A pairwise key predistribution scheme for wireless sensor networks

Volume 8, Issue 1

1 -- 0Ravi S. Sandhu. Editorial
2 -- 0Vijay Atluri. Preface
3 -- 40Elena Gabriela Barrantes, David H. Ackley, Stephanie Forrest, Darko Stefanovic. Randomized instruction set emulation
41 -- 77Donggang Liu, Peng Ning, Rongfang Li. Establishing pairwise keys in distributed sensor networks
78 -- 118Peng Liu, Wanyu Zang, Meng Yu. Incentive-based modeling and inference of attacker intent, objectives, and strategies
119 -- 152Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. Modeling and assessing inference exposure in encrypted databases