Journal: ACM Trans. Inf. Syst. Secur.

Volume 9, Issue 4

391 -- 420Ninghui Li, Mahesh V. Tripunitara. Security analysis in role-based access control
421 -- 460Giovanni Mella, Elena Ferrari, Elisa Bertino, Yunhua Koglin. Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems
461 -- 486Noam Kogan, Tamir Tassa. Improved efficiency for revocation schemes via Newton interpolation

Volume 9, Issue 3

235 -- 258Paul C. van Oorschot, Stuart G. Stubblebine. On countering online dictionary attacks with login histories and humans-in-the-loop
259 -- 291Patrick McDaniel, Atul Prakash. Methods and limitations of security policy reconciliation
292 -- 324Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada. XML access control using static analysis
325 -- 351Noam Kogan, Yuval Shavitt, Avishai Wool. A practical revocation scheme for broadcast encryption using smartcards
352 -- 390William H. Winsborough, Ninghui Li. Safety in automated trust negotiation

Volume 9, Issue 2

113 -- 137Sejong Oh, Ravi S. Sandhu, Xinwen Zhang. An effective role administration model using organization structure
138 -- 161Giampaolo Bella, Lawrence C. Paulson. Accountability protocols: Formalized and verified
162 -- 180Rajarathnam Chandramouli, S. Bapatla, K. P. Subbalakshmi, R. N. Uma. Battery power-aware encryption
181 -- 234Rosario Gennaro, Yehuda Lindell. A framework for password-based authenticated key exchange:::1:::

Volume 9, Issue 1

1 -- 30Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage
31 -- 60Francesco M. Malvestuto, Mauro Mezzini, Marina Moscarini. Auditing sum-queries to make a statistical database secure
61 -- 93Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel. Anomalous system call detection
94 -- 112Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein. Foundations and applications for secure triggers