researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: ACM Trans. Inf. Syst. Secur.
Home
Index
Info
Volume
Volume
9
, Issue
4
391
--
420
Ninghui Li
,
Mahesh V. Tripunitara
.
Security analysis in role-based access control
421
--
460
Giovanni Mella
,
Elena Ferrari
,
Elisa Bertino
,
Yunhua Koglin
.
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems
461
--
486
Noam Kogan
,
Tamir Tassa
.
Improved efficiency for revocation schemes via Newton interpolation
Volume
9
, Issue
3
235
--
258
Paul C. van Oorschot
,
Stuart G. Stubblebine
.
On countering online dictionary attacks with login histories and humans-in-the-loop
259
--
291
Patrick McDaniel
,
Atul Prakash
.
Methods and limitations of security policy reconciliation
292
--
324
Makoto Murata
,
Akihiko Tozawa
,
Michiharu Kudo
,
Satoshi Hada
.
XML access control using static analysis
325
--
351
Noam Kogan
,
Yuval Shavitt
,
Avishai Wool
.
A practical revocation scheme for broadcast encryption using smartcards
352
--
390
William H. Winsborough
,
Ninghui Li
.
Safety in automated trust negotiation
Volume
9
, Issue
2
113
--
137
Sejong Oh
,
Ravi S. Sandhu
,
Xinwen Zhang
.
An effective role administration model using organization structure
138
--
161
Giampaolo Bella
,
Lawrence C. Paulson
.
Accountability protocols: Formalized and verified
162
--
180
Rajarathnam Chandramouli
,
S. Bapatla
,
K. P. Subbalakshmi
,
R. N. Uma
.
Battery power-aware encryption
181
--
234
Rosario Gennaro
,
Yehuda Lindell
.
A framework for password-based authenticated key exchange:::1:::
Volume
9
, Issue
1
1
--
30
Giuseppe Ateniese
,
Kevin Fu
,
Matthew Green
,
Susan Hohenberger
.
Improved proxy re-encryption schemes with applications to secure distributed storage
31
--
60
Francesco M. Malvestuto
,
Mauro Mezzini
,
Marina Moscarini
.
Auditing sum-queries to make a statistical database secure
61
--
93
Darren Mutz
,
Fredrik Valeur
,
Giovanni Vigna
,
Christopher Krügel
.
Anomalous system call detection
94
--
112
Ariel Futoransky
,
Emiliano Kargieman
,
Carlos Sarraute
,
Ariel Waissbein
.
Foundations and applications for secure triggers