default search action
ACM Transactions on Information and System Security (TISSEC), Volume 9
Volume 9, Number 1, February 2006
- Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved proxy re-encryption schemes with applications to secure distributed storage. 1-30 - Francesco M. Malvestuto, Mauro Mezzini, Marina Moscarini:
Auditing sum-queries to make a statistical database secure. 31-60 - Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel:
Anomalous system call detection. 61-93 - Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein:
Foundations and applications for secure triggers. 94-112
Volume 9, Number 2, May 2006
- Sejong Oh, Ravi S. Sandhu, Xinwen Zhang:
An effective role administration model using organization structure. 113-137 - Giampaolo Bella, Lawrence C. Paulson:
Accountability protocols: Formalized and verified. 138-161 - Rajarathnam Chandramouli, Satish Bapatla, K. P. Subbalakshmi, R. N. Uma:
Battery power-aware encryption. 162-180 - Rosario Gennaro, Yehuda Lindell:
A framework for password-based authenticated key exchange1. 181-234
Volume 9, Number 3, August 2006
- Paul C. van Oorschot, Stuart G. Stubblebine:
On countering online dictionary attacks with login histories and humans-in-the-loop. 235-258 - Patrick D. McDaniel, Atul Prakash:
Methods and limitations of security policy reconciliation. 259-291 - Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada:
XML access control using static analysis. 292-324 - Noam Kogan, Yuval Shavitt, Avishai Wool:
A practical revocation scheme for broadcast encryption using smartcards. 325-351 - William H. Winsborough, Ninghui Li:
Safety in automated trust negotiation. 352-390
Volume 9, Number 4, November 2006
- Ninghui Li, Mahesh V. Tripunitara:
Security analysis in role-based access control. 391-420 - Giovanni Mella, Elena Ferrari, Elisa Bertino, Yunhua Koglin:
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems. 421-460 - Noam Kogan, Tamir Tassa:
Improved efficiency for revocation schemes via Newton interpolation. 461-486
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.