default search action
ACM Transactions on Information and System Security, Volume 17
Volume 17, Number 1, August 2014
- Luca Allodi, Fabio Massacci:
Comparing Vulnerability Severity and Exploits Using Case-Control Studies. 1:1-1:20 - Srdjan Marinovic, Naranker Dulay, Morris Sloman:
Rumpole: An Introspective Break-Glass Access Control Language. 2:1-2:32 - Mohammad Jafari, Reihaneh Safavi-Naini, Philip W. L. Fong, Ken Barker:
A Framework for Expressing and Enforcing Purpose-Based Privacy Policies. 3:1-3:31 - Ewa Syta, Henry Corrigan-Gibbs, Shu-Chun Weng, David Wolinsky, Bryan Ford, Aaron Johnson:
Security Analysis of Accountable Anonymity in Dissent. 4:1-4:35
Volume 17, Number 2, November 2014
- Peter C. Chapin, Christian Skalka:
SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks. 5:1-5:30 - Johannes Götzfried, Tilo Müller:
Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption. 6:1-6:23 - David A. Basin, Cas Cremers:
Know Your Enemy: Compromising Adversaries in Protocol Analysis. 7:1-7:31 - Peng Li, Debin Gao, Michael K. Reiter:
StopWatch: A Cloud Architecture for Timing Channel Mitigation. 8:1-8:28
Volume 17, Number 3, March 2015
- Roberto Di Pietro, Gabriele Oligeri:
Silence is Golden: Exploiting Jamming and Radio Silence to Communicate. 9:1-9:24 - Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, Christof Paar:
Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport. 10:1-10:31 - Edoardo Serra, Sushil Jajodia, Andrea Pugliese, Antonino Rullo, V. S. Subrahmanian:
Pareto-Optimal Adversarial Defense of Enterprise Systems. 11:1-11:39 - Steven H. H. Ding, Benjamin C. M. Fung, Mourad Debbabi:
A Visualizable Evidence-Driven Approach for Authorship Attribution. 12:1-12:30
Volume 17, Number 4, April 2015
- Hyojeong Lee, Jeff Seibert, Dylan Fistrovic, Charles Edwin Killian, Cristina Nita-Rotaru:
Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems. 13:1-13:34 - Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation. 14:1-14:37 - C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
Dynamic Provable Data Possession. 15:1-15:29 - Yossef Oren, Angelos D. Keromytis:
Attacking the Internet Using Broadcast Digital Television. 16:1-16:27
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.