Volume 12,
Number 1,
October 2008
- Steve Barker, Marek J. Sergot, Duminda Wijesekera:
Status-Based Access Control.
- Shouhuai Xu, Srdjan Capkun:
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions.
- Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum:
New Multiparty Signature Schemes for Network Routing Applications.
- Wei Wang, Thomas E. Daniels:
A Graph Based Approach Toward Network Forensics Analysis.
- Joseph Y. Halpern, Kevin R. O'Neill:
Secrecy in Multiagent Systems.
- Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Private Information: To Reveal or not to Reveal.
Volume 12,
Number 2,
December 2008
- Rebecca N. Wright, Sabrina De Capitani di Vimercati:
Guest Editorial: Special Issue on Computer and Communications Security.
- Adam J. Lee, Marianne Winslett:
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems.
- Philippe Golle, Frank McSherry, Ilya Mironov:
Data Collection with Self-Enforcing Privacy.
- Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
EXE: Automatically Generating Inputs of Death.
- XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil:
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software.
- Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis:
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure.
- Mengjun Xie, Heng Yin, Haining Wang:
Thwarting E-mail Spam Laundering.
Volume 12,
Number 3,
January 2009
- Zhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar:
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software.
- Danfeng Yao, Roberto Tamassia:
Compact and Anonymous Role-Based Authorization Chain.
- John Bethencourt, Dawn Xiaodong Song, Brent Waters:
New Techniques for Private Stream Searching.
- Scott A. Crosby, Dan S. Wallach, Rudolf H. Riedi:
Opportunities and Limits of Remote Timing Attacks.
- Mikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken:
Dynamic and Efficient Key Management for Access Hierarchies.
- Jay Ligatti, Lujo Bauer, David Walker:
Run-Time Enforcement of Nonsafety Policies.
Volume 12,
Number 4,
April 2009
Copyright © Fri Mar 12 17:33:23 2010
by Michael Ley (ley@uni-trier.de)