Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: ACM Trans. Inf. Syst. Secur.
    Year: 2010
    Volume: 13
    Number: 2
    DBLP: db/journals/tissec/tissec13.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 41  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Barbara Carminati, Elena Ferrari, Jianneng Cao, Kian-Lee Tan.
    A framework to enforce access control over data streams.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Conference paper
    Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie, Clare-Marie Karat, John Karat, Alberto Trombetta.
    Privacy-aware role-based access control.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Conference paper
    Bhavani M. Thuraisingham.
    Editorial SACMAT 2007.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Conference paper
    Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel.
    A logical specification and analysis for SELinux MLS policy.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Conference paper
    Moritz Y. Becker, Sebastian Nanz.
    A logic for state-modifying authorization policies.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Conference paper
    Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati.
    Combining fragmentation and encryption to protect privacy in data storage.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Conference paper
    Joachim Biskup, Javier Lopez.
    Editorial ESORICS 2007.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Conference paper
    Adam J. Lee, Kazuhiro Minami, Marianne Winslett.
    On the consistency of distributed proofs with hidden subtrees.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Conference paper
    Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo.
    The role mining problem: A formal perspective.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Conference paper
    Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld.
    Security of multithreaded programs by compilation.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Show item 1 to 10 of 41  

    Your query returned 41 matches in the database.