Volume 8,
Number 1,
Febuary 2005
- Ravi S. Sandhu:
Editorial.
1
Electronic Edition (ACM DL) BibTeX
- Vijay Atluri:
Preface.
2
Electronic Edition (ACM DL) BibTeX
- Elena Gabriela Barrantes, David H. Ackley, Stephanie Forrest, Darko Stefanovic:
Randomized instruction set emulation.
3-40
Electronic Edition (ACM DL) BibTeX
- Donggang Liu, Peng Ning, Rongfang Li:
Establishing pairwise keys in distributed sensor networks.
41-77
Electronic Edition (ACM DL) BibTeX
- Peng Liu, Wanyu Zang, Meng Yu:
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
78-118
Electronic Edition (ACM DL) BibTeX
- Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Modeling and assessing inference exposure in encrypted databases.
119-152
Electronic Edition (ACM DL) BibTeX
Volume 8,
Number 2,
May 2005
- Zishuang (Eileen) Ye, Sean Smith, Denise Anthony:
Trusted paths for browsers.
153-186
Electronic Edition (ACM DL) BibTeX
- Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James Joshi:
X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control.
187-227
Electronic Edition (ACM DL) BibTeX
- Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili:
A pairwise key predistribution scheme for wireless sensor networks.
228-258
Electronic Edition (ACM DL) BibTeX
Volume 8,
Number 3,
August 2005
Volume 8,
Number 4,
November 2005
Copyright © Sun May 17 00:26:02 2009
by Michael Ley (ley@uni-trier.de)