Search dblp for Publications

export results for "toc:db/journals/tissec/tissec13.bht:"

 download as .bib file

@article{DBLP:journals/tissec/BartheRRS10,
  author       = {Gilles Barthe and
                  Tamara Rezk and
                  Alejandro Russo and
                  Andrei Sabelfeld},
  title        = {Security of multithreaded programs by compilation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {21:1--21:32},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1895977},
  doi          = {10.1145/1805974.1895977},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BartheRRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BeckerN10,
  author       = {Moritz Y. Becker and
                  Sebastian Nanz},
  title        = {A logic for state-modifying authorization policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {20:1--20:28},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805976},
  doi          = {10.1145/1805974.1805976},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BeckerN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BishtMV10,
  author       = {Prithvi Bisht and
                  Parthasarathy Madhusudan and
                  V. N. Venkatakrishnan},
  title        = {{CANDID:} Dynamic candidate evaluations for automatic prevention of
                  {SQL} injection attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {14:1--14:39},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698754},
  doi          = {10.1145/1698750.1698754},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BishtMV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BiskupL10,
  author       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Editorial {ESORICS} 2007},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {19:1--19:2},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805975},
  doi          = {10.1145/1805974.1805975},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BiskupL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BobbaFKKGKP10,
  author       = {Rakeshbabu Bobba and
                  Omid Fatemieh and
                  Fariba Khan and
                  Arindam Khan and
                  Carl A. Gunter and
                  Himanshu Khurana and
                  Manoj Prabhakaran},
  title        = {Attribute-Based Messaging: Access Control and Confidentiality},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {31:1--31:35},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880025},
  doi          = {10.1145/1880022.1880025},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BobbaFKKGKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CarminatiFCT10,
  author       = {Barbara Carminati and
                  Elena Ferrari and
                  Jianneng Cao and
                  Kian{-}Lee Tan},
  title        = {A framework to enforce access control over data streams},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {28:1--28:31},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805984},
  doi          = {10.1145/1805974.1805984},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CarminatiFCT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CirianiVFJPS10,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Combining fragmentation and encryption to protect privacy in data
                  storage},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {22:1--22:33},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805978},
  doi          = {10.1145/1805974.1805978},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CirianiVFJPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HicksRCJM10,
  author       = {Boniface Hicks and
                  Sandra Julieta Rueda and
                  Luke St. Clair and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  title        = {A logical specification and analysis for SELinux {MLS} policy},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {26:1--26:31},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805982},
  doi          = {10.1145/1805974.1805982},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HicksRCJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HopperVC10,
  author       = {Nicholas Hopper and
                  Eugene Y. Vasserman and
                  Eric Chan{-}Tin},
  title        = {How much anonymity does network latency leak?},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {13:1--13:28},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698753},
  doi          = {10.1145/1698750.1698753},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HopperVC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JiangWX10,
  author       = {Xuxian Jiang and
                  Xinyuan Wang and
                  Dongyan Xu},
  title        = {Stealthy malware detection and monitoring through VMM-based "out-of-the-box"
                  semantic view reconstruction},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {12:1--12:28},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698752},
  doi          = {10.1145/1698750.1698752},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JiangWX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KateZG10,
  author       = {Aniket Kate and
                  Gregory M. Zaverucha and
                  Ian Goldberg},
  title        = {Pairing-Based Onion Routing with Improved Forward Secrecy},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {29:1--29:32},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880023},
  doi          = {10.1145/1880022.1880023},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/KateZG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeeMW10,
  author       = {Adam J. Lee and
                  Kazuhiro Minami and
                  Marianne Winslett},
  title        = {On the consistency of distributed proofs with hidden subtrees},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {25:1--25:32},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805981},
  doi          = {10.1145/1805974.1805981},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LeeMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiHKR10,
  author       = {Feifei Li and
                  Marios Hadjieleftheriou and
                  George Kollios and
                  Leonid Reyzin},
  title        = {Authenticated Index Structures for Aggregation Queries},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {32:1--32:35},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880026},
  doi          = {10.1145/1880022.1880026},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiHKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LibertQY10,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  title        = {Key Evolution Systems in Untrusted Update Environments},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {37:1--37:34},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880031},
  doi          = {10.1145/1880022.1880031},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LibertQY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LysyanskayaTT10,
  author       = {Anna Lysyanskaya and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Authenticated error-correcting codes with applications to multicast
                  authentication},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {17:1--17:34},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698757},
  doi          = {10.1145/1698750.1698757},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LysyanskayaTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MolloyCLWLBCL10,
  author       = {Ian M. Molloy and
                  Hong Chen and
                  Tiancheng Li and
                  Qihua Wang and
                  Ninghui Li and
                  Elisa Bertino and
                  Seraphin B. Calo and
                  Jorge Lobo},
  title        = {Mining Roles with Multiple Objectives},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {36:1--36:35},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880030},
  doi          = {10.1145/1880022.1880030},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MolloyCLWLBCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MoranN10,
  author       = {Tal Moran and
                  Moni Naor},
  title        = {Split-ballot voting: Everlasting privacy with distributed trust},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {16:1--16:43},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698756},
  doi          = {10.1145/1698750.1698756},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MoranN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MukhamedovR10,
  author       = {Aybek Mukhamedov and
                  Mark Dermot Ryan},
  title        = {Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {41:1--41:29},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880035},
  doi          = {10.1145/1880022.1880035},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MukhamedovR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NiBLBKKT10,
  author       = {Qun Ni and
                  Elisa Bertino and
                  Jorge Lobo and
                  Carolyn Brodie and
                  Clare{-}Marie Karat and
                  John Karat and
                  Alberto Trombetta},
  title        = {Privacy-aware role-based access control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {24:1--24:31},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805980},
  doi          = {10.1145/1805974.1805980},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NiBLBKKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PenningtonGBSG10,
  author       = {Adam G. Pennington and
                  John Linwood Griffin and
                  John S. Bucy and
                  John D. Strunk and
                  Gregory R. Ganger},
  title        = {Storage-Based Intrusion Detection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {30:1--30:27},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880024},
  doi          = {10.1145/1880022.1880024},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PenningtonGBSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PonecGWB10,
  author       = {Miroslav Ponec and
                  Paul Giura and
                  Joel Wein and
                  Herv{\'{e}} Br{\"{o}}nnimann},
  title        = {New payload attribution methods for network forensic investigations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {15:1--15:32},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698755},
  doi          = {10.1145/1698750.1698755},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PonecGWB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Sarkar10,
  author       = {Palash Sarkar},
  title        = {A Simple and Generic Construction of Authenticated Encryption with
                  Associated Data},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {33:1--33:16},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880027},
  doi          = {10.1145/1880022.1880027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Sarkar10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SchultzLL10,
  author       = {David A. Schultz and
                  Barbara Liskov and
                  Moses D. Liskov},
  title        = {{MPSS:} Mobile Proactive Secret Sharing},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {34:1--34:32},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880028},
  doi          = {10.1145/1880022.1880028},
  timestamp    = {Fri, 25 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SchultzLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Thuraisingham10,
  author       = {Bhavani Thuraisingham},
  title        = {Editorial {SACMAT} 2007},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {23:1--23:2},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805979},
  doi          = {10.1145/1805974.1805979},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Thuraisingham10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/TsangAKS10,
  author       = {Patrick P. Tsang and
                  Man Ho Au and
                  Apu Kapadia and
                  Sean W. Smith},
  title        = {{BLAC:} Revoking Repeatedly Misbehaving Anonymous Users without Relying
                  on TTPs},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {39:1--39:33},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880033},
  doi          = {10.1145/1880022.1880033},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/TsangAKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/VaidyaAG10,
  author       = {Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Qi Guo},
  title        = {The role mining problem: {A} formal perspective},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {27:1--27:31},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1895983},
  doi          = {10.1145/1805974.1895983},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/VaidyaAG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/VimercatiS10,
  author       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Guest editorial: Special issue on computer and communications security},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {11:1--11:2},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698751},
  doi          = {10.1145/1698750.1698751},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/VimercatiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangGJT10,
  author       = {XiaoFeng Wang and
                  Philippe Golle and
                  Markus Jakobsson and
                  Alex Tsow},
  title        = {Deterring voluntary trace disclosure in re-encryption mix-networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {18:1--18:24},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698758},
  doi          = {10.1145/1698750.1698758},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WangGJT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangL10,
  author       = {Qihua Wang and
                  Ninghui Li},
  title        = {Satisfiability and Resiliency in Workflow Authorization Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {40:1--40:35},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880034},
  doi          = {10.1145/1880022.1880034},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WangL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WrightBCMM10,
  author       = {Charles V. Wright and
                  Lucas Ballard and
                  Scott E. Coull and
                  Fabian Monrose and
                  Gerald M. Masson},
  title        = {Uncovering Spoken Phrases in Encrypted Voice over {IP} Conversations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {35:1--35:30},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880029},
  doi          = {10.1145/1880022.1880029},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WrightBCMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZageN10,
  author       = {David Zage and
                  Cristina Nita{-}Rotaru},
  title        = {Robust Decentralized Virtual Coordinate Systems in Adversarial Environments},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {38:1--38:34},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880032},
  doi          = {10.1145/1880022.1880032},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZageN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AbadiBEL09,
  author       = {Mart{\'{\i}}n Abadi and
                  Mihai Budiu and
                  {\'{U}}lfar Erlingsson and
                  Jay Ligatti},
  title        = {Control-flow integrity principles, implementations, and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {4:1--4:40},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609960},
  doi          = {10.1145/1609956.1609960},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AbadiBEL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CarminatiFP09,
  author       = {Barbara Carminati and
                  Elena Ferrari and
                  Andrea Perego},
  title        = {Enforcing access control in Web-based social networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {6:1--6:38},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609962},
  doi          = {10.1145/1609956.1609962},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CarminatiFP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DorrendorfGP09,
  author       = {Leo Dorrendorf and
                  Zvi Gutterman and
                  Benny Pinkas},
  title        = {Cryptanalysis of the random number generator of the Windows operating
                  system},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {10:1--10:32},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609966},
  doi          = {10.1145/1609956.1609966},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/DorrendorfGP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/EtalleW09,
  author       = {Sandro Etalle and
                  William H. Winsborough},
  title        = {Maintaining control while delegating trust: Integrity constraints
                  in trust management},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {5:1--5:27},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609961},
  doi          = {10.1145/1609956.1609961},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/EtalleW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JuelsW09,
  author       = {Ari Juels and
                  Stephen A. Weis},
  title        = {Defining strong privacy for {RFID}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {7:1--7:23},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609963},
  doi          = {10.1145/1609956.1609963},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JuelsW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiLW09,
  author       = {Jiangtao Li and
                  Ninghui Li and
                  William H. Winsborough},
  title        = {Automated trust negotiation using cryptographic credentials},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {2:1--2:35},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609958},
  doi          = {10.1145/1609956.1609958},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Meadows09,
  author       = {Catherine Meadows},
  title        = {Introduction to {ACM} {TISSEC} special issue on {CCS} 2005},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {1:1--1:2},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609957},
  doi          = {10.1145/1609956.1609957},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Meadows09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SangS09,
  author       = {Yingpeng Sang and
                  Hong Shen},
  title        = {Efficient and secure protocols for privacy-preserving set operations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {9:1--9:35},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609965},
  doi          = {10.1145/1609956.1609965},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SangS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhuB09,
  author       = {Ye Zhu and
                  Riccardo Bettati},
  title        = {Compromising anonymous communication systems using blind source separation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {8:1--8:31},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609964},
  doi          = {10.1145/1609956.1609964},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhuB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhuangZT09,
  author       = {Li Zhuang and
                  Feng Zhou and
                  J. D. Tygar},
  title        = {Keyboard acoustic emanations revisited},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {3:1--3:26},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609959},
  doi          = {10.1145/1609956.1609959},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhuangZT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics