Volume 8,
Number 1,
Febuary 2005
- Ravi S. Sandhu:
Editorial.
1
- Vijay Atluri:
Preface.
2
- Elena Gabriela Barrantes, David H. Ackley, Stephanie Forrest, Darko Stefanovic:
Randomized instruction set emulation.
3-40
- Donggang Liu, Peng Ning, Rongfang Li:
Establishing pairwise keys in distributed sensor networks.
41-77
- Peng Liu, Wanyu Zang, Meng Yu:
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
78-118
- Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Modeling and assessing inference exposure in encrypted databases.
119-152
Volume 8,
Number 2,
May 2005
- Zishuang (Eileen) Ye, Sean W. Smith, Denise Anthony:
Trusted paths for browsers.
153-186
- Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James Joshi:
X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control.
187-227
- Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili:
A pairwise key predistribution scheme for wireless sensor networks.
228-258
Volume 8,
Number 3,
August 2005
Volume 8,
Number 4,
November 2005
Copyright © Fri Mar 12 17:33:23 2010
by Michael Ley (ley@uni-trier.de)