![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://fanyv88.com/img/search.dark.16x16.png)
default search action
Journal of Computer Security, Volume 17
Volume 17, Number 1, 2009
- Milan Petkovic, Willem Jonker:
Preface. 1-3 - Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini
, Sushil Jajodia:
Evaluating privacy threats in released database views by symmetric indistinguishability. 5-42 - Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn:
Privacy-preserving incremental data dissemination. 43-68 - Stefan Böttcher, Rita Hartel:
Information disclosure by answers to XPath queries. 69-99 - Weiwei Cheng, Kian-Lee Tan
:
Query assurance verification for outsourced multi-dimensional databases. 101-126
Volume 17, Number 2, 2009
- Nan Hu, Giri Kumar Tayi, Chengyu Ma, Yingjiu Li:
Certificate revocation release policies. 127-157 - Amir Herzberg:
Folklore, practice and theory of robust combiners. 159-189 - Benjamin Aziz, Simon N. Foley
, John Herbert, Garret Swart:
Configuring storage-area networks using mandatory security. 191-210 - Jaideep Vaidya, Vijayalakshmi Atluri
, Qi Guo, Haibing Lu:
Edge-RMP: Minimizing administrative assignments for role-based access control. 211-235
Volume 17, Number 3, 2009
- Giampaolo Bella
, Peter Y. A. Ryan
:
Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing. 237 - Petros Belsis
, Kostas Fragos, Stefanos Gritzalis
, Christos Skourlas:
Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification. 239-268 - Christian Grothoff, Krista Grothoff, Ryan Stutsman, Ludmila Alkhutova, Mikhail J. Atallah:
Translation-based steganography. 269-303 - Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda:
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. 305-329 - Haizhi Xu, Steve J. Chapin:
Address-space layout randomization using code islands. 331-362
Volume 17, Number 4, 2009
- Bruno Blanchet:
Automatic verification of correspondences for security protocols. 363-434 - Stéphanie Delaune, Steve Kremer
, Mark Ryan
:
Verifying privacy-type properties of electronic voting protocols. 435-487 - Xuhua Ding
, Gene Tsudik, Shouhuai Xu:
Leak-free mediated group signatures. 489-514
Volume 17, Number 5, 2009
- Joshua D. Guttman
:
Introduction. 515 - Andrei Sabelfeld, David Sands:
Declassification: Dimensions and principles. 517-548 - Ana Almeida Matos
, Gérard Boudol:
On declassification and the non-disclosure policy. 549-597 - William L. Harrison, James Hook:
Achieving information flow security through monadic control of effects. 599-653 - Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider:
Quantifying information flow with beliefs. 655-701 - Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
:
Polynomial runtime in simulatability definitions. 703-735 - Pedro Adão
, Gergei Bana, Jonathan Herzog, Andre Scedrov
:
Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage. 737-797 - Massimo Bartoletti
, Pierpaolo Degano, Gian-Luigi Ferrari
:
Planning and verifying service composition. 799-837
Volume 17, Number 6, 2009
- Gilles Guette:
Automating trusted key rollover in DNSSEC. 839-854 - Mila Dalla Preda, Roberto Giacobazzi:
Semantics-based code obfuscation by abstract interpretation. 855-908 - Bart Jacobs, Ichiro Hasuo
:
Semantics and logic for security protocols. 909-944 - Alberto Dainotti
, Antonio Pescapè, Giorgio Ventre:
A cascade architecture for DoS attacks detection based on the wavelet transform. 945-968
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
![](https://fanyv88.com/img/new-feature-top-right.156x64.png)