default search action
Journal of Computer Security, Volume 17
Volume 17, Number 1, 2009
- Milan Petkovic, Willem Jonker:
Preface. 1-3 - Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini, Sushil Jajodia:
Evaluating privacy threats in released database views by symmetric indistinguishability. 5-42 - Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn:
Privacy-preserving incremental data dissemination. 43-68 - Stefan Böttcher, Rita Hartel:
Information disclosure by answers to XPath queries. 69-99 - Weiwei Cheng, Kian-Lee Tan:
Query assurance verification for outsourced multi-dimensional databases. 101-126
Volume 17, Number 2, 2009
- Nan Hu, Giri Kumar Tayi, Chengyu Ma, Yingjiu Li:
Certificate revocation release policies. 127-157 - Amir Herzberg:
Folklore, practice and theory of robust combiners. 159-189 - Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:
Configuring storage-area networks using mandatory security. 191-210 - Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu:
Edge-RMP: Minimizing administrative assignments for role-based access control. 211-235
Volume 17, Number 3, 2009
- Giampaolo Bella, Peter Y. A. Ryan:
Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing. 237 - Petros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas:
Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification. 239-268 - Christian Grothoff, Krista Grothoff, Ryan Stutsman, Ludmila Alkhutova, Mikhail J. Atallah:
Translation-based steganography. 269-303 - Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda:
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. 305-329 - Haizhi Xu, Steve J. Chapin:
Address-space layout randomization using code islands. 331-362
Volume 17, Number 4, 2009
- Bruno Blanchet:
Automatic verification of correspondences for security protocols. 363-434 - Stéphanie Delaune, Steve Kremer, Mark Ryan:
Verifying privacy-type properties of electronic voting protocols. 435-487 - Xuhua Ding, Gene Tsudik, Shouhuai Xu:
Leak-free mediated group signatures. 489-514
Volume 17, Number 5, 2009
- Joshua D. Guttman:
Introduction. 515 - Andrei Sabelfeld, David Sands:
Declassification: Dimensions and principles. 517-548 - Ana Almeida Matos, Gérard Boudol:
On declassification and the non-disclosure policy. 549-597 - William L. Harrison, James Hook:
Achieving information flow security through monadic control of effects. 599-653 - Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider:
Quantifying information flow with beliefs. 655-701 - Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh:
Polynomial runtime in simulatability definitions. 703-735 - Pedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov:
Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage. 737-797 - Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Planning and verifying service composition. 799-837
Volume 17, Number 6, 2009
- Gilles Guette:
Automating trusted key rollover in DNSSEC. 839-854 - Mila Dalla Preda, Roberto Giacobazzi:
Semantics-based code obfuscation by abstract interpretation. 855-908 - Bart Jacobs, Ichiro Hasuo:
Semantics and logic for security protocols. 909-944 - Alberto Dainotti, Antonio Pescapè, Giorgio Ventre:
A cascade architecture for DoS attacks detection based on the wavelet transform. 945-968
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.