


default search action
Journal of Computer Security, Volume 17
Volume 17, Number 1, 2009
- Milan Petkovic, Willem Jonker:

Preface. 1-3 - Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini

, Sushil Jajodia:
Evaluating privacy threats in released database views by symmetric indistinguishability. 5-42 - Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn:

Privacy-preserving incremental data dissemination. 43-68 - Stefan Böttcher, Rita Hartel:

Information disclosure by answers to XPath queries. 69-99 - Weiwei Cheng, Kian-Lee Tan

:
Query assurance verification for outsourced multi-dimensional databases. 101-126
Volume 17, Number 2, 2009
- Nan Hu, Giri Kumar Tayi, Chengyu Ma, Yingjiu Li:

Certificate revocation release policies. 127-157 - Amir Herzberg:

Folklore, practice and theory of robust combiners. 159-189 - Benjamin Aziz, Simon N. Foley

, John Herbert, Garret Swart:
Configuring storage-area networks using mandatory security. 191-210 - Jaideep Vaidya, Vijayalakshmi Atluri

, Qi Guo, Haibing Lu:
Edge-RMP: Minimizing administrative assignments for role-based access control. 211-235
Volume 17, Number 3, 2009
- Giampaolo Bella

, Peter Y. A. Ryan
:
Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing. 237 - Petros Belsis

, Kostas Fragos, Stefanos Gritzalis
, Christos Skourlas:
Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification. 239-268 - Christian Grothoff, Krista Grothoff, Ryan Stutsman, Ludmila Alkhutova, Mikhail J. Atallah:

Translation-based steganography. 269-303 - Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda:

Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. 305-329 - Haizhi Xu, Steve J. Chapin:

Address-space layout randomization using code islands. 331-362
Volume 17, Number 4, 2009
- Bruno Blanchet:

Automatic verification of correspondences for security protocols. 363-434 - Stéphanie Delaune, Steve Kremer

, Mark Ryan
:
Verifying privacy-type properties of electronic voting protocols. 435-487 - Xuhua Ding

, Gene Tsudik, Shouhuai Xu:
Leak-free mediated group signatures. 489-514
Volume 17, Number 5, 2009
- Joshua D. Guttman

:
Introduction. 515 - Andrei Sabelfeld, David Sands:

Declassification: Dimensions and principles. 517-548 - Ana Almeida Matos

, Gérard Boudol:
On declassification and the non-disclosure policy. 549-597 - William L. Harrison, James Hook:

Achieving information flow security through monadic control of effects. 599-653 - Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider:

Quantifying information flow with beliefs. 655-701 - Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh

:
Polynomial runtime in simulatability definitions. 703-735 - Pedro Adão

, Gergei Bana, Jonathan Herzog, Andre Scedrov
:
Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage. 737-797 - Massimo Bartoletti

, Pierpaolo Degano, Gian-Luigi Ferrari
:
Planning and verifying service composition. 799-837
Volume 17, Number 6, 2009
- Gilles Guette:

Automating trusted key rollover in DNSSEC. 839-854 - Mila Dalla Preda, Roberto Giacobazzi:

Semantics-based code obfuscation by abstract interpretation. 855-908 - Bart Jacobs, Ichiro Hasuo

:
Semantics and logic for security protocols. 909-944 - Alberto Dainotti

, Antonio Pescapè, Giorgio Ventre:
A cascade architecture for DoS attacks detection based on the wavelet transform. 945-968

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














