default search action
Journal of Computer Security, Volume 20
Volume 20, Number 1, 2012
- Alessandro Armando, Gavin Lowe:
Preface. 1 - Mário S. Alvim, Miguel E. Andrés, Catuscia Palamidessi:
Quantitative information flow in interactive systems. 3-50 - Nataliia Bielova, Fabio Massacci:
Iterative enforcement by suppression: Towards practical enforcement theories. 51-79 - Gabriele Costa, Pierpaolo Degano, Fabio Martinelli:
Modular plans for secure service composition. 81-117
Volume 20, Numbers 2-3, 2012
- Hongbin Zhou, Simon N. Foley:
Fast automatic security protocol generation. 119-167 - Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong:
Towards cost-sensitive assessment of intrusion response selection. 169-198 - Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
A system for generating and injecting indistinguishable network decoys. 199-221 - Gail-Joon Ahn, Jing Jin, Mohamed Shehab:
Policy-driven role-based access management for ad-hoc collaboration. 223-257 - Marina Blanton, Mehrdad Aliasgari:
Secure outsourced computation of iris matching. 259-305
Volume 20, Number 4, 2012
- Gilles Barthe, Jorge Cuéllar, Javier López, Alexander Pretschner:
Preface. 307-308 - Alessandro Armando, Silvio Ranise:
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving. 309-352 - Deepak Garg, Frank Pfenning:
Stateful authorization logic - Proof theory and a case study. 353-391 - Michele Bezzi, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati, Roberto Sassi:
Modeling and preventing inferences from sensitive value distributions in data release. 393-436 - Yanjie Sun, Chenyi Zhang, Jun Pang, Baptiste Alcalde, Sjouke Mauw:
A trust-augmented voting scheme for collaborative privacy management. 437-459
Volume 20, Number 5, 2012
- Yingjiu Li:
Guest Editor's Preface. 461-462 - Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati:
An OBDD approach to enforce confidentiality and visibility constraints in data publishing. 463-508 - Joachim Biskup:
Dynamic policy adaptation for inference control of queries to a propositional information system. 509-546 - Raman Adaikkalavan, Xing Xie, Indrakshi Ray:
Multilevel secure data stream processing: Architecture and implementation. 547-581 - Yuan Hong, Jaideep Vaidya, Haibing Lu:
Secure and efficient distributed linear programming. 583-634
Volume 20, Number 6, 2012
- Andrew C. Myers, Michael Backes:
Preface. 635-636 - Stephen Chong:
Required information release. 637-676 - Moritz Y. Becker:
Information flow in trust management systems. 677-708 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:
A game-based definition of coercion resistance and its applications. 709-764
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.