:facetid:toc:\"db/journals/jcs/jcs16.bht\"OK:facetid:toc:db/journals/jcs/jcs16.bhtMuhammad AlamMichael HafnerRuth BreuConstraint based role based access control in the SECTET-frameworkA model-driven approach.J. Comput. Secur.162223-2602008Journal Articlesclosedjournals/jcs/AlamHB0810.3233/JCS-2008-16206https://doi.org/10.3233/jcs-2008-16206https://dblp.org/rec/journals/jcs/AlamHB08URL#5277990Claudio A. ArdagnaMarco CremoniniSabrina De Capitani di VimercatiPierangela SamaratiA privacy-aware access control system.J. Comput. Secur.164369-3972008Journal Articlesclosedjournals/jcs/ArdagnaCVS0810.3233/JCS-2008-0328https://doi.org/10.3233/JCS-2008-0328https://dblp.org/rec/journals/jcs/ArdagnaCVS08URL#5277991Vijayalakshmi AtluriHeechang ShinJaideep VaidyaEfficient security policy enforcement for the mobile environment.J. Comput. Secur.164439-4752008Journal Articlesclosedjournals/jcs/AtluriSV0810.3233/JCS-2008-0329https://doi.org/10.3233/JCS-2008-0329https://dblp.org/rec/journals/jcs/AtluriSV08URL#5277992Michael Backes 0001Birgit PfitzmannAndre ScedrovKey-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles.J. Comput. Secur.165497-5302008Journal Articlesclosedjournals/jcs/BackesPS0810.3233/JCS-2008-0332https://doi.org/10.3233/JCS-2008-0332https://dblp.org/rec/journals/jcs/BackesPS08URL#5277993Petros BelsisKostas FragosStefanos GritzalisChristos SkourlasApplying effective feature selection techniques with hierarchical mixtures of experts for spam classification.J. Comput. Secur.166761-7902008Journal Articlesclosedjournals/jcs/BelsisFGS0810.3233/JCS-2008-0319https://doi.org/10.3233/JCS-2008-0319https://dblp.org/rec/journals/jcs/BelsisFGS08URL#5277994Joachim BiskupLena WiesePreprocessing for controlled query evaluation with availability policy.J. Comput. Secur.164477-4942008Journal Articlesclosedjournals/jcs/BiskupW0810.3233/JCS-2008-0325https://doi.org/10.3233/JCS-2008-0325https://dblp.org/rec/journals/jcs/BiskupW08URL#5277995Konstantinos Chatzikokolakis 0001Catuscia PalamidessiPrakash PanangadenOn the Bayes risk in information-hiding protocols.J. Comput. Secur.165531-5712008Journal Articlesclosedjournals/jcs/ChatzikokolakisPP0810.3233/JCS-2008-0333https://doi.org/10.3233/JCS-2008-0333https://dblp.org/rec/journals/jcs/ChatzikokolakisPP08URL#5277996Ricardo CorinPierre-Malo DeniélouCédric FournetKarthikeyan BhargavanJames J. LeiferA secure compiler for session abstractions.J. Comput. Secur.165573-6362008Journal Articlesclosedjournals/jcs/CorinDFBL0810.3233/JCS-2008-0334https://doi.org/10.3233/JCS-2008-0334https://dblp.org/rec/journals/jcs/CorinDFBL08URL#5277997Ernesto DamianiGuest Editorial.J. Comput. Secur.164367-3682008Journal Articlesclosedjournals/jcs/Damiani0810.3233/JCS-2008-0338https://doi.org/10.3233/JCS-2008-0338https://dblp.org/rec/journals/jcs/Damiani08URL#5277998Adam J. ElbirtAccelerated AES implementations via generalized instruction set extensions.J. Comput. Secur.163265-2882008Journal Articlesclosedjournals/jcs/Elbirt0810.3233/JCS-2008-16302https://doi.org/10.3233/jcs-2008-16302https://dblp.org/rec/journals/jcs/Elbirt08URL#5277999Michael T. GoodrichRoberto TamassiaDanfeng (Daphne) YaoNotarized federated ID management and authentication.J. Comput. Secur.164399-4182008Journal Articlesclosedjournals/jcs/GoodrichTY0810.3233/JCS-2008-0324https://doi.org/10.3233/JCS-2008-0324https://dblp.org/rec/journals/jcs/GoodrichTY08URL#5278000Janne Merete HagenTormod Kalberg SivertsenChunming RongProtection against unauthorized access and computer crime in Norwegian enterprises.J. Comput. Secur.163341-3662008Journal Articlesclosedjournals/jcs/HagenSR0810.3233/JCS-2008-16305https://doi.org/10.3233/jcs-2008-16305https://dblp.org/rec/journals/jcs/HagenSR08URL#5278001Anne V. D. M. KayemSelim G. AklPatrick Martin 0001On replacing cryptographic keys in hierarchical key management systems.J. Comput. Secur.163289-3092008Journal Articlesclosedjournals/jcs/KayemAM0810.3233/JCS-2008-16303https://doi.org/10.3233/jcs-2008-16303https://dblp.org/rec/journals/jcs/KayemAM08URL#5278002Karl KrukowMogens NielsenVladimiro SassoneA logical framework for history-based access control and reputation systems.J. Comput. Secur.16163-1012008Journal Articlesclosedjournals/jcs/KrukowNS0810.3233/JCS-2008-16102https://doi.org/10.3233/jcs-2008-16102https://dblp.org/rec/journals/jcs/KrukowNS08URL#5278003Marco Casassa MontRobert ThynePrivacy policy enforcement in enterprises with identity management solutions.J. Comput. Secur.162133-1632008Journal Articlesclosedjournals/jcs/MontT0810.3233/JCS-2008-16203https://doi.org/10.3233/jcs-2008-16203https://dblp.org/rec/journals/jcs/MontT08URL#5278004Toby C. MurrayDuncan A. GroveNon-delegatable authorities in capability systems.J. Comput. Secur.166743-7592008Journal Articlesclosedjournals/jcs/MurrayG0810.3233/JCS-2008-0314https://doi.org/10.3233/JCS-2008-0314https://dblp.org/rec/journals/jcs/MurrayG08URL#5278005Harshit NayyarAli A. Ghorbani 0001Approximate autoregressive modeling for network attack detection.J. Comput. Secur.162165-1972008Journal Articlesclosedjournals/jcs/NayyarG0810.3233/JCS-2008-16204https://doi.org/10.3233/jcs-2008-16204https://dblp.org/rec/journals/jcs/NayyarG08URL#5278006Andrei SabelfeldPreface.J. Comput. Secur.1654952008Journal Articlesclosedjournals/jcs/Sabelfeld0810.3233/JCS-2008-0331https://doi.org/10.3233/JCS-2008-0331https://dblp.org/rec/journals/jcs/Sabelfeld08URL#5278007Paritosh ShroffScott F. Smith 0001Mark ThoberSecuring information flow via dynamic capture of dependencies.J. Comput. Secur.165637-6882008Journal Articlesclosedjournals/jcs/ShroffST0810.3233/JCS-2008-0335https://doi.org/10.3233/JCS-2008-0335https://dblp.org/rec/journals/jcs/ShroffST08URL#5278008Torsten SpindlerChristoph WartmannLudger HovestadtDaniel Roth 0002Luc Van GoolAndreas SteffenPrivacy in video surveilled spaces.J. Comput. Secur.162199-2222008Journal Articlesclosedjournals/jcs/SpindlerWHRGS0810.3233/JCS-2008-16205https://doi.org/10.3233/jcs-2008-16205https://dblp.org/rec/journals/jcs/SpindlerWHRGS08URL#5278009Ferucio Laurentiu TipleaCatalin V. BîrjoveanuConstantin EneaIoana BoureanuSecrecy for bounded security protocols with freshness check is NEXPTIME-complete.J. Comput. Secur.166689-7122008Journal Articlesclosedjournals/jcs/TipleaBEB0810.3233/JCS-2007-0306https://doi.org/10.3233/JCS-2007-0306https://dblp.org/rec/journals/jcs/TipleaBEB08URL#5278010Patrick TraynorWilliam EnckPatrick D. McDanielThomas La PortaExploiting open functionality in SMS-capable cellular networks.J. Comput. Secur.166713-7422008Journal Articlesclosedjournals/jcs/TraynorEMP0810.3233/JCS-2007-0308https://doi.org/10.3233/JCS-2007-0308https://dblp.org/rec/journals/jcs/TraynorEMP08URL#5278011Lifu WangPartha DasguptaCoprocessor-based hierarchical trust management for software integrity and digital identity protection.J. Comput. Secur.163311-3392008Journal Articlesclosedjournals/jcs/WangD0810.3233/JCS-2008-16304https://doi.org/10.3233/jcs-2008-16304https://dblp.org/rec/journals/jcs/WangD08URL#5278012Lingyu Wang 0001Chao YaoAnoop SinghalSushil JajodiaImplementing interactive analysis of attack graphs using relational databases.J. Comput. Secur.164419-4372008Journal Articlesclosedjournals/jcs/WangYSJ0810.3233/JCS-2008-0327https://doi.org/10.3233/JCS-2008-0327https://dblp.org/rec/journals/jcs/WangYSJ08URL#5278013George O. M. YeeAli A. Ghorbani 0001Patrick C. K. HungGuest Editors' Introduction.J. Comput. Secur.162103-1062008Journal Articlesclosedjournals/jcs/YeeGH0810.3233/JCS-2008-16201https://doi.org/10.3233/jcs-2008-16201https://dblp.org/rec/journals/jcs/YeeGH08URL#5278014George O. M. YeeChunming RongLaurence Tianruo YangGuest Editors' Introduction.J. Comput. Secur.163261-2642008Journal Articlesclosedjournals/jcs/YeeRY0810.3233/JCS-2008-16301https://doi.org/10.3233/jcs-2008-16301https://dblp.org/rec/journals/jcs/YeeRY08URL#5278015Nan Zhang 0003Mark Ryan 0001Dimitar P. GuelevSynthesising verified access control systems through model checking.J. Comput. Secur.1611-612008Journal Articlesclosedjournals/jcs/ZhangRG0810.3233/JCS-2008-16101https://doi.org/10.3233/jcs-2008-16101https://dblp.org/rec/journals/jcs/ZhangRG08URL#5278016Jie ZhouJim Alves-FossSecurity policy refinement and enforcement for the design of multi-level secure systems.J. Comput. Secur.162107-1312008Journal Articlesclosedjournals/jcs/ZhouA0810.3233/JCS-2008-16202https://doi.org/10.3233/jcs-2008-16202https://dblp.org/rec/journals/jcs/ZhouA08URL#5278017