


default search action
Journal of Computer Security, Volume 16
Volume 16, Number 1, 2008
- Nan Zhang, Mark Ryan

, Dimitar P. Guelev:
Synthesising verified access control systems through model checking. 1-61 - Karl Krukow, Mogens Nielsen, Vladimiro Sassone:

A logical framework for history-based access control and reputation systems. 63-101
Volume 16, Number 2, 2008
- George O. M. Yee, Ali A. Ghorbani, Patrick C. K. Hung:

Guest Editors' Introduction. 103-106 - Jie Zhou, Jim Alves-Foss:

Security policy refinement and enforcement for the design of multi-level secure systems. 107-131 - Marco Casassa Mont

, Robert Thyne:
Privacy policy enforcement in enterprises with identity management solutions. 133-163 - Harshit Nayyar, Ali A. Ghorbani:

Approximate autoregressive modeling for network attack detection. 165-197 - Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth, Luc Van Gool, Andreas Steffen:

Privacy in video surveilled spaces. 199-222 - Muhammad Alam, Michael Hafner, Ruth Breu:

Constraint based role based access control in the SECTET-frameworkA model-driven approach. 223-260
Volume 16, Number 3, 2008
- George O. M. Yee, Chunming Rong

, Laurence Tianruo Yang:
Guest Editors' Introduction. 261-264 - Adam J. Elbirt:

Accelerated AES implementations via generalized instruction set extensions. 265-288 - Anne V. D. M. Kayem

, Selim G. Akl, Patrick Martin:
On replacing cryptographic keys in hierarchical key management systems. 289-309 - Lifu Wang, Partha Dasgupta:

Coprocessor-based hierarchical trust management for software integrity and digital identity protection. 311-339 - Janne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong

:
Protection against unauthorized access and computer crime in Norwegian enterprises. 341-366
Volume 16, Number 4, 2008
- Ernesto Damiani

:
Guest Editorial. 367-368 - Claudio A. Ardagna

, Marco Cremonini
, Sabrina De Capitani di Vimercati
, Pierangela Samarati
:
A privacy-aware access control system. 369-397 - Michael T. Goodrich

, Roberto Tamassia, Danfeng (Daphne) Yao
:
Notarized federated ID management and authentication. 399-418 - Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:

Implementing interactive analysis of attack graphs using relational databases. 419-437 - Vijayalakshmi Atluri

, Heechang Shin, Jaideep Vaidya:
Efficient security policy enforcement for the mobile environment. 439-475 - Joachim Biskup, Lena Wiese

:
Preprocessing for controlled query evaluation with availability policy. 477-494
Volume 16, Number 5, 2008
- Andrei Sabelfeld:

Preface. 495 - Michael Backes, Birgit Pfitzmann, Andre Scedrov

:
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. 497-530 - Konstantinos Chatzikokolakis, Catuscia Palamidessi

, Prakash Panangaden:
On the Bayes risk in information-hiding protocols. 531-571 - Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer:

A secure compiler for session abstractions. 573-636 - Paritosh Shroff, Scott F. Smith, Mark Thober:

Securing information flow via dynamic capture of dependencies. 637-688
Volume 16, Number 6, 2008
- Ferucio Laurentiu Tiplea, Catalin V. Bîrjoveanu, Constantin Enea, Ioana Boureanu:

Secrecy for bounded security protocols with freshness check is NEXPTIME-complete. 689-712 - Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta:

Exploiting open functionality in SMS-capable cellular networks. 713-742 - Toby C. Murray, Duncan A. Grove:

Non-delegatable authorities in capability systems. 743-759 - Petros Belsis

, Kostas Fragos, Stefanos Gritzalis
, Christos Skourlas:
Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification. 761-790

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














