


default search action
Journal of Computer Security, Volume 20
Volume 20, Number 1, 2012
- Alessandro Armando

, Gavin Lowe:
Preface. 1 - Mário S. Alvim

, Miguel E. Andrés, Catuscia Palamidessi
:
Quantitative information flow in interactive systems. 3-50 - Nataliia Bielova

, Fabio Massacci
:
Iterative enforcement by suppression: Towards practical enforcement theories. 51-79 - Gabriele Costa

, Pierpaolo Degano, Fabio Martinelli:
Modular plans for secure service composition. 81-117
Volume 20, Numbers 2-3, 2012
- Hongbin Zhou, Simon N. Foley

:
Fast automatic security protocol generation. 119-167 - Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong:

Towards cost-sensitive assessment of intrusion response selection. 169-198 - Brian M. Bowen, Vasileios P. Kemerlis

, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
A system for generating and injecting indistinguishable network decoys. 199-221 - Gail-Joon Ahn

, Jing Jin, Mohamed Shehab
:
Policy-driven role-based access management for ad-hoc collaboration. 223-257 - Marina Blanton

, Mehrdad Aliasgari:
Secure outsourced computation of iris matching. 259-305
Volume 20, Number 4, 2012
- Gilles Barthe

, Jorge Cuéllar, Javier López
, Alexander Pretschner:
Preface. 307-308 - Alessandro Armando

, Silvio Ranise
:
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving. 309-352 - Deepak Garg, Frank Pfenning:

Stateful authorization logic - Proof theory and a case study. 353-391 - Michele Bezzi, Sabrina De Capitani di Vimercati

, Sara Foresti
, Giovanni Livraga
, Pierangela Samarati
, Roberto Sassi
:
Modeling and preventing inferences from sensitive value distributions in data release. 393-436 - Yanjie Sun, Chenyi Zhang

, Jun Pang, Baptiste Alcalde, Sjouke Mauw
:
A trust-augmented voting scheme for collaborative privacy management. 437-459
Volume 20, Number 5, 2012
- Yingjiu Li:

Guest Editor's Preface. 461-462 - Valentina Ciriani

, Sabrina De Capitani di Vimercati
, Sara Foresti
, Giovanni Livraga
, Pierangela Samarati
:
An OBDD approach to enforce confidentiality and visibility constraints in data publishing. 463-508 - Joachim Biskup:

Dynamic policy adaptation for inference control of queries to a propositional information system. 509-546 - Raman Adaikkalavan, Xing Xie, Indrakshi Ray:

Multilevel secure data stream processing: Architecture and implementation. 547-581 - Yuan Hong

, Jaideep Vaidya, Haibing Lu:
Secure and efficient distributed linear programming. 583-634
Volume 20, Number 6, 2012
- Andrew C. Myers, Michael Backes:

Preface. 635-636 - Stephen Chong:

Required information release. 637-676 - Moritz Y. Becker:

Information flow in trust management systems. 677-708 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:

A game-based definition of coercion resistance and its applications. 709-764

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














