default search action
Journal of Computer Security, Volume 22
Volume 22, Number 1, 2014
- Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri:
An optimization framework for role mining. 1-31 - Tsz Hon Yuen, Willy Susilo, Yi Mu:
Towards a cryptographic treatment of publish/subscribe systems. 33-67 - Jianwei Niu, Mark Reith, William H. Winsborough:
Formal verification of security properties in trust management policy. 69-153 - Sai Teja Peddinti, Nitesh Saxena:
Web search query privacy: Evaluating query obfuscation and anonymizing networks. 155-199
Volume 22, Number 2, 2014
- Konstantinos Chatzikokolakis, Sebastian Alexander Mödersheim, Catuscia Palamidessi, Jun Pang:
Foundational aspects of security. 201-202 - Joshua D. Guttman:
Establishing and preserving protocol security goals. 203-267 - Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman:
Effective verification of confidentiality for multi-threaded programs. 269-300 - Michael Backes, Catalin Hritcu, Matteo Maffei:
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations. 301-353
Volume 22, Number 3, 2014
- Carlo Blundo, Emiliano De Cristofaro, Paolo Gasti:
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity. 355-381 - Yannis Soupionis, Remous-Aris Koutsiamanis, Pavlos S. Efraimidis, Dimitris Gritzalis:
A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication. 383-413 - Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan:
Automated detection of parameter tampering opportunities and vulnerabilities in web applications. 415-465
Volume 22, Number 4, 2014
- Lieven Desmet, Martin Johns, Benjamin Livshits, Andrei Sabelfeld:
Preface. 467-468 - Willem De Groef, Dominique Devriese, Nick Nikiforakis, Frank Piessens:
Secure multi-execution of web scripts: Theory and practice. 469-509 - Joe Gibbs Politz, Arjun Guha, Shriram Krishnamurthi:
Typed-based verification of Web sandboxes. 511-565 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk:
Scriptless attacks: Stealing more pie without touching the sill. 567-599 - Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis:
Discovering concrete attacks on website authorization by formal analysis. 601-657
Volume 22, Number 5, 2014
- David A. Basin, Samuel J. Burri, Günter Karjoth:
Obstruction-free authorization enforcement: Aligning security and business objectives. 661-698 - Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker, Benjamin G. Zorn:
Modular protections against non-control data attacks. 699-742 - Myrto Arapinis, Joshua Phillips, Eike Ritter, Mark Dermot Ryan:
StatVerif: Verification of stateful processes. 743-821 - François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a general-purpose C verifier to prove cryptographic protocols. 823-866
Volume 22, Number 6, 2014
- Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano:
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes. 867-912 - Johannes Braun, Florian Volk, Jiska Classen, Johannes Buchmann, Max Mühlhäuser:
CA trust management for the Web PKI. 913-959 - Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural, Anna Lisa Ferrara, Gennaro Parlato, P. Madhusudan:
Security analysis for temporal role based access control. 961-996 - Yen-Chung Chen, Yu-Sung Wu, Wen-Guey Tzeng:
Preserving user query privacy in cloud-based security services. 997-1024 - Nicolas Buchmann, Harald Baier:
Towards a more secure and scalable verifying PKI of eMRTD. 1025-1049
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.