


default search action
Journal of Computer Security, Volume 23
Volume 23, Number 1, 2015
- Ping Yang, Mikhail I. Gofman, Scott D. Stoller, Zijiang Yang:

Policy analysis for administrative role based access control without separate administration. 1-29 - Barsha Mitra, Shamik Sural

, Vijayalakshmi Atluri
, Jaideep Vaidya:
The generalized temporal role mining problem. 31-58 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Loose associations to increase utility in data publishing. 59-88 - Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:

Anonymizing transactional datasets. 89-106 - Haibing Lu, Yuan Hong

, Yanjiang Yang, Lian Duan
, Nazia Badar:
Towards user-oriented RBAC model. 107-129
Volume 23, Number 2, 2015
- Wen Ming Liu, Lingyu Wang, Lei Zhang, Shunzhi Zhu:

k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure. 131-165 - Adam Bates, Kevin R. B. Butler

, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable wiretapping - or - I know they can hear you now. 167-195 - Ron van der Meyden

:
What, indeed, is intransitive noninterference? 197-228 - Ioana Boureanu, Aikaterini Mitrokotsa

, Serge Vaudenay:
Practical and provably secure distance-bounding. 229-257
Volume 23, Number 3, 2015
- Thomas Gibson-Robinson

, Allaa Kamil, Gavin Lowe:
Verifying layered security protocols. 259-307 - Christos Dimitrakakis

, Aikaterini Mitrokotsa
, Serge Vaudenay:
Expected loss analysis for authentication in constrained channels. 309-329 - David Cadé, Bruno Blanchet:

Proved generation of implementations from computationally secure protocol specifications. 331-402 - Jiawei Yuan, Shucheng Yu

:
PCPOR: Public and constant-cost proofs of retrievability in cloud. 403-425
Volume 23, Number 4, 2015
- Mário S. Alvim

, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi
:
On the information leakage of differentially-private mechanisms. 427-469 - Shiuan-Tzuo Shen, Wen-Guey Tzeng:

Delegated integrity check for hierarchical cloud data. 471-508 - Michele Bugliesi

, Stefano Calzavara
, Riccardo Focardi
, Wilayat Khan:
CookiExt: Patching the browser against session hijacking attacks. 509-537
Volume 23, Number 5, 2015
- Luca Spalazzi

, Luca Viganò
:
Special issue on security and high performance computing systems. 539-540
- Jason Lowden, Marcin Lukowiak, Sonia Lopez Alarcon:

Design and performance analysis of efficient Keccak tree hashing on GPU architectures. 541-562 - Giampaolo Bella

, Paul Curzon
, Gabriele Lenzini
:
Service security and privacy as a socio-technical problem. 563-585 - Jannik Dreier, Jean-Guillaume Dumas

, Pascal Lafourcade
:
Brandt's fully private auction protocol revisited. 587-610 - Alessio Merlo, Mauro Migliardi

, Paolo Fontanelli:
Measuring and estimating power consumption in Android to support energy-based intrusion detection. 611-637
- Sergey Victorovich Belim

, Nadezda F. Bogachenko
, Evgeniy Ilushechkin:
An analysis of graphs that represent a role-based security policy hierarchy. 641-657
Volume 23, Number 6, 2015
- Jin Li, Xiaofeng Chen, Jingwei Li

, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
New access control systems based on outsourced attribute-based encryption. 659-683 - Abdullah Ali Alshehri, Steve A. Schneider:

A formal framework for security analysis of NFC mobile coupon protocols. 685-707 - Piero A. Bonatti, Clemente Galdi

, Davide Torres:
Event-driven RBAC. 709-757 - Yannis Mallios, Lujo Bauer

, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset:
Probabilistic cost enforcement of security policies. 759-787

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














