default search action
Journal of Computer Security, Volume 23
Volume 23, Number 1, 2015
- Ping Yang, Mikhail I. Gofman, Scott D. Stoller, Zijiang Yang:
Policy analysis for administrative role based access control without separate administration. 1-29 - Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
The generalized temporal role mining problem. 31-58 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Loose associations to increase utility in data publishing. 59-88 - Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:
Anonymizing transactional datasets. 89-106 - Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar:
Towards user-oriented RBAC model. 107-129
Volume 23, Number 2, 2015
- Wen Ming Liu, Lingyu Wang, Lei Zhang, Shunzhi Zhu:
k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure. 131-165 - Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable wiretapping - or - I know they can hear you now. 167-195 - Ron van der Meyden:
What, indeed, is intransitive noninterference? 197-228 - Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Practical and provably secure distance-bounding. 229-257
Volume 23, Number 3, 2015
- Thomas Gibson-Robinson, Allaa Kamil, Gavin Lowe:
Verifying layered security protocols. 259-307 - Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay:
Expected loss analysis for authentication in constrained channels. 309-329 - David Cadé, Bruno Blanchet:
Proved generation of implementations from computationally secure protocol specifications. 331-402 - Jiawei Yuan, Shucheng Yu:
PCPOR: Public and constant-cost proofs of retrievability in cloud. 403-425
Volume 23, Number 4, 2015
- Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi:
On the information leakage of differentially-private mechanisms. 427-469 - Shiuan-Tzuo Shen, Wen-Guey Tzeng:
Delegated integrity check for hierarchical cloud data. 471-508 - Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan:
CookiExt: Patching the browser against session hijacking attacks. 509-537
Volume 23, Number 5, 2015
- Luca Spalazzi, Luca Viganò:
Special issue on security and high performance computing systems. 539-540
- Jason Lowden, Marcin Lukowiak, Sonia Lopez Alarcon:
Design and performance analysis of efficient Keccak tree hashing on GPU architectures. 541-562 - Giampaolo Bella, Paul Curzon, Gabriele Lenzini:
Service security and privacy as a socio-technical problem. 563-585 - Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade:
Brandt's fully private auction protocol revisited. 587-610 - Alessio Merlo, Mauro Migliardi, Paolo Fontanelli:
Measuring and estimating power consumption in Android to support energy-based intrusion detection. 611-637
- Sergey Victorovich Belim, Nadezda F. Bogachenko, Evgeniy Ilushechkin:
An analysis of graphs that represent a role-based security policy hierarchy. 641-657
Volume 23, Number 6, 2015
- Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
New access control systems based on outsourced attribute-based encryption. 659-683 - Abdullah Ali Alshehri, Steve A. Schneider:
A formal framework for security analysis of NFC mobile coupon protocols. 685-707 - Piero A. Bonatti, Clemente Galdi, Davide Torres:
Event-driven RBAC. 709-757 - Yannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset:
Probabilistic cost enforcement of security policies. 759-787
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.