Journal of Computer Security, Volume 20
Volume 20, Number 1, 2012
- Mário S. Alvim, Miguel E. Andrés, Catuscia Palamidessi:
Quantitative information flow in interactive systems. 3-50 - Nataliia Bielova, Fabio Massacci:
Iterative enforcement by suppression: Towards practical enforcement theories. 51-79 - Gabriele Costa, Pierpaolo Degano, Fabio Martinelli:
Modular plans for secure service composition. 81-117
Volume 20, Numbers 2-3, 2012
- Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong:
Towards cost-sensitive assessment of intrusion response selection. 169-198 - Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
A system for generating and injecting indistinguishable network decoys. 199-221 - Gail-Joon Ahn, Jing Jin, Mohamed Shehab:
Policy-driven role-based access management for ad-hoc collaboration. 223-257
Volume 20, Number 4, 2012
- Alessandro Armando, Silvio Ranise:
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving. 309-352 - Michele Bezzi, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati, Roberto Sassi:
Modeling and preventing inferences from sensitive value distributions in data release. 393-436 - Yanjie Sun, Chenyi Zhang, Jun Pang, Baptiste Alcalde, Sjouke Mauw:
A trust-augmented voting scheme for collaborative privacy management. 437-459
Volume 20, Number 5, 2012
- Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati:
An OBDD approach to enforce confidentiality and visibility constraints in data publishing. 463-508 - Joachim Biskup:
Dynamic policy adaptation for inference control of queries to a propositional information system. 509-546 - Raman Adaikkalavan, Xing Xie, Indrakshi Ray:
Multilevel secure data stream processing: Architecture and implementation. 547-581
Volume 20, Number 6, 2012
- Ralf Küsters, Tomasz Truderung, Andreas Vogt:
A game-based definition of coercion resistance and its applications. 709-764