


default search action
Journal of Computer Security, Volume 23
Volume 23, Number 1, 2015
- Ping Yang, Mikhail I. Gofman, Scott D. Stoller, Zijiang Yang:
Policy analysis for administrative role based access control without separate administration. 1-29 - Barsha Mitra, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
The generalized temporal role mining problem. 31-58 - Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Loose associations to increase utility in data publishing. 59-88 - Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:
Anonymizing transactional datasets. 89-106 - Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan
, Nazia Badar:
Towards user-oriented RBAC model. 107-129
Volume 23, Number 2, 2015
- Wen Ming Liu, Lingyu Wang, Lei Zhang, Shunzhi Zhu:
k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure. 131-165 - Adam Bates, Kevin R. B. Butler
, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable wiretapping - or - I know they can hear you now. 167-195 - Ron van der Meyden
:
What, indeed, is intransitive noninterference? 197-228 - Ioana Boureanu, Aikaterini Mitrokotsa
, Serge Vaudenay:
Practical and provably secure distance-bounding. 229-257
Volume 23, Number 3, 2015
- Thomas Gibson-Robinson
, Allaa Kamil, Gavin Lowe:
Verifying layered security protocols. 259-307 - Christos Dimitrakakis
, Aikaterini Mitrokotsa
, Serge Vaudenay:
Expected loss analysis for authentication in constrained channels. 309-329 - David Cadé, Bruno Blanchet:
Proved generation of implementations from computationally secure protocol specifications. 331-402 - Jiawei Yuan, Shucheng Yu
:
PCPOR: Public and constant-cost proofs of retrievability in cloud. 403-425
Volume 23, Number 4, 2015
- Mário S. Alvim
, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi
:
On the information leakage of differentially-private mechanisms. 427-469 - Shiuan-Tzuo Shen, Wen-Guey Tzeng:
Delegated integrity check for hierarchical cloud data. 471-508 - Michele Bugliesi
, Stefano Calzavara
, Riccardo Focardi
, Wilayat Khan:
CookiExt: Patching the browser against session hijacking attacks. 509-537
Volume 23, Number 5, 2015
- Luca Spalazzi
, Luca Viganò:
Special issue on security and high performance computing systems. 539-540
- Jason Lowden, Marcin Lukowiak, Sonia Lopez Alarcon:
Design and performance analysis of efficient Keccak tree hashing on GPU architectures. 541-562 - Giampaolo Bella
, Paul Curzon
, Gabriele Lenzini
:
Service security and privacy as a socio-technical problem. 563-585 - Jannik Dreier, Jean-Guillaume Dumas
, Pascal Lafourcade
:
Brandt's fully private auction protocol revisited. 587-610 - Alessio Merlo, Mauro Migliardi
, Paolo Fontanelli:
Measuring and estimating power consumption in Android to support energy-based intrusion detection. 611-637
- Sergey Victorovich Belim
, Nadezda F. Bogachenko
, Evgeniy Ilushechkin:
An analysis of graphs that represent a role-based security policy hierarchy. 641-657
Volume 23, Number 6, 2015
- Jin Li, Xiaofeng Chen, Jingwei Li
, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
New access control systems based on outsourced attribute-based encryption. 659-683 - Abdullah Ali Alshehri, Steve A. Schneider:
A formal framework for security analysis of NFC mobile coupon protocols. 685-707 - Piero A. Bonatti, Clemente Galdi
, Davide Torres:
Event-driven RBAC. 709-757 - Yannis Mallios, Lujo Bauer
, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset:
Probabilistic cost enforcement of security policies. 759-787

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.