Search dblp for Publications

export results for "toc:db/journals/jcs/jcs17.bht:"

 download as .bib file

@article{DBLP:journals/jcs/AdaoBHS09,
  author       = {Pedro Ad{\~{a}}o and
                  Gergei Bana and
                  Jonathan Herzog and
                  Andre Scedrov},
  title        = {Soundness and completeness of formal encryption: The cases of key
                  cycles and partial information leakage},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {737--797},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0358},
  doi          = {10.3233/JCS-2009-0358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AdaoBHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AzizFHS09,
  author       = {Benjamin Aziz and
                  Simon N. Foley and
                  John Herbert and
                  Garret Swart},
  title        = {Configuring storage-area networks using mandatory security},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {191--210},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0337},
  doi          = {10.3233/JCS-2009-0337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AzizFHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BartolettiDF09,
  author       = {Massimo Bartoletti and
                  Pierpaolo Degano and
                  Gian{-}Luigi Ferrari},
  title        = {Planning and verifying service composition},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {799--837},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0357},
  doi          = {10.3233/JCS-2009-0357},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BartolettiDF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BellaR09,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan},
  title        = {Journal of Computer SecuritySpecial Number devoted to the best papers
                  of the Security Track at the 2006 {ACM} Symposium on Applied Computing},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {237},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0346},
  doi          = {10.3233/JCS-2009-0346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BellaR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BelsisFGS09,
  author       = {Petros Belsis and
                  Kostas Fragos and
                  Stefanos Gritzalis and
                  Christos Skourlas},
  title        = {Applying effective feature selection techniques with hierarchical
                  mixtures of experts for spam classification},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {239--268},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0377},
  doi          = {10.3233/JCS-2009-0377},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BelsisFGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Blanchet09,
  author       = {Bruno Blanchet},
  title        = {Automatic verification of correspondences for security protocols},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {363--434},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0339},
  doi          = {10.3233/JCS-2009-0339},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Blanchet09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BottcherH09,
  author       = {Stefan B{\"{o}}ttcher and
                  Rita Hartel},
  title        = {Information disclosure by answers to XPath queries},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {69--99},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0318},
  doi          = {10.3233/JCS-2009-0318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BottcherH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ByunLBLS09,
  author       = {Ji{-}Won Byun and
                  Tiancheng Li and
                  Elisa Bertino and
                  Ninghui Li and
                  Yonglak Sohn},
  title        = {Privacy-preserving incremental data dissemination},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {43--68},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0316},
  doi          = {10.3233/JCS-2009-0316},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ByunLBLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChengT09,
  author       = {Weiwei Cheng and
                  Kian{-}Lee Tan},
  title        = {Query assurance verification for outsourced multi-dimensional databases},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {101--126},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0315},
  doi          = {10.3233/JCS-2009-0315},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ChengT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ClarksonMS09,
  author       = {Michael R. Clarkson and
                  Andrew C. Myers and
                  Fred B. Schneider},
  title        = {Quantifying information flow with beliefs},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {655--701},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0353},
  doi          = {10.3233/JCS-2009-0353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ClarksonMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DainottiPV09,
  author       = {Alberto Dainotti and
                  Antonio Pescap{\`{e}} and
                  Giorgio Ventre},
  title        = {A cascade architecture for DoS attacks detection based on the wavelet
                  transform},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {945--968},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0350},
  doi          = {10.3233/JCS-2009-0350},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/DainottiPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DelauneKR09,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Verifying privacy-type properties of electronic voting protocols},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {435--487},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0340},
  doi          = {10.3233/JCS-2009-0340},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/DelauneKR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DingTX09,
  author       = {Xuhua Ding and
                  Gene Tsudik and
                  Shouhuai Xu},
  title        = {Leak-free mediated group signatures},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {489--514},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0342},
  doi          = {10.3233/JCS-2009-0342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DingTX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GrothoffGSAA09,
  author       = {Christian Grothoff and
                  Krista Grothoff and
                  Ryan Stutsman and
                  Ludmila Alkhutova and
                  Mikhail J. Atallah},
  title        = {Translation-based steganography},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {269--303},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0320},
  doi          = {10.3233/JCS-2009-0320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GrothoffGSAA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Guette09,
  author       = {Gilles Guette},
  title        = {Automating trusted key rollover in {DNSSEC}},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {839--854},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0343},
  doi          = {10.3233/JCS-2009-0343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Guette09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Guttman09,
  author       = {Joshua D. Guttman},
  title        = {Introduction},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {515},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0396},
  doi          = {10.3233/JCS-2009-0396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Guttman09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HarrisonH09,
  author       = {William L. Harrison and
                  James Hook},
  title        = {Achieving information flow security through monadic control of effects},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {599--653},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0356},
  doi          = {10.3233/JCS-2009-0356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HarrisonH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Herzberg09,
  author       = {Amir Herzberg},
  title        = {Folklore, practice and theory of robust combiners},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {159--189},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0336},
  doi          = {10.3233/JCS-2009-0336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Herzberg09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HofheinzMU09,
  author       = {Dennis Hofheinz and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominique Unruh},
  title        = {Polynomial runtime in simulatability definitions},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {703--735},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0354},
  doi          = {10.3233/JCS-2009-0354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HofheinzMU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HuTML09,
  author       = {Nan Hu and
                  Giri Kumar Tayi and
                  Chengyu Ma and
                  Yingjiu Li},
  title        = {Certificate revocation release policies},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {127--157},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0330},
  doi          = {10.3233/JCS-2009-0330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HuTML09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/JacobsH09,
  author       = {Bart Jacobs and
                  Ichiro Hasuo},
  title        = {Semantics and logic for security protocols},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {909--944},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0348},
  doi          = {10.3233/JCS-2009-0348},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/JacobsH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MatosB09,
  author       = {Ana Almeida Matos and
                  G{\'{e}}rard Boudol},
  title        = {On declassification and the non-disclosure policy},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {549--597},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0355},
  doi          = {10.3233/JCS-2009-0355},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MatosB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PetkovicJ09,
  author       = {Milan Petkovic and
                  Willem Jonker},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {1--3},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0326},
  doi          = {10.3233/JCS-2009-0326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PetkovicJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PredaG09,
  author       = {Mila Dalla Preda and
                  Roberto Giacobazzi},
  title        = {Semantics-based code obfuscation by abstract interpretation},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {855--908},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0345},
  doi          = {10.3233/JCS-2009-0345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PredaG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SabelfeldS09,
  author       = {Andrei Sabelfeld and
                  David Sands},
  title        = {Declassification: Dimensions and principles},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {517--548},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0352},
  doi          = {10.3233/JCS-2009-0352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SabelfeldS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VaidyaAGL09,
  author       = {Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Qi Guo and
                  Haibing Lu},
  title        = {Edge-RMP: Minimizing administrative assignments for role-based access
                  control},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {211--235},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0341},
  doi          = {10.3233/JCS-2009-0341},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VaidyaAGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VignaVBRKK09,
  author       = {Giovanni Vigna and
                  Fredrik Valeur and
                  Davide Balzarotti and
                  William K. Robertson and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {Reducing errors in the anomaly-based detection of web-based attacks
                  through the combined analysis of web requests and {SQL} queries},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {305--329},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0321},
  doi          = {10.3233/JCS-2009-0321},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VignaVBRKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/XuC09,
  author       = {Haizhi Xu and
                  Steve J. Chapin},
  title        = {Address-space layout randomization using code islands},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {331--362},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0322},
  doi          = {10.3233/JCS-2009-0322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/XuC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/YaoWWBJ09,
  author       = {Chao Yao and
                  Lingyu Wang and
                  Xiaoyang Sean Wang and
                  Claudio Bettini and
                  Sushil Jajodia},
  title        = {Evaluating privacy threats in released database views by symmetric
                  indistinguishability},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {5--42},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0317},
  doi          = {10.3233/JCS-2009-0317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/YaoWWBJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics