


default search action
Journal of Computer Security, Volume 22
Volume 22, Number 1, 2014
- Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri

:
An optimization framework for role mining. 1-31 - Tsz Hon Yuen

, Willy Susilo
, Yi Mu:
Towards a cryptographic treatment of publish/subscribe systems. 33-67 - Jianwei Niu, Mark Reith, William H. Winsborough:

Formal verification of security properties in trust management policy. 69-153 - Sai Teja Peddinti, Nitesh Saxena:

Web search query privacy: Evaluating query obfuscation and anonymizing networks. 155-199
Volume 22, Number 2, 2014
- Konstantinos Chatzikokolakis, Sebastian Alexander Mödersheim

, Catuscia Palamidessi
, Jun Pang:
Foundational aspects of security. 201-202 - Joshua D. Guttman

:
Establishing and preserving protocol security goals. 203-267 - Tri Minh Ngo

, Mariëlle Stoelinga
, Marieke Huisman
:
Effective verification of confidentiality for multi-threaded programs. 269-300 - Michael Backes, Catalin Hritcu, Matteo Maffei:

Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations. 301-353
Volume 22, Number 3, 2014
- Carlo Blundo

, Emiliano De Cristofaro, Paolo Gasti:
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity. 355-381 - Yannis Soupionis, Remous-Aris Koutsiamanis, Pavlos S. Efraimidis, Dimitris Gritzalis:

A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication. 383-413 - Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan:

Automated detection of parameter tampering opportunities and vulnerabilities in web applications. 415-465
Volume 22, Number 4, 2014
- Lieven Desmet

, Martin Johns
, Benjamin Livshits, Andrei Sabelfeld:
Preface. 467-468 - Willem De Groef, Dominique Devriese

, Nick Nikiforakis, Frank Piessens:
Secure multi-execution of web scripts: Theory and practice. 469-509 - Joe Gibbs Politz, Arjun Guha, Shriram Krishnamurthi

:
Typed-based verification of Web sandboxes. 511-565 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz

, Jörg Schwenk:
Scriptless attacks: Stealing more pie without touching the sill. 567-599 - Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis

:
Discovering concrete attacks on website authorization by formal analysis. 601-657
Volume 22, Number 5, 2014
- David A. Basin, Samuel J. Burri, Günter Karjoth:

Obstruction-free authorization enforcement: Aligning security and business objectives. 661-698 - Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker

, Benjamin G. Zorn:
Modular protections against non-control data attacks. 699-742 - Myrto Arapinis, Joshua Phillips, Eike Ritter, Mark Dermot Ryan

:
StatVerif: Verification of stateful processes. 743-821 - François Dupressoir

, Andrew D. Gordon, Jan Jürjens, David A. Naumann
:
Guiding a general-purpose C verifier to prove cryptographic protocols. 823-866
Volume 22, Number 6, 2014
- Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano:

Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes. 867-912 - Johannes Braun, Florian Volk, Jiska Classen, Johannes Buchmann, Max Mühlhäuser

:
CA trust management for the Web PKI. 913-959 - Emre Uzun, Vijayalakshmi Atluri

, Jaideep Vaidya, Shamik Sural
, Anna Lisa Ferrara, Gennaro Parlato
, P. Madhusudan:
Security analysis for temporal role based access control. 961-996 - Yen-Chung Chen, Yu-Sung Wu, Wen-Guey Tzeng:

Preserving user query privacy in cloud-based security services. 997-1024 - Nicolas Buchmann, Harald Baier:

Towards a more secure and scalable verifying PKI of eMRTD. 1025-1049

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














