Search dblp for Publications

export results for "toc:db/journals/jcs/jcs20.bht:"

 download as .bib file

@article{DBLP:journals/jcs/AdaikkalavanXR12,
  author       = {Raman Adaikkalavan and
                  Xing Xie and
                  Indrakshi Ray},
  title        = {Multilevel secure data stream processing: Architecture and implementation},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {547--581},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0451},
  doi          = {10.3233/JCS-2012-0451},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AdaikkalavanXR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AhnJS12,
  author       = {Gail{-}Joon Ahn and
                  Jing Jin and
                  Mohamed Shehab},
  title        = {Policy-driven role-based access management for ad-hoc collaboration},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {2-3},
  pages        = {223--257},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0446},
  doi          = {10.3233/JCS-2012-0446},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AhnJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AlvimAP12,
  author       = {M{\'{a}}rio S. Alvim and
                  Miguel E. Andr{\'{e}}s and
                  Catuscia Palamidessi},
  title        = {Quantitative information flow in interactive systems},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {3--50},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2011-0433},
  doi          = {10.3233/JCS-2011-0433},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AlvimAP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArmandoL12,
  author       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {1},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2011-0438},
  doi          = {10.3233/JCS-2011-0438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ArmandoL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArmandoR12,
  author       = {Alessandro Armando and
                  Silvio Ranise},
  title        = {Scalable automated symbolic analysis of administrative role-based
                  access control policies by {SMT} solving},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {309--352},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0461},
  doi          = {10.3233/JCS-2012-0461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ArmandoR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BartheCLP12,
  author       = {Gilles Barthe and
                  Jorge Cu{\'{e}}llar and
                  Javier L{\'{o}}pez and
                  Alexander Pretschner},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {307--308},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0462},
  doi          = {10.3233/JCS-2012-0462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BartheCLP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Becker12,
  author       = {Moritz Y. Becker},
  title        = {Information flow in trust management systems},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {677--708},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0443},
  doi          = {10.3233/JCS-2012-0443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Becker12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BezziVFLSS12,
  author       = {Michele Bezzi and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Giovanni Livraga and
                  Pierangela Samarati and
                  Roberto Sassi},
  title        = {Modeling and preventing inferences from sensitive value distributions
                  in data release},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {393--436},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0457},
  doi          = {10.3233/JCS-2012-0457},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BezziVFLSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BielovaM12,
  author       = {Nataliia Bielova and
                  Fabio Massacci},
  title        = {Iterative enforcement by suppression: Towards practical enforcement
                  theories},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {51--79},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2011-0431},
  doi          = {10.3233/JCS-2011-0431},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BielovaM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Biskup12,
  author       = {Joachim Biskup},
  title        = {Dynamic policy adaptation for inference control of queries to a propositional
                  information system},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {509--546},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0450},
  doi          = {10.3233/JCS-2012-0450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Biskup12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BlantonA12,
  author       = {Marina Blanton and
                  Mehrdad Aliasgari},
  title        = {Secure outsourced computation of iris matching},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {2-3},
  pages        = {259--305},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0447},
  doi          = {10.3233/JCS-2012-0447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BlantonA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BowenKPKS12,
  author       = {Brian M. Bowen and
                  Vasileios P. Kemerlis and
                  Pratap V. Prabhu and
                  Angelos D. Keromytis and
                  Salvatore J. Stolfo},
  title        = {A system for generating and injecting indistinguishable network decoys},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {2-3},
  pages        = {199--221},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2011-0439},
  doi          = {10.3233/JCS-2011-0439},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/BowenKPKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Chong12,
  author       = {Stephen Chong},
  title        = {Required information release},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {637--676},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0442},
  doi          = {10.3233/JCS-2012-0442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Chong12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CirianiVFLS12,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Giovanni Livraga and
                  Pierangela Samarati},
  title        = {An {OBDD} approach to enforce confidentiality and visibility constraints
                  in data publishing},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {463--508},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0449},
  doi          = {10.3233/JCS-2012-0449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CirianiVFLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CostaDM12,
  author       = {Gabriele Costa and
                  Pierpaolo Degano and
                  Fabio Martinelli},
  title        = {Modular plans for secure service composition},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {81--117},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2011-0430},
  doi          = {10.3233/JCS-2011-0430},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CostaDM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GargP12,
  author       = {Deepak Garg and
                  Frank Pfenning},
  title        = {Stateful authorization logic - Proof theory and a case study},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {353--391},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0456},
  doi          = {10.3233/JCS-2012-0456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GargP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HongVL12,
  author       = {Yuan Hong and
                  Jaideep Vaidya and
                  Haibing Lu},
  title        = {Secure and efficient distributed linear programming},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {583--634},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0452},
  doi          = {10.3233/JCS-2012-0452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HongVL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KustersT012,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {A game-based definition of coercion resistance and its applications},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {709--764},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0444},
  doi          = {10.3233/JCS-2012-0444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KustersT012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Li12,
  author       = {Yingjiu Li},
  title        = {Guest Editor's Preface},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {461--462},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0448},
  doi          = {10.3233/JCS-2012-0448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Li12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MyersB12,
  author       = {Andrew C. Myers and
                  Michael Backes},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {635--636},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0445},
  doi          = {10.3233/JCS-2012-0445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MyersB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/StakhanovaSBW12,
  author       = {Natalia Stakhanova and
                  Chris Strasburg and
                  Samik Basu and
                  Johnny S. Wong},
  title        = {Towards cost-sensitive assessment of intrusion response selection},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {2-3},
  pages        = {169--198},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2011-0436},
  doi          = {10.3233/JCS-2011-0436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/StakhanovaSBW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SunZPAM12,
  author       = {Yanjie Sun and
                  Chenyi Zhang and
                  Jun Pang and
                  Baptiste Alcalde and
                  Sjouke Mauw},
  title        = {A trust-augmented voting scheme for collaborative privacy management},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {437--459},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0453},
  doi          = {10.3233/JCS-2012-0453},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SunZPAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhouF12,
  author       = {Hongbin Zhou and
                  Simon N. Foley},
  title        = {Fast automatic security protocol generation},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {2-3},
  pages        = {119--167},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2011-0432},
  doi          = {10.3233/JCS-2011-0432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhouF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics