Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jcs/jcs20.bht:"
@article{DBLP:journals/jcs/AdaikkalavanXR12, author = {Raman Adaikkalavan and Xing Xie and Indrakshi Ray}, title = {Multilevel secure data stream processing: Architecture and implementation}, journal = {J. Comput. Secur.}, volume = {20}, number = {5}, pages = {547--581}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0451}, doi = {10.3233/JCS-2012-0451}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AdaikkalavanXR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AhnJS12, author = {Gail{-}Joon Ahn and Jing Jin and Mohamed Shehab}, title = {Policy-driven role-based access management for ad-hoc collaboration}, journal = {J. Comput. Secur.}, volume = {20}, number = {2-3}, pages = {223--257}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0446}, doi = {10.3233/JCS-2012-0446}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AhnJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AlvimAP12, author = {M{\'{a}}rio S. Alvim and Miguel E. Andr{\'{e}}s and Catuscia Palamidessi}, title = {Quantitative information flow in interactive systems}, journal = {J. Comput. Secur.}, volume = {20}, number = {1}, pages = {3--50}, year = {2012}, url = {https://doi.org/10.3233/JCS-2011-0433}, doi = {10.3233/JCS-2011-0433}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AlvimAP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ArmandoL12, author = {Alessandro Armando and Gavin Lowe}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {20}, number = {1}, pages = {1}, year = {2012}, url = {https://doi.org/10.3233/JCS-2011-0438}, doi = {10.3233/JCS-2011-0438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ArmandoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ArmandoR12, author = {Alessandro Armando and Silvio Ranise}, title = {Scalable automated symbolic analysis of administrative role-based access control policies by {SMT} solving}, journal = {J. Comput. Secur.}, volume = {20}, number = {4}, pages = {309--352}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0461}, doi = {10.3233/JCS-2012-0461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ArmandoR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BartheCLP12, author = {Gilles Barthe and Jorge Cu{\'{e}}llar and Javier L{\'{o}}pez and Alexander Pretschner}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {20}, number = {4}, pages = {307--308}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0462}, doi = {10.3233/JCS-2012-0462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BartheCLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Becker12, author = {Moritz Y. Becker}, title = {Information flow in trust management systems}, journal = {J. Comput. Secur.}, volume = {20}, number = {6}, pages = {677--708}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0443}, doi = {10.3233/JCS-2012-0443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Becker12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BezziVFLSS12, author = {Michele Bezzi and Sabrina De Capitani di Vimercati and Sara Foresti and Giovanni Livraga and Pierangela Samarati and Roberto Sassi}, title = {Modeling and preventing inferences from sensitive value distributions in data release}, journal = {J. Comput. Secur.}, volume = {20}, number = {4}, pages = {393--436}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0457}, doi = {10.3233/JCS-2012-0457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BezziVFLSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BielovaM12, author = {Nataliia Bielova and Fabio Massacci}, title = {Iterative enforcement by suppression: Towards practical enforcement theories}, journal = {J. Comput. Secur.}, volume = {20}, number = {1}, pages = {51--79}, year = {2012}, url = {https://doi.org/10.3233/JCS-2011-0431}, doi = {10.3233/JCS-2011-0431}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BielovaM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Biskup12, author = {Joachim Biskup}, title = {Dynamic policy adaptation for inference control of queries to a propositional information system}, journal = {J. Comput. Secur.}, volume = {20}, number = {5}, pages = {509--546}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0450}, doi = {10.3233/JCS-2012-0450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Biskup12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BlantonA12, author = {Marina Blanton and Mehrdad Aliasgari}, title = {Secure outsourced computation of iris matching}, journal = {J. Comput. Secur.}, volume = {20}, number = {2-3}, pages = {259--305}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0447}, doi = {10.3233/JCS-2012-0447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BlantonA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BowenKPKS12, author = {Brian M. Bowen and Vasileios P. Kemerlis and Pratap V. Prabhu and Angelos D. Keromytis and Salvatore J. Stolfo}, title = {A system for generating and injecting indistinguishable network decoys}, journal = {J. Comput. Secur.}, volume = {20}, number = {2-3}, pages = {199--221}, year = {2012}, url = {https://doi.org/10.3233/JCS-2011-0439}, doi = {10.3233/JCS-2011-0439}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/BowenKPKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Chong12, author = {Stephen Chong}, title = {Required information release}, journal = {J. Comput. Secur.}, volume = {20}, number = {6}, pages = {637--676}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0442}, doi = {10.3233/JCS-2012-0442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Chong12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CirianiVFLS12, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Giovanni Livraga and Pierangela Samarati}, title = {An {OBDD} approach to enforce confidentiality and visibility constraints in data publishing}, journal = {J. Comput. Secur.}, volume = {20}, number = {5}, pages = {463--508}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0449}, doi = {10.3233/JCS-2012-0449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CirianiVFLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CostaDM12, author = {Gabriele Costa and Pierpaolo Degano and Fabio Martinelli}, title = {Modular plans for secure service composition}, journal = {J. Comput. Secur.}, volume = {20}, number = {1}, pages = {81--117}, year = {2012}, url = {https://doi.org/10.3233/JCS-2011-0430}, doi = {10.3233/JCS-2011-0430}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CostaDM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GargP12, author = {Deepak Garg and Frank Pfenning}, title = {Stateful authorization logic - Proof theory and a case study}, journal = {J. Comput. Secur.}, volume = {20}, number = {4}, pages = {353--391}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0456}, doi = {10.3233/JCS-2012-0456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GargP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HongVL12, author = {Yuan Hong and Jaideep Vaidya and Haibing Lu}, title = {Secure and efficient distributed linear programming}, journal = {J. Comput. Secur.}, volume = {20}, number = {5}, pages = {583--634}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0452}, doi = {10.3233/JCS-2012-0452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HongVL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KustersT012, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {A game-based definition of coercion resistance and its applications}, journal = {J. Comput. Secur.}, volume = {20}, number = {6}, pages = {709--764}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0444}, doi = {10.3233/JCS-2012-0444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KustersT012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Li12, author = {Yingjiu Li}, title = {Guest Editor's Preface}, journal = {J. Comput. Secur.}, volume = {20}, number = {5}, pages = {461--462}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0448}, doi = {10.3233/JCS-2012-0448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Li12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MyersB12, author = {Andrew C. Myers and Michael Backes}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {20}, number = {6}, pages = {635--636}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0445}, doi = {10.3233/JCS-2012-0445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MyersB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/StakhanovaSBW12, author = {Natalia Stakhanova and Chris Strasburg and Samik Basu and Johnny S. Wong}, title = {Towards cost-sensitive assessment of intrusion response selection}, journal = {J. Comput. Secur.}, volume = {20}, number = {2-3}, pages = {169--198}, year = {2012}, url = {https://doi.org/10.3233/JCS-2011-0436}, doi = {10.3233/JCS-2011-0436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/StakhanovaSBW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SunZPAM12, author = {Yanjie Sun and Chenyi Zhang and Jun Pang and Baptiste Alcalde and Sjouke Mauw}, title = {A trust-augmented voting scheme for collaborative privacy management}, journal = {J. Comput. Secur.}, volume = {20}, number = {4}, pages = {437--459}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0453}, doi = {10.3233/JCS-2012-0453}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SunZPAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZhouF12, author = {Hongbin Zhou and Simon N. Foley}, title = {Fast automatic security protocol generation}, journal = {J. Comput. Secur.}, volume = {20}, number = {2-3}, pages = {119--167}, year = {2012}, url = {https://doi.org/10.3233/JCS-2011-0432}, doi = {10.3233/JCS-2011-0432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZhouF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.