![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Computer Security, Volume 16
Volume 16, Number 1, 2008
- Nan Zhang, Mark Ryan
, Dimitar P. Guelev:
Synthesising verified access control systems through model checking. 1-61 - Karl Krukow, Mogens Nielsen, Vladimiro Sassone:
A logical framework for history-based access control and reputation systems. 63-101
Volume 16, Number 2, 2008
- George O. M. Yee, Ali A. Ghorbani, Patrick C. K. Hung:
Guest Editors' Introduction. 103-106 - Jie Zhou, Jim Alves-Foss:
Security policy refinement and enforcement for the design of multi-level secure systems. 107-131 - Marco Casassa Mont
, Robert Thyne:
Privacy policy enforcement in enterprises with identity management solutions. 133-163 - Harshit Nayyar, Ali A. Ghorbani:
Approximate autoregressive modeling for network attack detection. 165-197 - Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth, Luc Van Gool, Andreas Steffen:
Privacy in video surveilled spaces. 199-222 - Muhammad Alam, Michael Hafner, Ruth Breu:
Constraint based role based access control in the SECTET-frameworkA model-driven approach. 223-260
Volume 16, Number 3, 2008
- George O. M. Yee, Chunming Rong
, Laurence Tianruo Yang:
Guest Editors' Introduction. 261-264 - Adam J. Elbirt:
Accelerated AES implementations via generalized instruction set extensions. 265-288 - Anne V. D. M. Kayem
, Selim G. Akl, Patrick Martin:
On replacing cryptographic keys in hierarchical key management systems. 289-309 - Lifu Wang, Partha Dasgupta:
Coprocessor-based hierarchical trust management for software integrity and digital identity protection. 311-339 - Janne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong
:
Protection against unauthorized access and computer crime in Norwegian enterprises. 341-366
Volume 16, Number 4, 2008
- Ernesto Damiani
:
Guest Editorial. 367-368 - Claudio A. Ardagna
, Marco Cremonini
, Sabrina De Capitani di Vimercati
, Pierangela Samarati
:
A privacy-aware access control system. 369-397 - Michael T. Goodrich, Roberto Tamassia, Danfeng (Daphne) Yao
:
Notarized federated ID management and authentication. 399-418 - Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:
Implementing interactive analysis of attack graphs using relational databases. 419-437 - Vijayalakshmi Atluri
, Heechang Shin, Jaideep Vaidya:
Efficient security policy enforcement for the mobile environment. 439-475 - Joachim Biskup, Lena Wiese
:
Preprocessing for controlled query evaluation with availability policy. 477-494
Volume 16, Number 5, 2008
- Andrei Sabelfeld:
Preface. 495 - Michael Backes, Birgit Pfitzmann, Andre Scedrov
:
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. 497-530 - Konstantinos Chatzikokolakis, Catuscia Palamidessi
, Prakash Panangaden:
On the Bayes risk in information-hiding protocols. 531-571 - Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer:
A secure compiler for session abstractions. 573-636 - Paritosh Shroff, Scott F. Smith, Mark Thober:
Securing information flow via dynamic capture of dependencies. 637-688
Volume 16, Number 6, 2008
- Ferucio Laurentiu Tiplea, Catalin V. Bîrjoveanu, Constantin Enea, Ioana Boureanu:
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete. 689-712 - Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta:
Exploiting open functionality in SMS-capable cellular networks. 713-742 - Toby C. Murray, Duncan A. Grove:
Non-delegatable authorities in capability systems. 743-759 - Petros Belsis
, Kostas Fragos, Stefanos Gritzalis
, Christos Skourlas:
Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification. 761-790
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.