Search dblp for Publications

export results for "toc:db/journals/jcs/jcs22.bht:"

 download as .bib file

@article{DBLP:journals/jcs/0001VCBM14,
  author       = {Johannes Braun and
                  Florian Volk and
                  Jiska Classen and
                  Johannes Buchmann and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {{CA} trust management for the Web {PKI}},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {6},
  pages        = {913--959},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140509},
  doi          = {10.3233/JCS-140509},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/0001VCBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Akinyele0HP14,
  author       = {Joseph A. Akinyele and
                  Matthew Green and
                  Susan Hohenberger and
                  Matthew W. Pagano},
  title        = {Machine-generated algorithms, proofs and software for the batch verification
                  of digital signature schemes},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {6},
  pages        = {867--912},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140507},
  doi          = {10.3233/JCS-140507},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Akinyele0HP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArapinisPRR14,
  author       = {Myrto Arapinis and
                  Joshua Phillips and
                  Eike Ritter and
                  Mark Dermot Ryan},
  title        = {StatVerif: Verification of stateful processes},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {743--821},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140501},
  doi          = {10.3233/JCS-140501},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ArapinisPRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BackesHM14,
  author       = {Michael Backes and
                  Catalin Hritcu and
                  Matteo Maffei},
  title        = {Union, intersection and refinement types and reasoning about type
                  disjointness for secure protocol implementations},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {301--353},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130493},
  doi          = {10.3233/JCS-130493},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BackesHM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BansalBDM14,
  author       = {Chetan Bansal and
                  Karthikeyan Bhargavan and
                  Antoine Delignat{-}Lavaud and
                  Sergio Maffeis},
  title        = {Discovering concrete attacks on website authorization by formal analysis},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {601--657},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140503},
  doi          = {10.3233/JCS-140503},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BansalBDM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BasinBK14,
  author       = {David A. Basin and
                  Samuel J. Burri and
                  G{\"{u}}nter Karjoth},
  title        = {Obstruction-free authorization enforcement: Aligning security and
                  business objectives},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {661--698},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140500},
  doi          = {10.3233/JCS-140500},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BasinBK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BishtHSV14,
  author       = {Prithvi Bisht and
                  Timothy L. Hinrichs and
                  Nazari Skrupsky and
                  V. N. Venkatakrishnan},
  title        = {Automated detection of parameter tampering opportunities and vulnerabilities
                  in web applications},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {415--465},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140498},
  doi          = {10.3233/JCS-140498},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BishtHSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BlundoCG14,
  author       = {Carlo Blundo and
                  Emiliano De Cristofaro and
                  Paolo Gasti},
  title        = {EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {355--381},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130482},
  doi          = {10.3233/JCS-130482},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BlundoCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BuchmannB14,
  author       = {Nicolas Buchmann and
                  Harald Baier},
  title        = {Towards a more secure and scalable verifying {PKI} of eMRTD},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {6},
  pages        = {1025--1049},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140522},
  doi          = {10.3233/JCS-140522},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BuchmannB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChenWT14,
  author       = {Yen{-}Chung Chen and
                  Yu{-}Sung Wu and
                  Wen{-}Guey Tzeng},
  title        = {Preserving user query privacy in cloud-based security services},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {6},
  pages        = {997--1024},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140520},
  doi          = {10.3233/JCS-140520},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ChenWT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DesmetJLS14,
  author       = {Lieven Desmet and
                  Martin Johns and
                  Benjamin Livshits and
                  Andrei Sabelfeld},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {467--468},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140506},
  doi          = {10.3233/JCS-140506},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DesmetJLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DupressoirGJN14,
  author       = {Fran{\c{c}}ois Dupressoir and
                  Andrew D. Gordon and
                  Jan J{\"{u}}rjens and
                  David A. Naumann},
  title        = {Guiding a general-purpose {C} verifier to prove cryptographic protocols},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {823--866},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140508},
  doi          = {10.3233/JCS-140508},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DupressoirGJN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GroefDNP14,
  author       = {Willem De Groef and
                  Dominique Devriese and
                  Nick Nikiforakis and
                  Frank Piessens},
  title        = {Secure multi-execution of web scripts: Theory and practice},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {469--509},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130495},
  doi          = {10.3233/JCS-130495},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GroefDNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Guttman14,
  author       = {Joshua D. Guttman},
  title        = {Establishing and preserving protocol security goals},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {203--267},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140499},
  doi          = {10.3233/JCS-140499},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Guttman14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HeiderichNSHS14,
  author       = {Mario Heiderich and
                  Marcus Niemietz and
                  Felix Schuster and
                  Thorsten Holz and
                  J{\"{o}}rg Schwenk},
  title        = {Scriptless attacks: Stealing more pie without touching the sill},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {567--599},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130494},
  doi          = {10.3233/JCS-130494},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HeiderichNSHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LuVA14,
  author       = {Haibing Lu and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {An optimization framework for role mining},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {1--31},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130484},
  doi          = {10.3233/JCS-130484},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LuVA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/NgoSH14,
  author       = {Tri Minh Ngo and
                  Mari{\"{e}}lle Stoelinga and
                  Marieke Huisman},
  title        = {Effective verification of confidentiality for multi-threaded programs},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {269--300},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130492},
  doi          = {10.3233/JCS-130492},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/NgoSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/NiuRW14,
  author       = {Jianwei Niu and
                  Mark Reith and
                  William H. Winsborough},
  title        = {Formal verification of security properties in trust management policy},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {69--153},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130490},
  doi          = {10.3233/JCS-130490},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/NiuRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PeddintiS14,
  author       = {Sai Teja Peddinti and
                  Nitesh Saxena},
  title        = {Web search query privacy: Evaluating query obfuscation and anonymizing
                  networks},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {155--199},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130491},
  doi          = {10.3233/JCS-130491},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PeddintiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PolitzGK14,
  author       = {Joe Gibbs Politz and
                  Arjun Guha and
                  Shriram Krishnamurthi},
  title        = {Typed-based verification of Web sandboxes},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {511--565},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140504},
  doi          = {10.3233/JCS-140504},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PolitzGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SchlesingerPSWZ14,
  author       = {Cole Schlesinger and
                  Karthik Pattabiraman and
                  Nikhil Swamy and
                  David Walker and
                  Benjamin G. Zorn},
  title        = {Modular protections against non-control data attacks},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {699--742},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140502},
  doi          = {10.3233/JCS-140502},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SchlesingerPSWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SoupionisKEG14,
  author       = {Yannis Soupionis and
                  Remous{-}Aris Koutsiamanis and
                  Pavlos S. Efraimidis and
                  Dimitris Gritzalis},
  title        = {A game-theoretic analysis of preventing spam over Internet Telephony
                  via audio CAPTCHA-based authentication},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {383--413},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140496},
  doi          = {10.3233/JCS-140496},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SoupionisKEG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/UzunAVSFPM14,
  author       = {Emre Uzun and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Shamik Sural and
                  Anna Lisa Ferrara and
                  Gennaro Parlato and
                  P. Madhusudan},
  title        = {Security analysis for temporal role based access control},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {6},
  pages        = {961--996},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140510},
  doi          = {10.3233/JCS-140510},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/UzunAVSFPM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/X14,
  title        = {Foundational aspects of security},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {201--202},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140497},
  doi          = {10.3233/JCS-140497},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/X14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/YuenSM14,
  author       = {Tsz Hon Yuen and
                  Willy Susilo and
                  Yi Mu},
  title        = {Towards a cryptographic treatment of publish/subscribe systems},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {33--67},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130486},
  doi          = {10.3233/JCS-130486},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/YuenSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics