![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Computer Security, Volume 22
Volume 22, Number 1, 2014
- Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri
:
An optimization framework for role mining. 1-31 - Tsz Hon Yuen
, Willy Susilo
, Yi Mu:
Towards a cryptographic treatment of publish/subscribe systems. 33-67 - Jianwei Niu, Mark Reith, William H. Winsborough:
Formal verification of security properties in trust management policy. 69-153 - Sai Teja Peddinti, Nitesh Saxena:
Web search query privacy: Evaluating query obfuscation and anonymizing networks. 155-199
Volume 22, Number 2, 2014
- Konstantinos Chatzikokolakis, Sebastian Alexander Mödersheim
, Catuscia Palamidessi
, Jun Pang:
Foundational aspects of security. 201-202 - Joshua D. Guttman:
Establishing and preserving protocol security goals. 203-267 - Tri Minh Ngo, Mariëlle Stoelinga
, Marieke Huisman
:
Effective verification of confidentiality for multi-threaded programs. 269-300 - Michael Backes, Catalin Hritcu, Matteo Maffei:
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations. 301-353
Volume 22, Number 3, 2014
- Carlo Blundo
, Emiliano De Cristofaro, Paolo Gasti:
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity. 355-381 - Yannis Soupionis, Remous-Aris Koutsiamanis, Pavlos S. Efraimidis, Dimitris Gritzalis:
A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication. 383-413 - Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan:
Automated detection of parameter tampering opportunities and vulnerabilities in web applications. 415-465
Volume 22, Number 4, 2014
- Lieven Desmet
, Martin Johns
, Benjamin Livshits, Andrei Sabelfeld:
Preface. 467-468 - Willem De Groef, Dominique Devriese
, Nick Nikiforakis, Frank Piessens:
Secure multi-execution of web scripts: Theory and practice. 469-509 - Joe Gibbs Politz, Arjun Guha, Shriram Krishnamurthi
:
Typed-based verification of Web sandboxes. 511-565 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz
, Jörg Schwenk:
Scriptless attacks: Stealing more pie without touching the sill. 567-599 - Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis
:
Discovering concrete attacks on website authorization by formal analysis. 601-657
Volume 22, Number 5, 2014
- David A. Basin, Samuel J. Burri, Günter Karjoth:
Obstruction-free authorization enforcement: Aligning security and business objectives. 661-698 - Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker
, Benjamin G. Zorn:
Modular protections against non-control data attacks. 699-742 - Myrto Arapinis, Joshua Phillips, Eike Ritter, Mark Dermot Ryan
:
StatVerif: Verification of stateful processes. 743-821 - François Dupressoir
, Andrew D. Gordon, Jan Jürjens, David A. Naumann
:
Guiding a general-purpose C verifier to prove cryptographic protocols. 823-866
Volume 22, Number 6, 2014
- Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano:
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes. 867-912 - Johannes Braun, Florian Volk, Jiska Classen, Johannes Buchmann, Max Mühlhäuser
:
CA trust management for the Web PKI. 913-959 - Emre Uzun, Vijayalakshmi Atluri
, Jaideep Vaidya, Shamik Sural
, Anna Lisa Ferrara, Gennaro Parlato
, P. Madhusudan:
Security analysis for temporal role based access control. 961-996 - Yen-Chung Chen, Yu-Sung Wu, Wen-Guey Tzeng:
Preserving user query privacy in cloud-based security services. 997-1024 - Nicolas Buchmann, Harald Baier:
Towards a more secure and scalable verifying PKI of eMRTD. 1025-1049
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.