Volume 16,
Number 1,
2008
Volume 16,
Number 2,
2008
- George O. M. Yee, Ali A. Ghorbani, Patrick C. K. Hung:
Guest Editors' Introduction.
103-106
- Jie Zhou, Jim Alves-Foss:
Security policy refinement and enforcement for the design of multi-level secure systems.
107-131
- Marco Casassa Mont, Robert Thyne:
Privacy policy enforcement in enterprises with identity management solutions.
133-163
- Harshit Nayyar, Ali A. Ghorbani:
Approximate autoregressive modeling for network attack detection.
165-197
- Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth, Luc J. Van Gool, Andreas Steffen:
Privacy in video surveilled spaces.
199-222
- Muhammad Alam, Michael Hafner, Ruth Breu:
Constraint based role based access control in the SECTET-frameworkA model-driven approach.
223-260
Volume 16,
Number 3,
2008
Volume 16,
Number 4,
2008
- Ernesto Damiani:
Guest Editorial.
367-368
- Claudio Agostino Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati:
A privacy-aware access control system.
369-397
- Michael T. Goodrich, Roberto Tamassia, Danfeng (Daphne) Yao:
Notarized federated ID management and authentication.
399-418
- Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:
Implementing interactive analysis of attack graphs using relational databases.
419-437
- Vijayalakshmi Atluri, Heechang Shin, Jaideep Vaidya:
Efficient security policy enforcement for the mobile environment.
439-475
- Joachim Biskup, Lena Wiese:
Preprocessing for controlled query evaluation with availability policy.
477-494
Volume 16,
Number 5,
2008
20th IEEE Computer Security Foundations Symposium (CSF)
- Andrei Sabelfeld:
Preface.
495
- Michael Backes, Birgit Pfitzmann, Andre Scedrov:
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles.
497-530
- Konstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden:
On the Bayes risk in information-hiding protocols.
531-571
- Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer:
A secure compiler for session abstractions.
573-636
- Paritosh Shroff, Scott F. Smith, Mark Thober:
Securing information flow via dynamic capture of dependencies.
637-688
Volume 16,
Number 6,
2008
- Ferucio Laurentiu Tiplea, Catalin V. Birjoveanu, Constantin Enea, Ioana Boureanu:
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete.
689-712
- Patrick Traynor, William Enck, Patrick McDaniel, Thomas F. La Porta:
Exploiting open functionality in SMS-capable cellular networks.
713-742
- Toby C. Murray, Duncan A. Grove:
Non-delegatable authorities in capability systems.
743-759
- Petros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas:
Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification.
761-790
Copyright © Fri Mar 12 17:29:53 2010
by Michael Ley (ley@uni-trier.de)