Volume 17,
Number 1,
2009
Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
- Milan Petkovic, Willem Jonker:
Preface.
1-3
- Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini, Sushil Jajodia:
Evaluating privacy threats in released database views by symmetric indistinguishability.
5-42
- Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn:
Privacy-preserving incremental data dissemination.
43-68
- Stefan Böttcher, Rita Hartel:
Information disclosure by answers to XPath queries.
69-99
- Weiwei Cheng, Kian-Lee Tan:
Query assurance verification for outsourced multi-dimensional databases.
101-126
Volume 17,
Number 2,
2009
- Nan Hu, Giri Kumar Tayi, Chengyu Ma, Yingjiu Li:
Certificate revocation release policies.
127-157
- Amir Herzberg:
Folklore, practice and theory of robust combiners.
159-189
- Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:
Configuring storage-area networks using mandatory security.
191-210
- Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu:
Edge-RMP: Minimizing administrative assignments for role-based access control.
211-235
Volume 17,
Number 3,
2009
Best papers of the Security Track at the 2006 ACM Symposium on Applied Computing
- Giampaolo Bella, Peter Y. A. Ryan:
Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing.
237
- Petros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas:
Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification.
239-268
- Christian Grothoff, Krista Grothoff, Ryan Stutsman, Ludmila Alkhutova, Mikhail J. Atallah:
Translation-based steganography.
269-303
- Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda:
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries.
305-329
- Haizhi Xu, Steve J. Chapin:
Address-space layout randomization using code islands.
331-362
Volume 17,
Number 4,
2009
Copyright © Fri Mar 12 17:29:53 2010
by Michael Ley (ley@uni-trier.de)