Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             102 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Abstractions for security protocol verification Nguyen, Binh Thanh
2018
4 p. 459-508
artikel
2 A comparative evaluation of two algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo
2005
4 p. 659-693
artikel
3 A compositional logic for proving security properties of protocols Nancy Durgin
2003
4 p. 677-721
artikel
4 A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement Alam, Md Morshed

4 p. 423-446
artikel
5 Aggregating vulnerability metrics in enterprise networks using attack graphs Homer, John
2013
4 p. 561-597
artikel
6 A logical reconstruction of SPKI Joseph Y. Halpern
2003
4 p. 581-613
artikel
7 A mutation-based approach for the formal and automated analysis of security ceremonies Sempreboni, Diego

4 p. 293-364
artikel
8 Analyzing leakage of personal information by malware Urban, Tobias
2019
4 p. 459-481
artikel
9 A new framework for privacy-preserving biometric-based remote user authentication Tian, Yangguang

4 p. 469-498
artikel
10 A privacy-aware access control system Ardagna, C.A.
2008
4 p. 369-397
artikel
11 A review on cloud security issues and solutions Chaudhari, Ashish R.

4 p. 365-391
artikel
12 Assurance for federated identity management Baldwin, Adrian
2010
4 p. 541-572
artikel
13 Assuring BetterTimes Hallgren, Per
2018
4 p. 557-587
artikel
14 A trust-augmented voting scheme for collaborative privacy management Sun, Yanjie
2012
4 p. 437-459
artikel
15 Auditable metering with lightweight security Matthew K. Franklin
2001
4 p. 237-255
artikel
16 A unifying approach to the security of distributed and multi-threaded programs Heiko Mantel
2003
4 p. 615-676
artikel
17 Authenticity by typing for security protocols Andrew D. Gordon
2003
4 p. 451-519
artikel
18 Author Index 2011
4 p. 353-354
artikel
19 Author Index Volume 11 (2003)
2003
4 p. 723-725
artikel
20 Author Index Volume 9 (2001) 2002
4 p. 339-340
artikel
21 Author Index Volume 10 (2002)
2002
4 p. 433-434
artikel
22 Author Index Volume 6 (1998) 2001
4 p. 287
artikel
23 Author Index Volume 3 2012
4 p. 325-326
artikel
24 Author Index Volume 4 (1996) 2011
4 p. 361-362
artikel
25 Author Index Volume 5 (1997) 2011
4 p. 383-384
artikel
26 Authorization enforcement in distributed query evaluation De Capitani di Vimercati, Sabrina
2011
4 p. 751-794
artikel
27 Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies Ranise, Silvio
2018
4 p. 423-458
artikel
28 Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols1 Cortier, Véronique

4 p. 573-598
artikel
29 Automatic verification of correspondences for security protocols Blanchet, Bruno
2009
4 p. 363-434
artikel
30 Certificate chain discovery in SPKI/SDSI Dwaine Clarke
2002
4 p. 285-322
artikel
31 Checking secure interactions of smart card applets: extended version P. Bieber
2002
4 p. 369-398
artikel
32 Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols Mödersheim, Sebastian
2010
4 p. 575-618
artikel
33 Context-aware security: Linguistic mechanisms and static analysis Bodei, Chiara
2016
4 p. 427-477
artikel
34 CookiExt: Patching the browser against session hijacking attacks Bugliesi, Michele
2015
4 p. 509-537
artikel
35 Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach Zou, Qingtian

4 p. 541-570
artikel
36 Delegated integrity check for hierarchical cloud data Shen, Shiuan-Tzuo
2015
4 p. 471-508
artikel
37 Depender graphs: A method of fault-tolerant certificate distribution Wright, Rebecca N.
2002
4 p. 323-338
artikel
38 Deploying ABAC policies using RBAC systems Batra, Gunjan
2019
4 p. 483-506
artikel
39 Discovering concrete attacks on website authorization by formal analysis Bansal, Chetan
2014
4 p. 601-657
artikel
40 Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation Mardziel, Piotr
2013
4 p. 463-532
artikel
41 Effective worm detection for various scan techniques Xia, Jianhong
2006
4 p. 359-387
artikel
42 Efficient security policy enforcement for the mobile environment Atluri, Vijayalakshmi
2008
4 p. 439-475
artikel
43 Enforcing workflow authorization constraints using triggers Fabio Casati
2001
4 p. 257-285
artikel
44 FakeFilter: A cross-distribution Deepfake detection system with domain adaptation Jiang, Jianguo

4 p. 403-421
artikel
45 GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks Zhu, Sencun
2006
4 p. 301-325
artikel
46 Global infrastructure protection system Sabrina De Capitani di Vimercati
2002
4 p. 251-283
artikel
47 Guest Editorial Damiani, Ernesto
2008
4 p. 367-368
artikel
48 Guest editor's preface
2002
4 p. 299-300
artikel
49 Guest editor's preface
2003
4 p. 449-450
artikel
50 Guest editor's preface 2001
4 p. 241-242
artikel
51 Guest editor's preface 2001
4 p. 255
artikel
52 Identity Federation for VoIP systems Saklikar, Samir
2010
4 p. 499-540
artikel
53 Implementing interactive analysis of attack graphs using relational databases Wang, Lingyu
2008
4 p. 419-437
artikel
54 In search of multiple domain key recovery Lars R. Knudsen
2001
4 p. 219-235
artikel
55 Intrusion confinement by isolation in information systems Peng Liu
2001
4 p. 243-279
artikel
56 Invalid certificates in modern browsers: A socio-technical analysis Giustolisi, Rosario
2018
4 p. 509-541
artikel
57 Language based policy analysis in a SPKI Trust Management System Eamani, Arun K.
2006
4 p. 327-357
artikel
58 Leak-free mediated group signatures Ding, Xuhua
2009
4 p. 489-514
artikel
59 Logical relations for encryption Sumii, Eijiro
2003
4 p. 521-554
artikel
60 Manageable access control for CORBA Gerald Brose
2002
4 p. 301-337
artikel
61 Mitigating the insider threat of remote administrators in clouds through maintenance task assignments Alhebaishi, Nawaf
2019
4 p. 427-458
artikel
62 Modeling and preventing inferences from sensitive value distributions in data release Bezzi, Michele
2012
4 p. 393-436
artikel
63 Modelling, specifying and implementing workflow security in Cyberspace Ehud Gudes
2001
4 p. 287-315
artikel
64 Notarized federated ID management and authentication Goodrich, Michael T.
2008
4 p. 399-418
artikel
65 On the feasibility of crawling-based attacks against recommender systems1 Aiolli, Fabio

4 p. 599-621
artikel
66 On the information leakage of differentially-private mechanisms Alvim, Mário S.
2015
4 p. 427-469
artikel
67 Parity-based inference control for multi-dimensional range sum queries Wang, Lingyu
2007
4 p. 417-445
artikel
68 Permissive runtime information flow control in the presence of exceptions Bichhawat, Abhishek

4 p. 361-401
artikel
69 PILOT: Password and PIN information leakage from obfuscated typing videos1 Balagani, Kiran
2019
4 p. 405-425
artikel
70 Practical and privacy-preserving information retrieval from a database table Di Crescenzo, Giovanni
2016
4 p. 479-506
artikel
71 Preface Goto, Atsuhiro
2010
4 p. 497
artikel
72 Preface Barthe, Gilles
2012
4 p. 307-308
artikel
73 Preface Desmet, Lieven
2014
4 p. 467-468
artikel
74 Preprocessing for controlled query evaluation with availability policy Biskup, Joachim
2008
4 p. 477-494
artikel
75 Risk management for distributed authorization Skalka, Christian
2007
4 p. 447-489
artikel
76 Role-based administration of user-role assignment: The URA97 model and its Oracle implementation Ravi Sandhu
2001
4 p. 317-342
artikel
77 Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving Armando, Alessandro
2012
4 p. 309-352
artikel
78 Scheduler vulnerabilities and coordinated attacks in cloud computing Zhou, Fangfei
2013
4 p. 533-559
artikel
79 Scriptless attacks: Stealing more pie without touching the sill Heiderich, M.
2014
4 p. 567-599
artikel
80 SecPAL: Design and semantics of a decentralized authorization language Becker, Moritz Y.
2010
4 p. 619-665
artikel
81 Secure multi-execution of web scripts: Theory and practice De Groef, Willem
2014
4 p. 469-509
artikel
82 Secure object deletion and garbage collection in multilevel object bases[1]A preliminary version of this paper appeared under the title “A principled approach to object deletion and garbage collection in multilevel secure object bases”, in: Proceedin Elisa Bertino
2001
4 p. 257-285
artikel
83 Secure set intersection cardinality with application to association rule mining Jaideep Vaidya
2005
4 p. 593-622
artikel
84 Securing LSB embedding against structural steganalysis Powell, Brian A.

4 p. 517-539
artikel
85 Selected Papers From ESORICS 2020
4 p. 571
artikel
86 Some attacks upon authenticated group key agreement protocols Olivier Pereira
2003
4 p. 555-580
artikel
87 Specifying and using intrusion masking models to process distributed operations Meng Yu
2005
4 p. 623-658
artikel
88 SQLiDDS: SQL injection detection using document similarity measure Kar, Debabrata
2016
4 p. 507-539
artikel
89 Stateful authorization logic – Proof theory and a case study Garg, Deepak
2012
4 p. 353-391
artikel
90 StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception Zhang, Jianfeng

4 p. 393-417
artikel
91 Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation Jonathan Millen
2005
4 p. 695
artikel
92 Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution Kar, Diptendu Mohan

4 p. 437-467
artikel
93 Temporal authorization bases: From specification to integration Elisa Bertino
2001
4 p. 309-353
artikel
94 The impact of application context on privacy and performance of keystroke authentication systems Balagani, Kiran S.
2018
4 p. 543-556
artikel
95 Towards adding verifiability to web-based Git repositories Afzali, Hammad

4 p. 405-436
artikel
96 Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication1 Paul, Sebastian

4 p. 623-653
artikel
97 TripleMon: A multi-layer security framework for mediating inter-process communication on Android Jing, Yiming
2016
4 p. 405-426
artikel
98 Typed-based verification of Web sandboxes Gibbs Politz, Joe
2014
4 p. 511-565
artikel
99 Using reflection as a mechanism for enforcing security policies on compiled code Ian Welch
2002
4 p. 399-432
artikel
100 Using sample size to limit exposure to data mining Chris Clifton
2001
4 p. 281-307
artikel
101 Verified formal security models for multiapplicative smart cards Gerhard Schellhorn
2002
4 p. 339-367
artikel
102 Verifying privacy-type properties of electronic voting protocols Delaune, Stéphanie
2009
4 p. 435-487
artikel
                             102 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland