nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstractions for security protocol verification
|
Nguyen, Binh Thanh |
|
2018 |
|
4 |
p. 459-508 |
artikel |
2 |
A comparative evaluation of two algorithms for Windows Registry Anomaly Detection
|
Salvatore J. Stolfo |
|
2005 |
|
4 |
p. 659-693 |
artikel |
3 |
A compositional logic for proving security properties of protocols
|
Nancy Durgin |
|
2003 |
|
4 |
p. 677-721 |
artikel |
4 |
A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement
|
Alam, Md Morshed |
|
|
|
4 |
p. 423-446 |
artikel |
5 |
Aggregating vulnerability metrics in enterprise networks using attack graphs
|
Homer, John |
|
2013 |
|
4 |
p. 561-597 |
artikel |
6 |
A logical reconstruction of SPKI
|
Joseph Y. Halpern |
|
2003 |
|
4 |
p. 581-613 |
artikel |
7 |
A mutation-based approach for the formal and automated analysis of security ceremonies
|
Sempreboni, Diego |
|
|
|
4 |
p. 293-364 |
artikel |
8 |
Analyzing leakage of personal information by malware
|
Urban, Tobias |
|
2019 |
|
4 |
p. 459-481 |
artikel |
9 |
A new framework for privacy-preserving biometric-based remote user authentication
|
Tian, Yangguang |
|
|
|
4 |
p. 469-498 |
artikel |
10 |
A privacy-aware access control system
|
Ardagna, C.A. |
|
2008 |
|
4 |
p. 369-397 |
artikel |
11 |
A review on cloud security issues and solutions
|
Chaudhari, Ashish R. |
|
|
|
4 |
p. 365-391 |
artikel |
12 |
Assurance for federated identity management
|
Baldwin, Adrian |
|
2010 |
|
4 |
p. 541-572 |
artikel |
13 |
Assuring BetterTimes
|
Hallgren, Per |
|
2018 |
|
4 |
p. 557-587 |
artikel |
14 |
A trust-augmented voting scheme for collaborative privacy management
|
Sun, Yanjie |
|
2012 |
|
4 |
p. 437-459 |
artikel |
15 |
Auditable metering with lightweight security
|
Matthew K. Franklin |
|
2001 |
|
4 |
p. 237-255 |
artikel |
16 |
A unifying approach to the security of distributed and multi-threaded programs
|
Heiko Mantel |
|
2003 |
|
4 |
p. 615-676 |
artikel |
17 |
Authenticity by typing for security protocols
|
Andrew D. Gordon |
|
2003 |
|
4 |
p. 451-519 |
artikel |
18 |
Author Index
|
|
|
2011 |
|
4 |
p. 353-354 |
artikel |
19 |
Author Index Volume 11 (2003)
|
|
|
2003 |
|
4 |
p. 723-725 |
artikel |
20 |
Author Index Volume 9 (2001)
|
|
|
2002 |
|
4 |
p. 339-340 |
artikel |
21 |
Author Index Volume 10 (2002)
|
|
|
2002 |
|
4 |
p. 433-434 |
artikel |
22 |
Author Index Volume 6 (1998)
|
|
|
2001 |
|
4 |
p. 287 |
artikel |
23 |
Author Index Volume 3
|
|
|
2012 |
|
4 |
p. 325-326 |
artikel |
24 |
Author Index Volume 4 (1996)
|
|
|
2011 |
|
4 |
p. 361-362 |
artikel |
25 |
Author Index Volume 5 (1997)
|
|
|
2011 |
|
4 |
p. 383-384 |
artikel |
26 |
Authorization enforcement in distributed query evaluation
|
De Capitani di Vimercati, Sabrina |
|
2011 |
|
4 |
p. 751-794 |
artikel |
27 |
Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies
|
Ranise, Silvio |
|
2018 |
|
4 |
p. 423-458 |
artikel |
28 |
Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols1
|
Cortier, Véronique |
|
|
|
4 |
p. 573-598 |
artikel |
29 |
Automatic verification of correspondences for security protocols
|
Blanchet, Bruno |
|
2009 |
|
4 |
p. 363-434 |
artikel |
30 |
Certificate chain discovery in SPKI/SDSI
|
Dwaine Clarke |
|
2002 |
|
4 |
p. 285-322 |
artikel |
31 |
Checking secure interactions of smart card applets: extended version
|
P. Bieber |
|
2002 |
|
4 |
p. 369-398 |
artikel |
32 |
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
|
Mödersheim, Sebastian |
|
2010 |
|
4 |
p. 575-618 |
artikel |
33 |
Context-aware security: Linguistic mechanisms and static analysis
|
Bodei, Chiara |
|
2016 |
|
4 |
p. 427-477 |
artikel |
34 |
CookiExt: Patching the browser against session hijacking attacks
|
Bugliesi, Michele |
|
2015 |
|
4 |
p. 509-537 |
artikel |
35 |
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach
|
Zou, Qingtian |
|
|
|
4 |
p. 541-570 |
artikel |
36 |
Delegated integrity check for hierarchical cloud data
|
Shen, Shiuan-Tzuo |
|
2015 |
|
4 |
p. 471-508 |
artikel |
37 |
Depender graphs: A method of fault-tolerant certificate distribution
|
Wright, Rebecca N. |
|
2002 |
|
4 |
p. 323-338 |
artikel |
38 |
Deploying ABAC policies using RBAC systems
|
Batra, Gunjan |
|
2019 |
|
4 |
p. 483-506 |
artikel |
39 |
Discovering concrete attacks on website authorization by formal analysis
|
Bansal, Chetan |
|
2014 |
|
4 |
p. 601-657 |
artikel |
40 |
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation
|
Mardziel, Piotr |
|
2013 |
|
4 |
p. 463-532 |
artikel |
41 |
Effective worm detection for various scan techniques
|
Xia, Jianhong |
|
2006 |
|
4 |
p. 359-387 |
artikel |
42 |
Efficient security policy enforcement for the mobile environment
|
Atluri, Vijayalakshmi |
|
2008 |
|
4 |
p. 439-475 |
artikel |
43 |
Enforcing workflow authorization constraints using triggers
|
Fabio Casati |
|
2001 |
|
4 |
p. 257-285 |
artikel |
44 |
FakeFilter: A cross-distribution Deepfake detection system with domain adaptation
|
Jiang, Jianguo |
|
|
|
4 |
p. 403-421 |
artikel |
45 |
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
|
Zhu, Sencun |
|
2006 |
|
4 |
p. 301-325 |
artikel |
46 |
Global infrastructure protection system
|
Sabrina De Capitani di Vimercati |
|
2002 |
|
4 |
p. 251-283 |
artikel |
47 |
Guest Editorial
|
Damiani, Ernesto |
|
2008 |
|
4 |
p. 367-368 |
artikel |
48 |
Guest editor's preface
|
|
|
2002 |
|
4 |
p. 299-300 |
artikel |
49 |
Guest editor's preface
|
|
|
2003 |
|
4 |
p. 449-450 |
artikel |
50 |
Guest editor's preface
|
|
|
2001 |
|
4 |
p. 241-242 |
artikel |
51 |
Guest editor's preface
|
|
|
2001 |
|
4 |
p. 255 |
artikel |
52 |
Identity Federation for VoIP systems
|
Saklikar, Samir |
|
2010 |
|
4 |
p. 499-540 |
artikel |
53 |
Implementing interactive analysis of attack graphs using relational databases
|
Wang, Lingyu |
|
2008 |
|
4 |
p. 419-437 |
artikel |
54 |
In search of multiple domain key recovery
|
Lars R. Knudsen |
|
2001 |
|
4 |
p. 219-235 |
artikel |
55 |
Intrusion confinement by isolation in information systems
|
Peng Liu |
|
2001 |
|
4 |
p. 243-279 |
artikel |
56 |
Invalid certificates in modern browsers: A socio-technical analysis
|
Giustolisi, Rosario |
|
2018 |
|
4 |
p. 509-541 |
artikel |
57 |
Language based policy analysis in a SPKI Trust Management System
|
Eamani, Arun K. |
|
2006 |
|
4 |
p. 327-357 |
artikel |
58 |
Leak-free mediated group signatures
|
Ding, Xuhua |
|
2009 |
|
4 |
p. 489-514 |
artikel |
59 |
Logical relations for encryption
|
Sumii, Eijiro |
|
2003 |
|
4 |
p. 521-554 |
artikel |
60 |
Manageable access control for CORBA
|
Gerald Brose |
|
2002 |
|
4 |
p. 301-337 |
artikel |
61 |
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments
|
Alhebaishi, Nawaf |
|
2019 |
|
4 |
p. 427-458 |
artikel |
62 |
Modeling and preventing inferences from sensitive value distributions in data release
|
Bezzi, Michele |
|
2012 |
|
4 |
p. 393-436 |
artikel |
63 |
Modelling, specifying and implementing workflow security in Cyberspace
|
Ehud Gudes |
|
2001 |
|
4 |
p. 287-315 |
artikel |
64 |
Notarized federated ID management and authentication
|
Goodrich, Michael T. |
|
2008 |
|
4 |
p. 399-418 |
artikel |
65 |
On the feasibility of crawling-based attacks against recommender systems1
|
Aiolli, Fabio |
|
|
|
4 |
p. 599-621 |
artikel |
66 |
On the information leakage of differentially-private mechanisms
|
Alvim, Mário S. |
|
2015 |
|
4 |
p. 427-469 |
artikel |
67 |
Parity-based inference control for multi-dimensional range sum queries
|
Wang, Lingyu |
|
2007 |
|
4 |
p. 417-445 |
artikel |
68 |
Permissive runtime information flow control in the presence of exceptions
|
Bichhawat, Abhishek |
|
|
|
4 |
p. 361-401 |
artikel |
69 |
PILOT: Password and PIN information leakage from obfuscated typing videos1
|
Balagani, Kiran |
|
2019 |
|
4 |
p. 405-425 |
artikel |
70 |
Practical and privacy-preserving information retrieval from a database table
|
Di Crescenzo, Giovanni |
|
2016 |
|
4 |
p. 479-506 |
artikel |
71 |
Preface
|
Goto, Atsuhiro |
|
2010 |
|
4 |
p. 497 |
artikel |
72 |
Preface
|
Barthe, Gilles |
|
2012 |
|
4 |
p. 307-308 |
artikel |
73 |
Preface
|
Desmet, Lieven |
|
2014 |
|
4 |
p. 467-468 |
artikel |
74 |
Preprocessing for controlled query evaluation with availability policy
|
Biskup, Joachim |
|
2008 |
|
4 |
p. 477-494 |
artikel |
75 |
Risk management for distributed authorization
|
Skalka, Christian |
|
2007 |
|
4 |
p. 447-489 |
artikel |
76 |
Role-based administration of user-role assignment: The URA97 model and its Oracle implementation
|
Ravi Sandhu |
|
2001 |
|
4 |
p. 317-342 |
artikel |
77 |
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving
|
Armando, Alessandro |
|
2012 |
|
4 |
p. 309-352 |
artikel |
78 |
Scheduler vulnerabilities and coordinated attacks in cloud computing
|
Zhou, Fangfei |
|
2013 |
|
4 |
p. 533-559 |
artikel |
79 |
Scriptless attacks: Stealing more pie without touching the sill
|
Heiderich, M. |
|
2014 |
|
4 |
p. 567-599 |
artikel |
80 |
SecPAL: Design and semantics of a decentralized authorization language
|
Becker, Moritz Y. |
|
2010 |
|
4 |
p. 619-665 |
artikel |
81 |
Secure multi-execution of web scripts: Theory and practice
|
De Groef, Willem |
|
2014 |
|
4 |
p. 469-509 |
artikel |
82 |
Secure object deletion and garbage collection in multilevel object bases[1]A preliminary version of this paper appeared under the title “A principled approach to object deletion and garbage collection in multilevel secure object bases”, in: Proceedin
|
Elisa Bertino |
|
2001 |
|
4 |
p. 257-285 |
artikel |
83 |
Secure set intersection cardinality with application to association rule mining
|
Jaideep Vaidya |
|
2005 |
|
4 |
p. 593-622 |
artikel |
84 |
Securing LSB embedding against structural steganalysis
|
Powell, Brian A. |
|
|
|
4 |
p. 517-539 |
artikel |
85 |
Selected Papers From ESORICS 2020
|
|
|
|
|
4 |
p. 571 |
artikel |
86 |
Some attacks upon authenticated group key agreement protocols
|
Olivier Pereira |
|
2003 |
|
4 |
p. 555-580 |
artikel |
87 |
Specifying and using intrusion masking models to process distributed operations
|
Meng Yu |
|
2005 |
|
4 |
p. 623-658 |
artikel |
88 |
SQLiDDS: SQL injection detection using document similarity measure
|
Kar, Debabrata |
|
2016 |
|
4 |
p. 507-539 |
artikel |
89 |
Stateful authorization logic – Proof theory and a case study
|
Garg, Deepak |
|
2012 |
|
4 |
p. 353-391 |
artikel |
90 |
StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception
|
Zhang, Jianfeng |
|
|
|
4 |
p. 393-417 |
artikel |
91 |
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation
|
Jonathan Millen |
|
2005 |
|
4 |
p. 695 |
artikel |
92 |
Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution
|
Kar, Diptendu Mohan |
|
|
|
4 |
p. 437-467 |
artikel |
93 |
Temporal authorization bases: From specification to integration
|
Elisa Bertino |
|
2001 |
|
4 |
p. 309-353 |
artikel |
94 |
The impact of application context on privacy and performance of keystroke authentication systems
|
Balagani, Kiran S. |
|
2018 |
|
4 |
p. 543-556 |
artikel |
95 |
Towards adding verifiability to web-based Git repositories
|
Afzali, Hammad |
|
|
|
4 |
p. 405-436 |
artikel |
96 |
Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication1
|
Paul, Sebastian |
|
|
|
4 |
p. 623-653 |
artikel |
97 |
TripleMon: A multi-layer security framework for mediating inter-process communication on Android
|
Jing, Yiming |
|
2016 |
|
4 |
p. 405-426 |
artikel |
98 |
Typed-based verification of Web sandboxes
|
Gibbs Politz, Joe |
|
2014 |
|
4 |
p. 511-565 |
artikel |
99 |
Using reflection as a mechanism for enforcing security policies on compiled code
|
Ian Welch |
|
2002 |
|
4 |
p. 399-432 |
artikel |
100 |
Using sample size to limit exposure to data mining
|
Chris Clifton |
|
2001 |
|
4 |
p. 281-307 |
artikel |
101 |
Verified formal security models for multiapplicative smart cards
|
Gerhard Schellhorn |
|
2002 |
|
4 |
p. 339-367 |
artikel |
102 |
Verifying privacy-type properties of electronic voting protocols
|
Delaune, Stéphanie |
|
2009 |
|
4 |
p. 435-487 |
artikel |