Search
w/in this Title
for Titles
All Reviews
Journal of Computer Security
IOS Press
Options:
Date Reviewed
Title
Author
Publisher
Published Date
Descending Order
Ascending Order
1-10 of 10 reviews
Date Reviewed
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes
Akinyele J., Green M., Hohenberger S., Pagano M. Journal of Computer Security 22(6): 867-912, 2014. Type: Article
With the Internet of Things (IoT) quickly becoming a reality, the importance of secure communications between devices cannot be overstated. Since there are many small devices involved in such networks, the algorithms needed for authent...
Aug 20 2015
Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness
Myers S., Sergi M., shelat a. Journal of Computer Security 21(5): 721-748, 2013. Type: Article
Ways to construct cryptographic schemes to protect against malicious attackers have received a great deal of attention in the area of formally provable security, in both academia and industry. It is very difficult to define new formal ...
Oct 6 2014
Static analysis for detecting taint-style vulnerabilities in Web applications
Jovanovic N., Kruegel C., Kirda E. Journal of Computer Security 18(5): 861-907, 2010. Type: Article
Web applications interact with an uncontrolled and arbitrarily hostile environment. One common attack in such environments involves submitting what is supposed to be harmless data, such as a customer name; however, that data actually c...
Nov 10 2011
Assurance for federated identity management
Baldwin A., Casassa Mont M., Beres Y., Shiu S. Journal of Computer Security 18(4): 541-572, 2010. Type: Article
Even though identity management solutions have existed for some time, the advent of social networks, content management system (CMS) platforms, and cloud computing has brought some much needed advances in this technology. Federated ide...
Oct 6 2010
An approach to cooperative updates of XML documents in distributed systems
Bertino E., Ferrari E., Mella G. Journal of Computer Security 13(2): 191-242, 2005. Type: Article
Today, people collaborate around the world, and they cooperatively write documents. When many people work on a document, an access control model that supports a fine level of granularity is essential. Moreover, some steps in the workfl...
Sep 28 2005
Flexible authentication of XML documents
Devanbu P., Gertz M., Kwong A., Martel C., Nuckolls G., Stubblebine S. Journal of Computer Security 12(6): 841-864, 2004. Type: Article
Extensible Markup Language (XML) is possibly one of the most powerful technologies to hit computing in years, providing a way to save and transfer many forms of data in a format that is vendor neutral, easy to generate, and easy to rea...
Jul 26 2005
A checksum-based corruption detection technique
Barbará D., Goel R., Jajodia S. Journal of Computer Security 11(3): 315-329, 2003. Type: Article
One way to protect a file is to compute a hashed signature based upon the contents of the file. Any change to the file will almost certainly result in a change to the signature as well, so an unauthorized change can be detected by ...
Nov 19 2003
Programmable access control
Hale J., Papa M., Shenoi S. Journal of Computer Security 11(3): 331-351, 2003. Type: Article
Protection models and security application programming interfaces (APIs) that constitute the state of the art for safeguarding Internet applications prove their limits for fine-grained configurable security policies, and do not ensure ...
Nov 14 2003
Reasoning about secrecy for active networks
Kakkar P., Gunter C., Abadi M. Journal of Computer Security 11(2): 245-287, 2003. Type: Article
In an internetwork context, an active network is one where chunks of mobile code, carried in packets, can be executed at routers, as well as at hosts. This can cause security-relevant changes in services, and in resources like routing ...
Oct 20 2003
A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment
Iheagwara C., Blyth A., Singhal M. Journal of Computer Security 11(1): 1-33, 2003. Type: Article
Iheagwara, Blyth, and Singhal report on an experimental evaluation study of gigabit intrusion detection system (IDS) performance. The authors argue that the ability of IDSs to detect attacks is greatly affected by bandwidth utilization...
Aug 26 2003
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy