Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Journal of Computer Security
IOS Press
 
   
 
Options:
 
  1-10 of 10 reviews Date Reviewed 
  Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes
Akinyele J., Green M., Hohenberger S., Pagano M. Journal of Computer Security 22(6): 867-912, 2014.  Type: Article

With the Internet of Things (IoT) quickly becoming a reality, the importance of secure communications between devices cannot be overstated. Since there are many small devices involved in such networks, the algorithms needed for authent...

Aug 20 2015
  Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness
Myers S., Sergi M., shelat a. Journal of Computer Security 21(5): 721-748, 2013.  Type: Article

Ways to construct cryptographic schemes to protect against malicious attackers have received a great deal of attention in the area of formally provable security, in both academia and industry. It is very difficult to define new formal ...

Oct 6 2014
  Static analysis for detecting taint-style vulnerabilities in Web applications
Jovanovic N., Kruegel C., Kirda E. Journal of Computer Security 18(5): 861-907, 2010.  Type: Article

Web applications interact with an uncontrolled and arbitrarily hostile environment. One common attack in such environments involves submitting what is supposed to be harmless data, such as a customer name; however, that data actually c...

Nov 10 2011
   Assurance for federated identity management
Baldwin A., Casassa Mont M., Beres Y., Shiu S. Journal of Computer Security 18(4): 541-572, 2010.  Type: Article

Even though identity management solutions have existed for some time, the advent of social networks, content management system (CMS) platforms, and cloud computing has brought some much needed advances in this technology. Federated ide...

Oct 6 2010
   An approach to cooperative updates of XML documents in distributed systems
Bertino E., Ferrari E., Mella G. Journal of Computer Security 13(2): 191-242, 2005.  Type: Article

Today, people collaborate around the world, and they cooperatively write documents. When many people work on a document, an access control model that supports a fine level of granularity is essential. Moreover, some steps in the workfl...

Sep 28 2005
  Flexible authentication of XML documents
Devanbu P., Gertz M., Kwong A., Martel C., Nuckolls G., Stubblebine S. Journal of Computer Security 12(6): 841-864, 2004.  Type: Article

Extensible Markup Language (XML) is possibly one of the most powerful technologies to hit computing in years, providing a way to save and transfer many forms of data in a format that is vendor neutral, easy to generate, and easy to rea...

Jul 26 2005
  A checksum-based corruption detection technique
Barbará D., Goel R., Jajodia S. Journal of Computer Security 11(3): 315-329, 2003.  Type: Article

One way to protect a file is to compute a hashed signature based upon the contents of the file. Any change to the file will almost certainly result in a change to the signature as well, so an unauthorized change can be detected by ...

Nov 19 2003
  Programmable access control
Hale J., Papa M., Shenoi S. Journal of Computer Security 11(3): 331-351, 2003.  Type: Article

Protection models and security application programming interfaces (APIs) that constitute the state of the art for safeguarding Internet applications prove their limits for fine-grained configurable security policies, and do not ensure ...

Nov 14 2003
  Reasoning about secrecy for active networks
Kakkar P., Gunter C., Abadi M. Journal of Computer Security 11(2): 245-287, 2003.  Type: Article

In an internetwork context, an active network is one where chunks of mobile code, carried in packets, can be executed at routers, as well as at hosts. This can cause security-relevant changes in services, and in resources like routing ...

Oct 20 2003
  A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment
Iheagwara C., Blyth A., Singhal M. Journal of Computer Security 11(1): 1-33, 2003.  Type: Article

Iheagwara, Blyth, and Singhal report on an experimental evaluation study of gigabit intrusion detection system (IDS) performance. The authors argue that the ability of IDSs to detect attacks is greatly affected by bandwidth utilization...

Aug 26 2003
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy