References of "JOURNAL OF COMPUTER SECURITY"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailAutomated reasoning for equivalences in the applied pi calculus with barriers
Blanchet, Bruno; Smyth, Benjamin UL

in Journal of Computer Security (2018), 26(3), 367--422

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detailService security and privacy as a socio-technical problem
Bella, Giampaolo; Curzon, Paul; Lenzini, Gabriele UL

in JOURNAL OF COMPUTER SECURITY (2015), 23(5), 563-585

The security and privacy of the data that users transmit, more or less deliberately, to modern services is an open problem. It is not solely limited to the actual Internet traversal, a sub-problem vastly ... [more ▼]

The security and privacy of the data that users transmit, more or less deliberately, to modern services is an open problem. It is not solely limited to the actual Internet traversal, a sub-problem vastly tackled by consolidated research in security protocol design and analysis. By contrast, it entails much broader dimensions pertaining to how users approach technology and understand the risks for the data they enter. For example, users may express cautious or distracted personas depending on the service and the point in time; further, pre-established paths of practice may lead them to neglect the intrusive privacy policy offered by a service, or the outdated protections adopted by another. The approach that sees the service security and privacy problem as a socio-technical one needs consolidation. With this motivation, the article makes a threefold contribution. It reviews the existing literature on service security and privacy, especially from the socio-technical standpoint. Further, it outlines a general research methodology aimed at layering the problem appropriately, at suggesting how to position existing findings, and ultimately at indicating where a transdisciplinary task force may fit in. The article concludes with the description of the three challenge domains of services whose security and privacy we deem open socio-technical problems, not only due to their inherent facets but also to their huge number of users. [less ▲]

Detailed reference viewed: 112 (5 UL)
Full Text
See detailFoundational aspects of security
Chatzikokolakis, Konstantinos; Mödersheim, Sebastian; Palamidessi, Catuscia et al

in Journal of Computer Security (2014), 22(2), 201-202

Detailed reference viewed: 78 (3 UL)
Full Text
Peer Reviewed
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Journal of Computer Security (2012), 20(4), 437-459

Detailed reference viewed: 62 (5 UL)