Journal: Computers & Security

Volume 28, Issue 5

247 -- 0Dimitris Gritzalis, Sokratis K. Katsikas. Editorial
248 -- 259John Gerdes Jr., Joakim Kalvenes, Chin-Tser Huang. Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements
260 -- 275Qi Li, Xinwen Zhang, Mingwei Xu, Jianping Wu. Towards secure dynamic collaborations with group-based RBAC model
276 -- 288Hyunsang Choi, Heejo Lee, Hyogon Kim. Fast detection and visualization of network attacks on parallel coordinates
289 -- 300Mildrey Carbonell, José María Sierra, Javier Lopez. Secure multiparty payment with an intermediary entity
301 -- 309Ming-Yang Su, Gwo-Jong Yu, Chun-Yuen Lin. A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach
310 -- 324Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider. Specifying authentication using signal events in CSP