Journal: Computers & Security

Volume 31, Issue 8

857 -- 858Gene Spafford. Editorial
859 -- 869Ying Qian, Yulin Fang, Jose J. Gonzalez. Managing information security risks during new technology adoption
870 -- 885Jie Shi, Yingjiu Li, Robert H. Deng. A secure and efficient discovery service system in EPCglobal network
886 -- 896Yu-Lun Huang, Hsin-Yi Tsai. A framework for quantitative evaluation of parallel control-flow obfuscation
897 -- 911Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn, Irini Kokkinou. Access control for online social networks third party applications
912 -- 924Zhi Yang, Lihua Yin, Shuyuan Jin, Xingyuan Chen. Optimal mining on security labels for decentralized information flow control
925 -- 939Macià Mut Puigserver, Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Arnau Vives-Guasch, Jordi Castellà-Roca. A survey of electronic ticketing applied to transport
940 -- 955Theis Solberg Hjorth, Rune Torbensen. Trusted Domain: A security platform for home automation
956 -- 966Cristina Alcaraz, Javier Lopez, Rodrigo Roman, Hsiao-Hwa Chen. Selecting key management schemes for WSN applications
967 -- 982Slim Rekhis, Noureddine Boudriga. A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks
983 -- 988Steven Furnell, Nathan L. Clarke. Power to the people? The evolving recognition of human aspects of security
989 -- 1010Roger Jardí-Cedó, Jordi Pujol Ahulló, Jordi Castellà-Roca, Alexandre Viejo. Study on poll-site voting and verification systems
1011 -- 1012Jennifer L. Bayuk. Wishful thinking
1013 -- 0Katina Michael. Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges