Volume 17,
Number 1,
2009
 Selected papers from the Third and Fourth Secure Data Management (SDM) workshops 
- Milan Petkovic, Willem Jonker:
 Preface.
1-3
             
- Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini, Sushil Jajodia:
 Evaluating privacy threats in released database views by symmetric indistinguishability.
5-42
             
- Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn:
 Privacy-preserving incremental data dissemination.
43-68
             
- Stefan Böttcher, Rita Hartel:
 Information disclosure by answers to XPath queries.
69-99
             
- Weiwei Cheng, Kian-Lee Tan:
 Query assurance verification for outsourced multi-dimensional databases.
101-126
             
Volume 17,
Number 2,
2009
 
- Nan Hu, Giri Kumar Tayi, Chengyu Ma, Yingjiu Li:
 Certificate revocation release policies.
127-157
             
- Amir Herzberg:
 Folklore, practice and theory of robust combiners.
159-189
             
- Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:
 Configuring storage-area networks using mandatory security.
191-210
             
- Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu:
 Edge-RMP: Minimizing administrative assignments for role-based access control.
211-235
             
Volume 17,
Number 3,
2009
 Best papers of the Security Track at the 2006 ACM Symposium on Applied Computing 
- Giampaolo Bella, Peter Y. A. Ryan:
 Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing.
237
             
- Petros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas:
 Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification.
239-268
             
- Christian Grothoff, Krista Grothoff, Ryan Stutsman, Ludmila Alkhutova, Mikhail J. Atallah:
 Translation-based steganography.
269-303
             
- Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda:
 Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries.
305-329
             
- Haizhi Xu, Steve J. Chapin:
 Address-space layout randomization using code islands.
331-362
             
Volume 17,
Number 4,
2009
 
Copyright © Fri Mar 12 17:29:53 2010
 by Michael Ley (ley@uni-trier.de)