Volume 8, Number 1 (March 2017) BibTex

  • pp. 1-3
  • Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality
  • Jason R.C. Nurse and Elisa Bertino
    [pdf]
  • pp. 4-25
  • Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
    Peter Mell, James Shook, Richard Harang, and Serban Gavrila 
  • [Abstract][pdf]
  • pp. 26-43
  • Formalising Policies for Insider-threat Detection: A Tripwire Grammar
    Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, and Sadie Creese
    [Abstract][pdf]
  • pp. 44-78
    Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation
    Florian Kammüller, Manfred Kerber, and Christian W. Probst 
    [Abstract][pdf]
  • pp. 79-100
    A formal approach for network security policy validation
    Fulvio Valenza, Tao Su, Serena Spinoso, Antonio Lioy, Riccardo Sisto, and Marco Vallini
    [Abstract][pdf]
[Return to Archives]