%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.05", %%% date = "23 September 2019", %%% time = "05:51:48 MDT", %%% filename = "jcompsecur.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "https://www.math.utah.edu/~beebe", %%% checksum = "26999 13573 49403 529964", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "BibTeX; bibliography; Journal of Computer %%% Security", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is a COMPLETE bibliography of the %%% Journal of Computer Security (CODEN JCSIET, %%% ISSN 0926-227X (print), 1875-8924 %%% (electronic)), published by IOS Press. %%% Publication began with volume 1, number 1, in %%% 1992, and there are 4 to 6 issues per annual %%% volume, and issues are often combined. %%% %%% At version 1.05, the COMPLETE year coverage %%% looked like this: %%% %%% 1992 ( 20) 2002 ( 20) 2012 ( 24) %%% 1993 ( 14) 2003 ( 24) 2013 ( 30) %%% 1994 ( 0) 2004 ( 30) 2014 ( 27) %%% 1995 ( 20) 2005 ( 31) 2015 ( 28) %%% 1996 ( 20) 2006 ( 24) 2016 ( 23) %%% 1997 ( 22) 2007 ( 24) 2017 ( 21) %%% 1998 ( 12) 2008 ( 29) 2018 ( 26) %%% 1999 ( 13) 2009 ( 30) 2019 ( 19) %%% 2000 ( 15) 2010 ( 41) %%% 2001 ( 13) 2011 ( 37) %%% %%% Article: 637 %%% %%% Total entries: 637 %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{"\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"} %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|https://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-J-COMP-SECUR = "Journal of Computer Security"} %%% ==================================================================== %%% Bibliography entries, sorted in publication order, with %%% `bibsort -byvolume': @Article{Jajodia:1992:EPa, author = "Sushil Jajodia and Jonathan Millen", title = "{Editors}' Preface", journal = j-J-COMP-SECUR, volume = "1", number = "1", pages = "1--3", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-1101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:05 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Meadows:1992:AFM, author = "Catherine Meadows", title = "Applying Formal Methods to the Analysis of a Key Management Protocol", journal = j-J-COMP-SECUR, volume = "1", number = "1", pages = "5--35", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-1102", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:05 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{McLean:1992:PNF, author = "John McLean", title = "Proving Noninterference and Functional Correctness Using Traces", journal = j-J-COMP-SECUR, volume = "1", number = "1", pages = "37--57", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-1103", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:05 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sandhu:1992:EPS, author = "Ravi S. Sandhu", title = "Expressive Power of the Schematic Protection Model", journal = j-J-COMP-SECUR, volume = "1", number = "1", pages = "59--98", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-1104", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:05 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bieber:1992:LVS, author = "Pierre Bieber and Fr{\'e}d{\'e}ric Cuppens", title = "A Logical View of Secure Dependencies", journal = j-J-COMP-SECUR, volume = "1", number = "1", pages = "99--129", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-1105", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:05 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:1992:CPE, author = "Anonymous", title = "Call for Papers: {European Symposium on Research in Computer Security}", journal = j-J-COMP-SECUR, volume = "1", number = "1", pages = "131--131", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-1106", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:05 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sandhu:1992:GEP, author = "Ravi Sandhu", title = "{Guest Editor}'s Preface", journal = j-J-COMP-SECUR, volume = "1", number = "2", pages = "131--132", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-1201", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:09 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gupta:1992:TTP, author = "Sarbari Gupta and Virgil D. Gligor", title = "Towards a Theory of Penetration-Resistant Systems and Its Applications", journal = j-J-COMP-SECUR, volume = "1", number = "2", pages = "133--158", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-1202", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:09 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Foley:1992:ASN, author = "Simon N. Foley", title = "Aggregation and Separation as Noninterference Properties", journal = j-J-COMP-SECUR, volume = "1", number = "2", pages = "159--188", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-1203", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:09 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Motro:1992:UMS, author = "Amihai Motro", title = "A Unified Model for Security and Integrity in Relational Databases", journal = j-J-COMP-SECUR, volume = "1", number = "2", pages = "189--213", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-1204", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:09 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jajodia:1992:EPb, author = "Sushil Jajodia and Jonathan Millen", title = "{Editors}' Preface", journal = j-J-COMP-SECUR, volume = "1", number = "3--4", pages = "215--215", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-13-401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lunt:1992:GEP, author = "Teresa F. Lunt and John McLean", title = "{Guest Editors}' Preface", journal = j-J-COMP-SECUR, volume = "1", number = "3--4", pages = "217--218", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-13-402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Wray:1992:ACT, author = "John C. Wray", title = "An Analysis of Covert Timing Channels", journal = j-J-COMP-SECUR, volume = "1", number = "3--4", pages = "219--232", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-13-403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hu:1992:RTC, author = "Wei-Ming Hu", title = "Reducing Timing Channels with Fuzzy Time", journal = j-J-COMP-SECUR, volume = "1", number = "3--4", pages = "233--254", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-13-404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gray:1992:TMF, author = "James W. {Gray III}", title = "Toward a Mathematical Foundation for Information Flow Security", journal = j-J-COMP-SECUR, volume = "1", number = "3--4", pages = "255--294", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-13-405", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Tardo:1992:SGA, author = "Joseph J. Tardo and Kannan Alagappan", title = "{SPX}: Global Authentication Using Public Key Certificates", journal = j-J-COMP-SECUR, volume = "1", number = "3--4", pages = "295--316", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-13-406", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Syverson:1992:KBS, author = "Paul F. Syverson", title = "Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols", journal = j-J-COMP-SECUR, volume = "1", number = "3--4", pages = "317--334", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-13-407", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ammann:1992:ESP, author = "Paul E. Ammann and Ravi S. Sandhu", title = "The Extended Schematic Protection Model", journal = j-J-COMP-SECUR, volume = "1", number = "3--4", pages = "335--383", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-13-408", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jacob:1992:BTA, author = "Jeremy Jacob", title = "Basic Theorems about Security", journal = j-J-COMP-SECUR, volume = "1", number = "3--4", pages = "385--411", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-13-409", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:1992:AI, author = "Anonymous", title = "Author Index", journal = j-J-COMP-SECUR, volume = "1", number = "3--4", pages = "413--413", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-13-410", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jajodia:1993:EPa, author = "Sushil Jajodia and Jonathan Millen", title = "{Editors}' Preface", journal = j-J-COMP-SECUR, volume = "2", number = "2--3", pages = "85--85", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-22-301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:17 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{McLean:1993:GEP, author = "John McLean and Richard Kemmerer", title = "{Guest Editors}' Preface", journal = j-J-COMP-SECUR, volume = "2", number = "2--3", pages = "87--88", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-22-302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:17 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Millen:1993:RAM, author = "Jonathan K. Millen", title = "A Resource Allocation Model for Denial of Service Protection", journal = j-J-COMP-SECUR, volume = "2", number = "2--3", pages = "89--106", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-22-303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:17 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Woo:1993:ADS, author = "Thomas Y. C. Woo and Simon S. Lam", title = "Authorization in Distributed Systems: A New Approach", journal = j-J-COMP-SECUR, volume = "2", number = "2--3", pages = "107--136", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-22-304", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:17 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gligor:1993:IRA, author = "Virgil D. Gligor and Shyh-Wei Luan and Joseph N. Pato", title = "On Inter-Realm Authentication in Large Distributed Systems", journal = j-J-COMP-SECUR, volume = "2", number = "2--3", pages = "137--157", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-22-305", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:17 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Epstein:1993:HAW, author = "Jeremy Epstein and John McHugh and Hilarie Orman and Rita Pascale and Ann Marmor-Squires and Bonnie Danner and Charles R. Martin and Martha Branstad and Glenn Benson and Doug Rothnie", title = "A High Assurance Window System Prototype", journal = j-J-COMP-SECUR, volume = "2", number = "2--3", pages = "159--190", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-22-306", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:17 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yahalom:1993:OAT, author = "Raphael Yahalom", title = "Optimality of Asynchronous Two-Party Secure Data-Exchange Protocols", journal = j-J-COMP-SECUR, volume = "2", number = "2--3", pages = "191--209", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-22-307", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:17 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Littlewood:1993:TOM, author = "Bev Littlewood and Sarah Brocklehurst and Norman Fenton and Peter Mellor and Stella Page and David Wright and John Dobson and John McDermid and Dieter Gollmann", title = "Towards Operational Measures of Computer Security", journal = j-J-COMP-SECUR, volume = "2", number = "2--3", pages = "211--229", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-22-308", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:17 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Thomas:1993:KAM, author = "Roshan K. Thomas and Ravi S. Sandhu", title = "A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up", journal = j-J-COMP-SECUR, volume = "2", number = "2--3", pages = "231--275", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-22-309", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:17 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Millen:1993:EPb, author = "Jonathan Millen", title = "{Editor}'s Preface", journal = j-J-COMP-SECUR, volume = "2", number = "4", pages = "277--277", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-2401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Horton:1993:CVP, author = "J. D. Horton and R. H. Cooper and W. F. Hyslop and B. G. Nickerson and O. K. Ward and Robert Harland and Elton Ashby and W. M. Stewart", title = "The Cascade Vulnerability Problem", journal = j-J-COMP-SECUR, volume = "2", number = "4", pages = "279--290", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-2402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Trostle:1993:MFT, author = "Jonathan T. Trostle", title = "Modelling a Fuzzy Time System", journal = j-J-COMP-SECUR, volume = "2", number = "4", pages = "291--309", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-2403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Atluri:1993:ASC, author = "Vijayalakshmi Atluri and Sushil Jajodia and Elisa Bertino", title = "Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems", journal = j-J-COMP-SECUR, volume = "2", number = "4", pages = "311--351", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-2404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:1993:AI, author = "Anonymous", title = "Author Index", journal = j-J-COMP-SECUR, volume = "2", number = "4", pages = "353--354", month = "????", year = "1993", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1993-2405", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jajodia:1995:EPa, author = "Sushil Jajodia and Jonathan Millen", title = "{Editors}' Preface", journal = j-J-COMP-SECUR, volume = "3", number = "1", pages = "1--1", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gong:1995:GEP, author = "Li Gong", title = "{Guest Editor}'s Preface", journal = j-J-COMP-SECUR, volume = "3", number = "1", pages = "3--3", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3102", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Focardi:1995:CSP, author = "Riccardo Focardi and Roberto Gorrieri", title = "A Classification of Security Properties for Process Algebras", journal = j-J-COMP-SECUR, volume = "3", number = "1", pages = "5--33", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3103", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Millen:1995:UFC, author = "Jonathan K. Millen", title = "Unwinding Forward Correctability", journal = j-J-COMP-SECUR, volume = "3", number = "1", pages = "35--54", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3104", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bevier:1995:SBA, author = "William R. Bevier and William D. Young", title = "A State-based Approach to Noninterference", journal = j-J-COMP-SECUR, volume = "3", number = "1", pages = "55--70", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3105", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Simmons:1995:RTI, author = "G. J. Simmons and Catherine Meadows", title = "The Role of Trust in Information Integrity Protocols", journal = j-J-COMP-SECUR, volume = "3", number = "1", pages = "71--84", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3106", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Millen:1995:EPb, author = "Jonathan K. Millen", title = "{Editor}'s Preface", journal = j-J-COMP-SECUR, volume = "3", number = "2--3", pages = "85--85", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-32-301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ammann:1995:CCS, author = "Paul Ammann and Frank Jaeckle and Sushil Jajodia", title = "Concurrency Control in a Secure Multilevel Database via a Two-Snapshot Algorithm", journal = j-J-COMP-SECUR, volume = "3", number = "2--3", pages = "87--113", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-32-302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kang:1995:TMM, author = "I. E. Kang and T. F. Keefe", title = "Transaction Management for Multilevel Secure Replicated Databases", journal = j-J-COMP-SECUR, volume = "3", number = "2--3", pages = "115--145", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-32-303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hinke:1995:FAD, author = "Thomas H. Hinke and Harry S. Delugach and Asha Chandrasekhar", title = "A Fast Algorithm for Detecting Second Paths in Database Inference Analysis", journal = j-J-COMP-SECUR, volume = "3", number = "2--3", pages = "147--168", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-32-304", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bertino:1995:EAM, author = "Elisa Bertino and Fabio Origgi and Pierangela Samarati", title = "An Extended Authorization Model for Object Databases", journal = j-J-COMP-SECUR, volume = "3", number = "2--3", pages = "169--206", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-32-305", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Notargiacomo:1995:MMI, author = "LouAnna Notargiacomo and Barbara T. Blaustein and Catherine D. McCollum", title = "Merging Models: Integrity, Dynamic Separation of Duty and Trusted Data Management", journal = j-J-COMP-SECUR, volume = "3", number = "2--3", pages = "207--230", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-32-306", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jajodia:1995:EPc, author = "Sushil Jajodia and Jonathan Millen", title = "{Editors}' Preface", journal = j-J-COMP-SECUR, volume = "3", number = "4", pages = "231--231", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Foley:1995:SSC, author = "Simon N. Foley and Jeremy L. Jacob", title = "Specifying Security for Computer Supported Collaborative Working", journal = j-J-COMP-SECUR, volume = "3", number = "4", pages = "233--253", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chen:1995:DTA, author = "Liqun Chen and Dieter Gollmann and Christopher J. Mitchell", title = "Distributing Trust Amongst Multiple Authentication Servers", journal = j-J-COMP-SECUR, volume = "3", number = "4", pages = "255--267", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zakinthinos:1995:CNI, author = "A. Zakinthinos and E. S. Lee", title = "The Composability of Non-Interference", journal = j-J-COMP-SECUR, volume = "3", number = "4", pages = "269--281", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bishop:1995:TIT, author = "Matt Bishop", title = "Theft of Information in the Take-{Grant} Protection Model", journal = j-J-COMP-SECUR, volume = "3", number = "4", pages = "283--308", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3405", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Blundo:1995:MKD, author = "C. Blundo and Luiz A. Frota Mattos and D. R. Stinson", title = "Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels", journal = j-J-COMP-SECUR, volume = "3", number = "4", pages = "309--322", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3406", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:1995:CP, author = "Anonymous", title = "Call for Papers", journal = j-J-COMP-SECUR, volume = "3", number = "4", pages = "323--324", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3407", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:1995:AIV, author = "Anonymous", title = "Author Index Volume 3", journal = j-J-COMP-SECUR, volume = "3", number = "4", pages = "325--326", month = "????", year = "1995", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1994/1995-3408", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bertino:1996:GEP, author = "Elisa Bertino and G{\'e}rard Eizenberg and Roger M. Needham", title = "Guest-editors' preface", journal = j-J-COMP-SECUR, volume = "4", number = "1", pages = "1--2", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-4101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{dAusbourg:1996:CCD, author = "Bruno d'Ausbourg and Christel Calas", title = "Controlling causal dependencies over a secure network", journal = j-J-COMP-SECUR, volume = "4", number = "1", pages = "3--25", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-4102", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Roscoe:1996:NIT, author = "A. W. Roscoe and J. C. P. Woodcock and L. Wulf", title = "Non-interference through determinism", journal = j-J-COMP-SECUR, volume = "4", number = "1", pages = "27--53", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-4103", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Maurer:1996:CSB, author = "Ueli M. Maurer and Pierre E. Schmid", title = "A calculus for security boots trapping in distributed systems", journal = j-J-COMP-SECUR, volume = "4", number = "1", pages = "55--80", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-4104", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jiwa:1996:BAD, author = "Azad Jiwa and Thomas Hardjono and Jennifer Seberry", title = "Beacons for authentication in distributed systems", journal = j-J-COMP-SECUR, volume = "4", number = "1", pages = "81--96", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-4105", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hauser:1996:RSP, author = "Ralf Hauser and Philippe Janson and Gene Tsudik and Els {Van Herreweghen} and Refik Molva", title = "Robust and secure password and key change method", journal = j-J-COMP-SECUR, volume = "4", number = "1", pages = "97--111", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-4106", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:1996:IA, author = "Anonymous", title = "Information for authors", journal = j-J-COMP-SECUR, volume = "4", number = "1", pages = "113--119", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-4107", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jajodia:1996:EPa, author = "Sushil Jajodia and Jonathan Millen", title = "{Editors}' preface", journal = j-J-COMP-SECUR, volume = "4", number = "2--3", pages = "121--121", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-42-301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:41 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Shieh:1996:DIL, author = "Shiuh-Pyng Shieh and Virgil D. Gligor", title = "Detecting illicit leakage of information in operating systems", journal = j-J-COMP-SECUR, volume = "4", number = "2--3", pages = "123--148", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-42-302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:41 MDT 2016", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/061242.html", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", keywords = "information hiding; steganography", } @Article{Ammann:1996:EPM, author = "Paul Ammann and Ravi S. Sandhu and Richard Lipton", title = "The expressive power of multi-parent creation in monotonic access control models", journal = j-J-COMP-SECUR, volume = "4", number = "2--3", pages = "149--165", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-42-303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:41 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Volpano:1996:STS, author = "Dennis Volpano and Cynthia Irvine and Geoffrey Smith", title = "A sound type system for secure flow analysis", journal = j-J-COMP-SECUR, volume = "4", number = "2--3", pages = "167--187", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-42-304", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:41 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{McDermott:1996:APC, author = "John McDermott and Ravi Mukkamala", title = "Analytic performance comparison of transaction processing algorithms for the {SINTRA} replicated-architecture database system", journal = j-J-COMP-SECUR, volume = "4", number = "2--3", pages = "189--228", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-42-305", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:41 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Millen:1996:EPB, author = "Jonathan Millen", title = "{Editor}'s preface to the {Bell--LaPadula} model", journal = j-J-COMP-SECUR, volume = "4", number = "2--3", pages = "229--231", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-42-306", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:41 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{LaPadula:1996:F, author = "Leonard J. LaPadula", title = "Foreword", journal = j-J-COMP-SECUR, volume = "4", number = "2--3", pages = "233--238", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-42-307", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:41 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{LaPadula:1996:MTR, author = "Leonard J. LaPadula and D. Elliott Bell", title = "{MITRE} Technical Report 2547, Volume {II}", journal = j-J-COMP-SECUR, volume = "4", number = "2--3", pages = "239--263", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-42-308", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:41 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jajodia:1996:EPb, author = "Sushil Jajodia and Jonathan Millen", title = "{Editors}' preface", journal = j-J-COMP-SECUR, volume = "4", number = "4", pages = "265--265", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-4401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:45 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Reiter:1996:KMS, author = "Michael K. Reiter and Matthew K. Franklin and John B. Lacy and Rebecca N. Wright", title = "The {$ \Omega $} key management service", journal = j-J-COMP-SECUR, volume = "4", number = "4", pages = "267--287", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-4402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:45 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chuang:1996:SAN, author = "Shaw-Cheng Chuang", title = "Securing {ATM} networks", journal = j-J-COMP-SECUR, volume = "4", number = "4", pages = "289--329", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-4403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:45 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bishop:1996:CIF, author = "Matt Bishop", title = "Conspiracy and information flow in the {Take-Grant Protection Model}", journal = j-J-COMP-SECUR, volume = "4", number = "4", pages = "331--359", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-4404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:45 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:1996:AIV, author = "Anonymous", title = "Author Index Volume 4 (1996)", journal = j-J-COMP-SECUR, volume = "4", number = "4", pages = "361--362", month = "????", year = "1996", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1996-4405", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:45 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bertino:1997:GEP, author = "Elisa Bertino and Emilio Montolivo and Helmut Kurth", title = "Guest editors' preface", journal = j-J-COMP-SECUR, volume = "5", number = "1", pages = "1--2", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bonatti:1997:MHS, author = "P. A. Bonatti and M. L. Sapino and V. S. Subrahmanian", title = "Merging heterogeneous security orderings", journal = j-J-COMP-SECUR, volume = "5", number = "1", pages = "3--29", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5102", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lotz:1997:TSM, author = "Volkmar Lotz", title = "Threat scenarios as a means to formally develop secure systems", journal = j-J-COMP-SECUR, volume = "5", number = "1", pages = "31--67", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5103", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Camenisch:1997:DPS, author = "Jan Camenisch and Ueli Maurer and Markus Stadler", title = "Digital payment systems with passive anonymity-revoking trustees", journal = j-J-COMP-SECUR, volume = "5", number = "1", pages = "69--89", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5104", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Asokan:1997:SSS, author = "N. Asokan and G. Tsudik and M. Waidner", title = "Server-supported signatures", journal = j-J-COMP-SECUR, volume = "5", number = "1", pages = "91--108", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5105", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jajodia:1997:EP, author = "Sushil Jajodia and Jonathan Millen", title = "{Editors}' preface", journal = j-J-COMP-SECUR, volume = "5", number = "2", pages = "109--109", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5201", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:53 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Merritt:1997:GEP, author = "Michael Merritt", title = "Guest editor's preface", journal = j-J-COMP-SECUR, volume = "5", number = "2", pages = "111--112", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5202", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:53 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Malkhi:1997:HTS, author = "Dahlia Malkhi and Michael Reiter", title = "A high-throughput secure reliable multicast protocol", journal = j-J-COMP-SECUR, volume = "5", number = "2", pages = "113--127", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5203", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:53 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sinclair:1997:ASS, author = "Jane Sinclair", title = "Action systems for security specification", journal = j-J-COMP-SECUR, volume = "5", number = "2", pages = "129--154", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5204", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:53 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DeCapitanidiVimercati:1997:ASE, author = "Sabrina {De Capitani di Vimercati} and Pierangela Samarati", title = "Authorization specification and enforcement in federated database systems", journal = j-J-COMP-SECUR, volume = "5", number = "2", pages = "155--188", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5205", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:53 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bertino:1997:SIS, author = "Elisa Bertino and Pierangela Samarati and Gian Paolo Rossi", title = "Special issue on Security in the {World Wide Web (WWW)}", journal = j-J-COMP-SECUR, volume = "5", number = "3", pages = "189--190", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:57 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bergadano:1997:SAP, author = "F. Bergadano and B. Crispo and M. Lomas", title = "Strong authentication and privacy with standard browsers", journal = j-J-COMP-SECUR, volume = "5", number = "3", pages = "191--212", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:57 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Quisquater:1997:ASS, author = "Jean-Jacques Quisquater and Marc Joye", title = "Authentication of sequences with the {SL$_2$} hash function: application to video sequences", journal = j-J-COMP-SECUR, volume = "5", number = "3", pages = "213--223", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:57 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bryce:1997:CEI, author = "Ciar{\'a}n Bryce and Winfried K{\"u}hnhauser and R{\'e}my Amouroux and Mauricio L{\'o}pez and Harry Rudnik", title = "{CWASAR}: a {European} infrastructure for secure electronic commerce", journal = j-J-COMP-SECUR, volume = "5", number = "3", pages = "225--235", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5304", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:57 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Syverson:1997:PWB, author = "Paul F. Syverson and Michael G. Reed and David M. Goldschlag", title = "Private {Web} browsing", journal = j-J-COMP-SECUR, volume = "5", number = "3", pages = "237--248", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5305", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:57 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Roscheisen:1997:NCD, author = "Martin R{\"o}scheisen and Terry Winograd", title = "A network-centric design for relationship-based security and access control", journal = j-J-COMP-SECUR, volume = "5", number = "3", pages = "249--254", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5306", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:57 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Winslett:1997:UDC, author = "M. Winslett and N. Ching and V. Jones and I. Slepchin", title = "Using digital credentials on the {World Wide Web}", journal = j-J-COMP-SECUR, volume = "5", number = "3", pages = "255--267", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5307", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:57 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Samarati:1997:GEP, author = "Pierangela Samarati and Ravi Sandhu", title = "Guest editors' preface", journal = j-J-COMP-SECUR, volume = "5", number = "4", pages = "269--270", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:01 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Castano:1997:ADG, author = "S. Castano and S. {De Capitani di Vimercati} and M. G. Fugini", title = "Automated derivation of global authorizations for database federations", journal = j-J-COMP-SECUR, volume = "5", number = "4", pages = "271--301", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:01 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Atluri:1997:EMD, author = "Vijayalakshmi Atluri and Wei-Kuang Huang", title = "Enforcing mandatory and discretionary security in workflow management systems", journal = j-J-COMP-SECUR, volume = "5", number = "4", pages = "303--339", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:01 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Demurjian:1997:TDP, author = "S. A. {Demurjian Sr.} and T. C. Ting", title = "Towards a definitive paradigm for security in object-oriented systems and applications", journal = j-J-COMP-SECUR, volume = "5", number = "4", pages = "341--382", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:01 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:1997:AIV, author = "Anonymous", title = "Author Index Volume 5 (1997)", journal = j-J-COMP-SECUR, volume = "5", number = "4", pages = "383--384", month = "????", year = "1997", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1997-5405", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:01 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Foley:1998:GEP, author = "Simon N. Foley", title = "Guest editors' preface", journal = j-J-COMP-SECUR, volume = "6", number = "1--2", pages = "1--1", month = "????", year = "1998", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1998-61-201", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:05 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Abadi:1998:SLL, author = "Mart{\'\i}n Abadi", title = "On {SDSI}'s linked local name spaces", journal = j-J-COMP-SECUR, volume = "6", number = "1--2", pages = "3--21", month = "????", year = "1998", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1998-61-202", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:05 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gray:1998:PSC, author = "James W. {Gray III} and Kin Fai {Epsilon Ip} and King-Shan Lui", title = "Provable security for cryptographic protocols --- exact analysis and engineering applications", journal = j-J-COMP-SECUR, volume = "6", number = "1--2", pages = "23--52", month = "????", year = "1998", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1998-61-203", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:05 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lowe:1998:CCA, author = "Gavin Lowe", title = "{Casper}: A compiler for the analysis of security protocols", journal = j-J-COMP-SECUR, volume = "6", number = "1--2", pages = "53--84", month = "????", year = "1998", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1998-61-204", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:05 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Paulson:1998:IAV, author = "Lawrence C. Paulson", title = "The inductive approach to verifying cryptographic protocols", journal = j-J-COMP-SECUR, volume = "6", number = "1--2", pages = "85--128", month = "????", year = "1998", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1998-61-205", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:05 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Matsumoto:1998:HCC, author = "Tsutomu Matsumoto", title = "Human--computer cryptography: An attempt", journal = j-J-COMP-SECUR, volume = "6", number = "3", pages = "129--149", month = "????", year = "1998", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-980076", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:08 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hofmeyr:1998:IDU, author = "Steven A. Hofmeyr and Stephanie Forrest and Anil Somayaji", title = "Intrusion detection using sequences of system calls", journal = j-J-COMP-SECUR, volume = "6", number = "3", pages = "151--180", month = "????", year = "1998", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-980109", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:08 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ray:1998:SBT, author = "Indrakshi Ray and Paul Ammann and Sushil Jajodia", title = "A semantic-based transaction processing model for multilevel transactions", journal = j-J-COMP-SECUR, volume = "6", number = "3", pages = "181--217", month = "????", year = "1998", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-980108", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:08 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Knudsen:1998:SMD, author = "Lars R. Knudsen and Keith M. Martin", title = "In search of multiple domain key recovery", journal = j-J-COMP-SECUR, volume = "6", number = "4", pages = "219--235", month = "????", year = "1998", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1998-6401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Franklin:1998:AML, author = "Matthew K. Franklin and Dahlia Malkhi", title = "Auditable metering with lightweight security", journal = j-J-COMP-SECUR, volume = "6", number = "4", pages = "237--255", month = "????", year = "1998", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1998-6402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Casati:1998:EWA, author = "Fabio Casati and Silvana Castano and Maria Grazia Fugini", title = "Enforcing workflow authorization constraints using triggers", journal = j-J-COMP-SECUR, volume = "6", number = "4", pages = "257--285", month = "????", year = "1998", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1998-6403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:1998:AIV, author = "Anonymous", title = "Author Index Volume 6 (1998)", journal = j-J-COMP-SECUR, volume = "6", number = "4", pages = "287--287", month = "????", year = "1998", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1998-6404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Millen:1999:SSI, author = "Jonathan Millen", title = "Special section on Intrusion Detection", journal = j-J-COMP-SECUR, volume = "7", number = "1", pages = "1--1", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-7101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Daniels:1999:IHA, author = "Thomas E. Daniels and Eugene H. Spafford", title = "Identification of host audit data to detect attacks on low-level {IP} vulnerabilities", journal = j-J-COMP-SECUR, volume = "7", number = "1", pages = "3--35", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-7102", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Vigna:1999:NNB, author = "Giovanni Vigna and Richard A. Kemmerer", title = "{NetSTAT}: A network-based intrusion detection system", journal = j-J-COMP-SECUR, volume = "7", number = "1", pages = "37--71", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-7103", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Blundo:1999:NRD, author = "Carlo Blundo and Barbara Masucci", title = "A note on the randomness in dynamic threshold schemes", journal = j-J-COMP-SECUR, volume = "7", number = "1", pages = "73--85", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-7104", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Foley:1999:GEP, author = "Simon N. Foley", title = "Guest editor's preface", journal = j-J-COMP-SECUR, volume = "7", number = "2--3", pages = "87--87", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-72-301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:19 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lowe:1999:TCR, author = "Gavin Lowe", title = "Towards a completeness result for model checking of security protocols", journal = j-J-COMP-SECUR, volume = "7", number = "2--3", pages = "89--146", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-72-302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:19 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Roscoe:1999:PSP, author = "A. W. Roscoe and P. J. Broadfoot", title = "Proving security protocols with model checkers by data independence techniques", journal = j-J-COMP-SECUR, volume = "7", number = "2--3", pages = "147--190", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-72-303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:19 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Fabrega:1999:SSP, author = "F. Javier Thayer F{\'a}brega and Jonathan C. Herzog and Joshua D. Guttman", title = "Strand spaces: proving security protocols correct", journal = j-J-COMP-SECUR, volume = "7", number = "2--3", pages = "191--230", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-72-304", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:19 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Volpano:1999:PNC, author = "Dennis Volpano and Geoffrey Smith", title = "Probabilistic noninterference in a concurrent language", journal = j-J-COMP-SECUR, volume = "7", number = "2--3", pages = "231--253", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-72-305", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:19 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lin:1999:GEP, author = "T. Y. Lin", title = "Guest editor's preface", journal = j-J-COMP-SECUR, volume = "7", number = "4", pages = "255--255", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-7401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bertino:1999:SOD, author = "Elisa Bertino and Elena Ferrari", title = "Secure object deletion and garbage collection in multilevel object bases", journal = j-J-COMP-SECUR, volume = "7", number = "4", pages = "257--285", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-7402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gudes:1999:MSI, author = "Ehud Gudes and Martin S. Olivier and Reind P. van de Riet", title = "Modelling, specifying and implementing workflow security in {Cyberspace}", journal = j-J-COMP-SECUR, volume = "7", number = "4", pages = "287--315", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-7403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sandhu:1999:RBA, author = "Ravi Sandhu and Venkata Bhamidipati", title = "Role-based administration of user-role assignment: The {URA97} model and its {Oracle} implementation", journal = j-J-COMP-SECUR, volume = "7", number = "4", pages = "317--342", month = "????", year = "1999", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1999-7404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lin:2000:GEP, author = "T. Y. Lin", title = "Guest editor's preface", journal = j-J-COMP-SECUR, volume = "8", number = "1", pages = "1--1", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-8101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:27 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Atluri:2000:SBE, author = "Vijayalakshmi Atluri and Wei-Kuang Huang and Elisa Bertino", title = "A semantic-based execution model for multilevel secure workflows", journal = j-J-COMP-SECUR, volume = "8", number = "1", pages = "3--41", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-8102", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:27 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hale:2000:TBA, author = "John Hale and Jody Threet and Sujeet Shenoi", title = "A ticket-based access control architecture for object systems", journal = j-J-COMP-SECUR, volume = "8", number = "1", pages = "43--65", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-8103", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:27 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Spalka:2000:SNS, author = "Adrian Spalka and Armin B. Cremers", title = "Structured name-spaces in secure databases", journal = j-J-COMP-SECUR, volume = "8", number = "1", pages = "67--86", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-8104", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:27 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Deswarte:2000:GEP, author = "Yves Deswarte and Catherine Meadows", title = "Guest editors' preface", journal = j-J-COMP-SECUR, volume = "8", number = "2--3", pages = "87--87", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-82-301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Karjoth:2000:ACS, author = "G{\"u}nter Karjoth", title = "Authorization in {CORBA} Security", journal = j-J-COMP-SECUR, volume = "8", number = "2--3", pages = "89--108", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-82-302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bertino:2000:LBA, author = "Elisa Bertino and Francesco Buccafurri and Elena Ferrari and Pasquale Rullo", title = "A logic-based approach for enforcing access control", journal = j-J-COMP-SECUR, volume = "8", number = "2--3", pages = "109--139", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-82-303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kelsey:2000:SCC, author = "John Kelsey and Bruce Schneier and David Wagner and Chris Hall", title = "Side channel cryptanalysis of product ciphers", journal = j-J-COMP-SECUR, volume = "8", number = "2--3", pages = "141--158", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-82-304", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Wespi:2000:FVV, author = "Andreas Wespi and Herv{\'e} Debar and Marc Dacier and Mehdi Nassehi", title = "Fixed- vs. variable-length patterns for detecting suspicious process behavior", journal = j-J-COMP-SECUR, volume = "8", number = "2--3", pages = "159--181", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-82-305", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Horn:2000:APF, author = "G{\"u}nther Horn and Bart Preneel", title = "Authentication and payment in future mobile systems", journal = j-J-COMP-SECUR, volume = "8", number = "2--3", pages = "183--207", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-82-306", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Atluri:2000:PNB, author = "Vijayalakshmi Atluri and Wei-Kuang Huang", title = "A {Petri} net based safety analysis of workflow authorization models", journal = j-J-COMP-SECUR, volume = "8", number = "2--3", pages = "209--240", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-82-307", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Atluri:2000:GEP, author = "Vijay Atluri and John Hale", title = "{Guest Editor}'s preface", journal = j-J-COMP-SECUR, volume = "8", number = "4", pages = "241--242", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-8401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Liu:2000:ICI, author = "Peng Liu and Sushil Jajodia and Catherine D. McCollum", title = "Intrusion confinement by isolation in information systems", journal = j-J-COMP-SECUR, volume = "8", number = "4", pages = "243--279", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-8402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Clifton:2000:USS, author = "Chris Clifton", title = "Using sample size to limit exposure to data mining", journal = j-J-COMP-SECUR, volume = "8", number = "4", pages = "281--307", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-8403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bertino:2000:TAB, author = "Elisa Bertino and Piero Andrea Bonatti and Elena Ferrari and Maria Luisa Sapino", title = "Temporal authorization bases: From specification to integration", journal = j-J-COMP-SECUR, volume = "8", number = "4", pages = "309--353", month = "????", year = "2000", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2000-8404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Syverson:2001:GEP, author = "Paul F. Syverson", title = "{Guest Editor}'s preface", journal = j-J-COMP-SECUR, volume = "9", number = "1--2", pages = "1--2", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-91-201", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hui:2001:FPS, author = "Mei Lin Hui and Gavin Lowe", title = "Fault-preserving simplifying transformations for security protocols", journal = j-J-COMP-SECUR, volume = "9", number = "1--2", pages = "3--46", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-91-202", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Song:2001:ANA, author = "Dawn Xiaodong Song and Sergey Berezin and Adrian Perrig", title = "{Athena}: a novel approach to efficient automatic security protocol analysis", journal = j-J-COMP-SECUR, volume = "9", number = "1--2", pages = "47--74", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-91-203", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ryan:2001:PAN, author = "P. Y. A. Ryan and S. A. Schneider", title = "Process algebra and non-interference", journal = j-J-COMP-SECUR, volume = "9", number = "1--2", pages = "75--103", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-91-204", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Halpern:2001:LSL, author = "Joseph Y. Halpern and Ron van der Meyden", title = "A logic for {SDSI}'s linked local name spaces", journal = j-J-COMP-SECUR, volume = "9", number = "1--2", pages = "105--142", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-91-205", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Meadows:2001:CBF, author = "Catherine Meadows", title = "A cost-based framework for analysis of denial of service in networks", journal = j-J-COMP-SECUR, volume = "9", number = "1--2", pages = "143--164", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-91-206", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jajodia:2001:MST, author = "Sushil Jajodia and Vijayalakshmi Atluri and Thomas F. Keefe and Catherine D. McCollum and Ravi Mukkamala", title = "Multilevel secure transaction processing", journal = j-J-COMP-SECUR, volume = "9", number = "3", pages = "165--195", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-9301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:43 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Paulson:2001:RBS, author = "Lawrence C. Paulson", title = "Relations between secrets: two formal analyses of the {Yahalom} protocol", journal = j-J-COMP-SECUR, volume = "9", number = "3", pages = "197--216", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-9302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:43 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Besson:2001:MCS, author = "Fr{\'e}d{\'e}ric Besson and Thomas Jensen and Daniel {Le M{\'e}tayer} and Tommy Thorn", title = "Model checking security properties of control flow graphs", journal = j-J-COMP-SECUR, volume = "9", number = "3", pages = "217--250", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-9303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:43 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DeCapitanidiVimercati:2001:GIP, author = "Sabrina {De Capitani di Vimercati} and Patrick Lincoln and Livio Ricciulli and Pierangela Samarati", title = "Global infrastructure protection system", journal = j-J-COMP-SECUR, volume = "9", number = "4", pages = "251--283", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-9401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:46 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Clarke:2001:CCD, author = "Dwaine Clarke and Jean-Emile Elien and Carl Ellison and Matt Fredette and Alexander Morcos and Ronald L. Rivest", title = "Certificate chain discovery in {SPKI\slash SDSI}", journal = j-J-COMP-SECUR, volume = "9", number = "4", pages = "285--322", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-9402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:46 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Wright:2001:DGM, author = "Rebecca N. Wright and Patrick D. Lincoln and Jonathan K. Millen", title = "Depender graphs: A method of fault-tolerant certificate distribution", journal = j-J-COMP-SECUR, volume = "9", number = "4", pages = "323--338", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-9403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:46 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2001:AIV, author = "Anonymous", title = "Author Index Volume 9 (2001)", journal = j-J-COMP-SECUR, volume = "9", number = "4", pages = "339--340", month = "????", year = "2001", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2001-9404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:46 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Frincke:2002:GEP, author = "Deborah Frincke", title = "{Guest Editor}'s preface", journal = j-J-COMP-SECUR, volume = "10", number = "1--2", pages = "1--3", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-101-201", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lee:2002:TCS, author = "Wenke Lee and Wei Fan and Matthew Miller and Salvatore J. Stolfo and Erez Zadok", title = "Toward cost-sensitive modeling for intrusion detection and response", journal = j-J-COMP-SECUR, volume = "10", number = "1--2", pages = "5--22", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-101-202", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kerschbaum:2002:UIS, author = "Florian Kerschbaum and Eugene H. Spafford and Diego Zamboni", title = "Using internal sensors and embedded detectors for intrusion detection", journal = j-J-COMP-SECUR, volume = "10", number = "1--2", pages = "23--70", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-101-203", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Eckmann:2002:SAL, author = "Steven T. Eckmann and Giovanni Vigna and Richard A. Kemmerer", title = "{STATL}: An attack language for state-based intrusion detection", journal = j-J-COMP-SECUR, volume = "10", number = "1--2", pages = "71--103", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-101-204", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Staniford:2002:PAD, author = "Stuart Staniford and James A. Hoagland and Joseph M. McAlerney", title = "Practical automated detection of stealthy portscans", journal = j-J-COMP-SECUR, volume = "10", number = "1--2", pages = "105--136", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-101-205", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Li:2002:EPA, author = "Yingjiu Li and Ningning Wu and X. Sean Wang and Sushil Jajodia", title = "Enhancing profiles for anomaly detection using time granularities", journal = j-J-COMP-SECUR, volume = "10", number = "1--2", pages = "137--157", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-101-206", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Spinellis:2002:PID, author = "Diomidis Spinellis and Dimitris Gritzalis", title = "Panoptis: Intrusion detection using a domain-specific language", journal = j-J-COMP-SECUR, volume = "10", number = "1--2", pages = "159--176", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-101-207", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yasinsac:2002:ESP, author = "Alec Yasinsac", title = "An environment for security protocol intrusion detection", journal = j-J-COMP-SECUR, volume = "10", number = "1--2", pages = "177--188", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-101-208", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ramakrishnan:2002:MBA, author = "C. R. Ramakrishnan and R. Sekar", title = "Model-based analysis of configuration vulnerabilities", journal = j-J-COMP-SECUR, volume = "10", number = "1--2", pages = "189--209", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-101-209", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:49 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jajodia:2002:GEP, author = "Sushil Jajodia and Dimitris Gritzalis", title = "{Guest Editor}s' preface", journal = j-J-COMP-SECUR, volume = "10", number = "3", pages = "211--211", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-10301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Levine:2002:HMB, author = "Brian Neil Levine and Clay Shields", title = "Hordes: a multicast based protocol for anonymity", journal = j-J-COMP-SECUR, volume = "10", number = "3", pages = "213--240", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-10302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bonatti:2002:UFR, author = "Piero A. Bonatti and Pierangela Samarati", title = "A uniform framework for regulating service access and information release on the {Web}", journal = j-J-COMP-SECUR, volume = "10", number = "3", pages = "241--271", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-10303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Buldas:2002:ECA, author = "Ahto Buldas and Peeter Laud and Helger Lipmaa", title = "Eliminating counterevidence with applications to accountable certificate management", journal = j-J-COMP-SECUR, volume = "10", number = "3", pages = "273--296", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-10304", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Wright:2002:DGM, author = "Rebecca N. Wright and Patrick D. Lincoln and Jonathan K. Millen", title = "Depender graphs: A method of fault-tolerant certificate distribution", journal = j-J-COMP-SECUR, volume = "10", number = "3", pages = "297--297", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-10305", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cuppens:2002:GEP, author = "Fr{\'e}d{\'e}ric Cuppens", title = "{Guest Editor}'s preface", journal = j-J-COMP-SECUR, volume = "10", number = "4", pages = "299--300", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-10401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:58 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Brose:2002:MAC, author = "Gerald Brose", title = "Manageable access control for {CORBA}", journal = j-J-COMP-SECUR, volume = "10", number = "4", pages = "301--337", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-10402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:58 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Schellhorn:2002:VFS, author = "Gerhard Schellhorn and Wolfgang Reif and Axel Schairer and Paul Karger and Vernon Austel and David Toll", title = "Verified formal security models for multiapplicative smart cards", journal = j-J-COMP-SECUR, volume = "10", number = "4", pages = "339--367", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-10403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:58 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bieber:2002:CSI, author = "P. Bieber and J. Cazin and P. Girard and J.-L. Lanet and V. Wiels and G. Zanon", title = "Checking secure interactions of smart card applets: extended version", journal = j-J-COMP-SECUR, volume = "10", number = "4", pages = "369--398", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-10404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:58 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Welch:2002:URM, author = "Ian Welch and Robert J. Stroud", title = "Using reflection as a mechanism for enforcing security policies on compiled code", journal = j-J-COMP-SECUR, volume = "10", number = "4", pages = "399--432", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-10405", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:58 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2002:AIV, author = "Anonymous", title = "Author Index Volume 10 (2002)", journal = j-J-COMP-SECUR, volume = "10", number = "4", pages = "433--434", month = "????", year = "2002", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2002-10406", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:21:58 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Iheagwara:2003:CEE, author = "Charles Iheagwara and Andrew Blyth and Mukesh Singhal", title = "A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment", journal = j-J-COMP-SECUR, volume = "11", number = "1", pages = "1--33", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:02 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Li:2003:DCC, author = "Ninghui Li and William H. Winsborough and John C. Mitchell", title = "Distributed credential chain discovery in trust management", journal = j-J-COMP-SECUR, volume = "11", number = "1", pages = "35--86", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11102", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:02 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bella:2003:IVS, author = "Giampaolo Bella", title = "Inductive verification of smart card protocols", journal = j-J-COMP-SECUR, volume = "11", number = "1", pages = "87--132", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11103", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:02 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Syverson:2003:GEP, author = "Paul F. Syverson", title = "{Guest Editor}'s preface", journal = j-J-COMP-SECUR, volume = "11", number = "2", pages = "133--133", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11201", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:06 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sewell:2003:SCU, author = "Peter Sewell and Jan Vitek", title = "Secure composition of untrusted code: box $ \pi $, wrappers, and causality types", journal = j-J-COMP-SECUR, volume = "11", number = "2", pages = "135--187", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11202", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:06 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cohen:2003:FOV, author = "Ernie Cohen", title = "First-order verification of cryptographic protocols", journal = j-J-COMP-SECUR, volume = "11", number = "2", pages = "189--216", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11203", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:06 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Heather:2003:HPT, author = "James Heather and Gavin Lowe and Steve Schneider", title = "How to prevent type flaw attacks on security protocols", journal = j-J-COMP-SECUR, volume = "11", number = "2", pages = "217--244", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11204", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:06 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kakkar:2003:RAS, author = "Pankaj Kakkar and Carl A. Gunter and Mart{\'\i}n Abadi", title = "Reasoning about secrecy for active networks", journal = j-J-COMP-SECUR, volume = "11", number = "2", pages = "245--287", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11205", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:06 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Thuraisingham:2003:GEP, author = "Bhavani Thuraisingham and Reind van de Riet", title = "{Guest Editor}s' preface", journal = j-J-COMP-SECUR, volume = "11", number = "3", pages = "289--289", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Devanbu:2003:ADP, author = "Premkumar Devanbu and Michael Gertz and Charles Martel and Stuart G. Stubblebine", title = "Authentic data publication over the {Internet}", journal = j-J-COMP-SECUR, volume = "11", number = "3", pages = "291--314", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Barbara:2003:CBC, author = "Daniel Barbar{\'a} and Rajni Goel and Sushil Jajodia", title = "A checksum-based corruption detection technique", journal = j-J-COMP-SECUR, volume = "11", number = "3", pages = "315--329", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hale:2003:PAC, author = "John Hale and Mauricio Papa and Sujeet Shenoi", title = "Programmable access control", journal = j-J-COMP-SECUR, volume = "11", number = "3", pages = "331--351", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11304", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Teepe:2003:WAS, author = "Wouter Teepe and Reind van de Riet and Martin Olivier", title = "{WorkFlow} analyzed for security and privacy in using databases", journal = j-J-COMP-SECUR, volume = "11", number = "3", pages = "353--363", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11305", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Altenschmidt:2003:SMR, author = "C. Altenschmidt and J. Biskup and U. Flegel and Y. Karabulut", title = "Secure mediation: requirements, design, and architecture", journal = j-J-COMP-SECUR, volume = "11", number = "3", pages = "365--398", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11306", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kremer:2003:GBV, author = "Steve Kremer and Jean-Fran{\c{c}}ois Raskin", title = "A game-based verification of non-repudiation and fair exchange protocols", journal = j-J-COMP-SECUR, volume = "11", number = "3", pages = "399--429", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11307", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Campbell:2003:ECP, author = "Katherine Campbell and Lawrence A. Gordon and Martin P. Loeb and Lei Zhou", title = "The economic cost of publicly announced information security breaches: empirical evidence from the stock market", journal = j-J-COMP-SECUR, volume = "11", number = "3", pages = "431--448", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11308", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Schneider:2003:GEP, author = "Steve Schneider", title = "{Guest Editor}'s preface", journal = j-J-COMP-SECUR, volume = "11", number = "4", pages = "449--450", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:14 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gordon:2003:ATS, author = "Andrew D. Gordon and Alan Jeffrey", title = "Authenticity by typing for security protocols", journal = j-J-COMP-SECUR, volume = "11", number = "4", pages = "451--519", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:14 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sumii:2003:LRE, author = "Eijiro Sumii and Benjamin C. Pierce", title = "Logical relations for encryption", journal = j-J-COMP-SECUR, volume = "11", number = "4", pages = "521--554", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:14 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Pereira:2003:SAU, author = "Olivier Pereira and Jean-Jacques Quisquater", title = "Some attacks upon authenticated group key agreement protocols", journal = j-J-COMP-SECUR, volume = "11", number = "4", pages = "555--580", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:14 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Halpern:2003:LRS, author = "Joseph Y. Halpern and Ron van der Meyden", title = "A logical reconstruction of {SPKI}", journal = j-J-COMP-SECUR, volume = "11", number = "4", pages = "581--613", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11405", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:14 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Mantel:2003:UAS, author = "Heiko Mantel and Andrei Sabelfeld", title = "A unifying approach to the security of distributed and multi-threaded programs", journal = j-J-COMP-SECUR, volume = "11", number = "4", pages = "615--676", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11406", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:14 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib; https://www.math.utah.edu/pub/tex/bib/multithreading.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Durgin:2003:CLP, author = "Nancy Durgin and John Mitchell and Dusko Pavlovic", title = "A compositional logic for proving security properties of protocols", journal = j-J-COMP-SECUR, volume = "11", number = "4", pages = "677--721", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11407", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:14 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2003:AIV, author = "Anonymous", title = "Author Index Volume 11 (2003)", journal = j-J-COMP-SECUR, volume = "11", number = "4", pages = "723--725", month = "????", year = "2003", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2003-11408", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:14 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Guttman:2004:GEP, author = "Joshua Guttman", title = "{Guest Editor}'s preface", journal = j-J-COMP-SECUR, volume = "12", number = "1", pages = "1--1", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:19 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hughes:2004:IHA, author = "Dominic Hughes and Vitaly Shmatikov", title = "Information hiding, anonymity and privacy: a modular approach", journal = j-J-COMP-SECUR, volume = "12", number = "1", pages = "3--36", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12102", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:19 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DiPierro:2004:ANI, author = "Alessandra {Di Pierro} and Chris Hankin and Herbert Wiklicky", title = "Approximate non-interference", journal = j-J-COMP-SECUR, volume = "12", number = "1", pages = "37--81", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12103", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:19 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lowe:2004:APS, author = "Gavin Lowe", title = "Analysing protocols subject to guessing attacks", journal = j-J-COMP-SECUR, volume = "12", number = "1", pages = "83--97", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12104", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:19 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Micciancio:2004:CTA, author = "Daniele Micciancio and Bogdan Warinschi", title = "Completeness theorems for the {Abadi--Rogaway} language of encrypted expressions", journal = j-J-COMP-SECUR, volume = "12", number = "1", pages = "99--129", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12105", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:19 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib; https://www.math.utah.edu/pub/tex/bib/sgml2000.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chander:2004:RTM, author = "Ajay Chander and Drew Dean and John C. Mitchell", title = "Reconstructing trust management", journal = j-J-COMP-SECUR, volume = "12", number = "1", pages = "131--164", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12106", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:19 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ourston:2004:CIA, author = "Dirk Ourston and Sara Matzner and William Stump and Bryan Hopkins", title = "Coordinated {Internet} attacks: responding to attack complexity", journal = j-J-COMP-SECUR, volume = "12", number = "2", pages = "165--190", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12201", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Aldini:2004:PAA, author = "Alessandro Aldini and Mario Bravetti and Roberto Gorrieri", title = "A process-algebraic approach for the analysis of probabilistic noninterference", journal = j-J-COMP-SECUR, volume = "12", number = "2", pages = "191--245", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12202", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Durgin:2004:MRC, author = "Nancy Durgin and Patrick Lincoln and John Mitchell and Andre Scedrov", title = "Multiset rewriting and the complexity of bounded security protocols", journal = j-J-COMP-SECUR, volume = "12", number = "2", pages = "247--311", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12203", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Schneider:2004:GEP, author = "Steve Schneider", title = "{Guest Editor}'s preface", journal = j-J-COMP-SECUR, volume = "12", number = "3--4", pages = "313--315", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-123-401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jha:2004:MCS, author = "S. Jha and T. Reps", title = "Model checking {SPKI\slash SDSI}", journal = j-J-COMP-SECUR, volume = "12", number = "3--4", pages = "317--353", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-123-402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Shmatikov:2004:PAA, author = "Vitaly Shmatikov", title = "Probabilistic analysis of an anonymity system", journal = j-J-COMP-SECUR, volume = "12", number = "3--4", pages = "355--377", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-123-403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Broadfoot:2004:EAW, author = "P. J. Broadfoot and A. W. Roscoe", title = "Embedding agents within the intruder to detect parallel attacks", journal = j-J-COMP-SECUR, volume = "12", number = "3--4", pages = "379--408", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-123-404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Guttman:2004:ATD, author = "Joshua D. Guttman", title = "Authentication tests and disjoint encryption: A design method for security protocols", journal = j-J-COMP-SECUR, volume = "12", number = "3--4", pages = "409--433", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-123-405", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gordon:2004:TEA, author = "Andrew D. Gordon and Alan Jeffrey", title = "Types and effects for asymmetric cryptographic protocols", journal = j-J-COMP-SECUR, volume = "12", number = "3--4", pages = "435--483", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-123-406", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Duggan:2004:TBC, author = "Dominic Duggan", title = "Type-based cryptographic operations", journal = j-J-COMP-SECUR, volume = "12", number = "3--4", pages = "485--550", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-123-407", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Buttyan:2004:FMR, author = "Levente Butty{\'a}n and Jean-Pierre Hubaux and Srdjan {\v{C}}apkun", title = "A formal model of rational exchange and its application to the analysis of {Syverson}'s protocol", journal = j-J-COMP-SECUR, volume = "12", number = "3--4", pages = "551--587", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-123-408", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Backes:2004:PL, author = "Michael Backes and Birgit Pfitzmann and Michael Waidner and Michael Steiner", title = "Polynomial liveness", journal = j-J-COMP-SECUR, volume = "12", number = "3--4", pages = "589--617", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-123-409", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lowe:2004:DIF, author = "Gavin Lowe", title = "Defining information flow quantity", journal = j-J-COMP-SECUR, volume = "12", number = "3--4", pages = "619--653", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-123-410", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Wang:2004:CBI, author = "Lingyu Wang and Duminda Wijesekera and Sushil Jajodia", title = "Cardinality-based inference control in data cubes", journal = j-J-COMP-SECUR, volume = "12", number = "5", pages = "655--692", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12501", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DiPietro:2004:KMH, author = "Roberto {Di Pietro} and Luigi V. Mancini and Alessandro Mei", title = "Key management for high bandwidth secure multicast", journal = j-J-COMP-SECUR, volume = "12", number = "5", pages = "693--709", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12502", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cho:2004:GKR, author = "Taenam Cho and Sang-Ho Lee and Won Kim", title = "A group key recovery mechanism based on logical key hierarchy", journal = j-J-COMP-SECUR, volume = "12", number = "5", pages = "711--736", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12503", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zhang:2004:RAR, author = "Jian Zhang and Jian Gong and Yong Ding", title = "Research on automated rollbackability of intrusion response", journal = j-J-COMP-SECUR, volume = "12", number = "5", pages = "737--751", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12504", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Buchholz:2004:PPO, author = "Florian P. Buchholz and Clay Shields", title = "Providing process origin information to aid in computer forensic investigations", journal = j-J-COMP-SECUR, volume = "12", number = "5", pages = "753--776", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12505", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Iheagwara:2004:CEM, author = "Charles Iheagwara and Andrew Blyth and Mukesh Singhal", title = "Cost effective management frameworks for intrusion detection systems", journal = j-J-COMP-SECUR, volume = "12", number = "5", pages = "777--798", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12506", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Atluri:2004:CWS, author = "Vijayalakshmi Atluri and Soon Ae Chun and Pietro Mazzoleni", title = "{Chinese} wall security for decentralized workflow management systems", journal = j-J-COMP-SECUR, volume = "12", number = "6", pages = "799--840", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12601", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Devanbu:2004:FAX, author = "Premkumar Devanbu and Michael Gertz and April Kwong and Charles Martel and Glen Nuckolls and Stuart G. Stubblebine", title = "Flexible authentication of {XML} documents", journal = j-J-COMP-SECUR, volume = "12", number = "6", pages = "841--864", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12602", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Guttman:2004:FAP, author = "Joshua D. Guttman and F. Javier Thayer and Lenore D. Zuck", title = "The faithfulness of abstract protocol analysis: Message authentication", journal = j-J-COMP-SECUR, volume = "12", number = "6", pages = "865--891", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12603", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Meadows:2004:FSA, author = "Catherine Meadows and Paul Syverson and Iliano Cervesato", title = "Formal specification and analysis of the {Group Domain of Interpretation Protocol} using {NPATRL} and the {NRL Protocol Analyzer}", journal = j-J-COMP-SECUR, volume = "12", number = "6", pages = "893--931", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12604", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2004:AIV, author = "Anonymous", title = "Author Index Volume 12 (2004)", journal = j-J-COMP-SECUR, volume = "12", number = "6", pages = "933--935", month = "????", year = "2004", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2004-12605", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gorrieri:2005:GEP, author = "Roberto Gorrieri", title = "{Guest Editor}'s preface", journal = j-J-COMP-SECUR, volume = "13", number = "1", pages = "1--2", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bistarelli:2005:RMR, author = "Stefano Bistarelli and Iliano Cervesato and Gabriele Lenzini and Fabio Martinelli", title = "Relating multiset rewriting and process algebras for security protocol analysis", journal = j-J-COMP-SECUR, volume = "13", number = "1", pages = "3--47", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13102", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bodei:2005:CSP, author = "Chiara Bodei and Pierpaolo Degano and Corrado Priami", title = "Checking security policies through an enhanced {Control Flow Analysis}", journal = j-J-COMP-SECUR, volume = "13", number = "1", pages = "49--85", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13103", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bugliesi:2005:NIP, author = "Michele Bugliesi and Sabina Rossi", title = "Non-interference proof techniques for the analysis of cryptographic protocols", journal = j-J-COMP-SECUR, volume = "13", number = "1", pages = "87--113", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13104", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Guttman:2005:VIF, author = "Joshua D. Guttman and Amy L. Herzog and John D. Ramsdell and Clement W. Skorupka", title = "Verifying information flow goals in {Security-Enhanced Linux}", journal = j-J-COMP-SECUR, volume = "13", number = "1", pages = "115--134", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13105", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib; https://www.math.utah.edu/pub/tex/bib/linux.bib; https://www.math.utah.edu/pub/tex/bib/unix.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ramanujam:2005:DCE, author = "R. Ramanujam and S. P. Suresh", title = "Decidability of context-explicit security protocols", journal = j-J-COMP-SECUR, volume = "13", number = "1", pages = "135--165", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13106", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Shmatikov:2005:RBT, author = "Vitaly Shmatikov and Carolyn Talcott", title = "Reputation-based trust management", journal = j-J-COMP-SECUR, volume = "13", number = "1", pages = "167--190", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13107", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:39 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bertino:2005:ACU, author = "E. Bertino and E. Ferrari and G. Mella", title = "An approach to cooperative updates of {XML} documents in distributed systems", journal = j-J-COMP-SECUR, volume = "13", number = "2", pages = "191--242", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13201", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:44 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zuquete:2005:EHQ, author = "Andr{\'e} Z{\'u}quete", title = "An efficient high quality random number generator for multi-programmed systems", journal = j-J-COMP-SECUR, volume = "13", number = "2", pages = "243--263", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13202", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:44 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", URL = "http://dl.acm.org/citation.cfm?id=1077819.1077821", acknowledgement = ack-nhfb, acmid = "1077821", fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", keywords = "operating systems; Pentium processors; random number generators; time samples", pagecount = "21", } @Article{Cervesato:2005:CBS, author = "Iliano Cervesato and Nancy A. Durgin and Patrick D. Lincoln and John C. Mitchell and Andre Scedrov", title = "A comparison between strand spaces and multiset rewriting for security protocol analysis", journal = j-J-COMP-SECUR, volume = "13", number = "2", pages = "265--316", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13203", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:44 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Heather:2005:DPE, author = "James Heather and Steve Schneider", title = "A decision procedure for the existence of a rank function", journal = j-J-COMP-SECUR, volume = "13", number = "2", pages = "317--344", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13204", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:44 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Focardi:2005:GEP, author = "Riccardo Focardi", title = "{Guest Editor}'s preface", journal = j-J-COMP-SECUR, volume = "13", number = "3", pages = "345--345", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:47 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bodei:2005:SVS, author = "Chiara Bodei and Mikael Buchholtz and Pierpaolo Degano and Flemming Nielson and Hanne Riis Nielson", title = "Static validation of security protocols", journal = j-J-COMP-SECUR, volume = "13", number = "3", pages = "347--390", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:47 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bossi:2005:IFS, author = "Annalisa Bossi and Damiano Macedonio and Carla Piazza and Sabina Rossi", title = "Information flow in secure contexts", journal = j-J-COMP-SECUR, volume = "13", number = "3", pages = "391--422", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:47 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Datta:2005:DSC, author = "Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic", title = "A derivation system and compositional logic for security protocols", journal = j-J-COMP-SECUR, volume = "13", number = "3", pages = "423--482", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13304", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:47 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Halpern:2005:AIH, author = "Joseph Y. Halpern and Kevin R. O'Neill", title = "Anonymity and information hiding in multiagent systems", journal = j-J-COMP-SECUR, volume = "13", number = "3", pages = "483--514", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13305", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:47 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Millen:2005:SPAa, author = "Jonathan Millen and Vitaly Shmatikov", title = "Symbolic protocol analysis with an {Abelian} group operator or {Diffie--Hellman} exponentiation", journal = j-J-COMP-SECUR, volume = "13", number = "3", pages = "515--564", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13306", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:47 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Warinschi:2005:CAN, author = "Bogdan Warinschi", title = "A computational analysis of the {Needham--Schroeder--(Lowe)} protocol", journal = j-J-COMP-SECUR, volume = "13", number = "3", pages = "565--591", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13307", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:47 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Vaidya:2005:SSI, author = "Jaideep Vaidya and Chris Clifton", title = "Secure set intersection cardinality with application to association rule mining", journal = j-J-COMP-SECUR, volume = "13", number = "4", pages = "593--622", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yu:2005:SUI, author = "Meng Yu and Peng Liu and Wanyu Zang", title = "Specifying and using intrusion masking models to process distributed operations", journal = j-J-COMP-SECUR, volume = "13", number = "4", pages = "623--658", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Stolfo:2005:CET, author = "Salvatore J. Stolfo and Frank Apap and Eleazar Eskin and Katherine Heller and Shlomo Hershkop and Andrew Honig and Krysta Svore", title = "A comparative evaluation of two algorithms for {Windows Registry Anomaly Detection}", journal = j-J-COMP-SECUR, volume = "13", number = "4", pages = "659--693", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Millen:2005:SPAb, author = "Jonathan Millen and Vitaly Shmatikov", title = "Symbolic protocol analysis with an {Abelian} group operator or {Diffie--Hellman} exponentiation", journal = j-J-COMP-SECUR, volume = "13", number = "4", pages = "695--695", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bella:2005:GEP, author = "Giampaolo Bella and Peter Ryan", title = "{Guest Editors}' preface", journal = j-J-COMP-SECUR, volume = "13", number = "5", pages = "697--697", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13501", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:56 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bistarelli:2005:SCB, author = "Stefano Bistarelli and Simon N. Foley and Barry O'Sullivan", title = "A soft constraint-based approach to the cascade vulnerability problem", journal = j-J-COMP-SECUR, volume = "13", number = "5", pages = "699--720", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13502", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:56 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Collberg:2005:SWF, author = "Christian Collberg and Tapas Ranjan Sahoo", title = "Software watermarking in the frequency domain: Implementation, analysis, and attacks", journal = j-J-COMP-SECUR, volume = "13", number = "5", pages = "721--755", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13503", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:56 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Nenadic:2005:RBV, author = "Aleksandra Nenadi{\'c} and Ning Zhang and Qi Shi", title = "{RSA-based Verifiable and Recoverable Encryption of Signatures} and its application in certified e-mail delivery", journal = j-J-COMP-SECUR, volume = "13", number = "5", pages = "757--777", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13504", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:56 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Siaterlis:2005:OSA, author = "Christos Siaterlis and Vasilis Maglaris", title = "One step ahead to multisensor data fusion for {DDoS} detection", journal = j-J-COMP-SECUR, volume = "13", number = "5", pages = "779--806", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13505", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:22:56 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Molsa:2005:MDS, author = "Jarmo M{\"o}ls{\"a}", title = "Mitigating denial of service attacks: A tutorial", journal = j-J-COMP-SECUR, volume = "13", number = "6", pages = "807--837", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13601", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:00 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sherwood:2005:PPS, author = "Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan", title = "{P5}: A protocol for scalable anonymous communication", journal = j-J-COMP-SECUR, volume = "13", number = "6", pages = "839--876", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13602", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:00 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Pescape:2005:EAA, author = "Antonio Pescap{\`e} and Giorgio Ventre", title = "Experimental analysis of attacks against intradomain routing protocols", journal = j-J-COMP-SECUR, volume = "13", number = "6", pages = "877--903", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13603", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:00 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2005:AIV, author = "Anonymous", title = "Author Index Volume 13 (2005)", journal = j-J-COMP-SECUR, volume = "13", number = "6", pages = "905--907", month = "????", year = "2005", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2005-13604", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:00 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cortier:2006:SAP, author = "V{\'e}ronique Cortier and St{\'e}phanie Delaune and Pascal Lafourcade", title = "A survey of algebraic properties used in cryptographic protocols", journal = j-J-COMP-SECUR, volume = "14", number = "1", pages = "1--43", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:04 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cimato:2006:UMU, author = "Stelvio Cimato and Antonella Cresti and Paolo D'Arco", title = "A unified model for unconditionally secure key distribution", journal = j-J-COMP-SECUR, volume = "14", number = "1", pages = "45--64", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14102", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:04 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Focardi:2006:IFS, author = "Riccardo Focardi and Sabina Rossi", title = "Information flow security in dynamic contexts", journal = j-J-COMP-SECUR, volume = "14", number = "1", pages = "65--110", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14103", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:04 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Focardi:2006:P, author = "Riccardo Focardi", title = "Preface", journal = j-J-COMP-SECUR, volume = "14", number = "2", pages = "111--111", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14201", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:08 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Braghin:2006:RBA, author = "Chiara Braghin and Daniele Gorla and Vladimiro Sassone", title = "Role-based access control for a distributed calculus", journal = j-J-COMP-SECUR, volume = "14", number = "2", pages = "113--155", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14202", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:08 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Myers:2006:ERD, author = "Andrew C. Myers and Andrei Sabelfeld and Steve Zdancewic", title = "Enforcing Robust Declassification and Qualified Robustness", journal = j-J-COMP-SECUR, volume = "14", number = "2", pages = "157--196", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14203", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:08 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Pereira:2006:IBS, author = "Olivier Pereira and Jean-Jacques Quisquater", title = "On the impossibility of building secure {Cliques}-type authenticated group key agreement protocols", journal = j-J-COMP-SECUR, volume = "14", number = "2", pages = "197--246", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14204", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:08 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Goto:2006:P, author = "Atsuhiro Goto", title = "Preface", journal = j-J-COMP-SECUR, volume = "14", number = "3", pages = "247--247", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:11 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Candebat:2006:SPM, author = "Thibault Candebat and David Gray", title = "Secure pseudonym management using mediated identity-based encryption", journal = j-J-COMP-SECUR, volume = "14", number = "3", pages = "249--267", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:11 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bhargav-Spantzel:2006:EPD, author = "Abhilasha Bhargav-Spantzel and Anna C. Squicciarini and Elisa Bertino", title = "Establishing and protecting digital identity in federation systems", journal = j-J-COMP-SECUR, volume = "14", number = "3", pages = "269--300", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:11 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zhu:2006:GEG, author = "Sencun Zhu and Sanjeev Setia and Shouhuai Xu and Sushil Jajodia", title = "{GKMPAN}: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks", journal = j-J-COMP-SECUR, volume = "14", number = "4", pages = "301--325", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Eamani:2006:LBP, author = "Arun K. Eamani and A. Prasad Sistla", title = "Language based policy analysis in a {SPKI} Trust Management System", journal = j-J-COMP-SECUR, volume = "14", number = "4", pages = "327--357", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Xia:2006:EWD, author = "Jianhong Xia and Sarma Vangala and Jiang Wu and Lixin Gao and Kevin Kwiat", title = "Effective worm detection for various scan techniques", journal = j-J-COMP-SECUR, volume = "14", number = "4", pages = "359--387", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zhou:2006:P, author = "Jianying Zhou and Meng-Chow Kang", title = "Preface", journal = j-J-COMP-SECUR, volume = "14", number = "5", pages = "389--390", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14501", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:18 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Price:2006:PKI, author = "Geraint Price", title = "Public Key Infrastructures: A research agenda", journal = j-J-COMP-SECUR, volume = "14", number = "5", pages = "391--417", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14502", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:18 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lippert:2006:LCM, author = "M. Lippert and V. Karatsiolis and A. Wiesmaier and J. Buchmann", title = "Life-cycle management of {X.509} certificates based on {LDAP} directories", journal = j-J-COMP-SECUR, volume = "14", number = "5", pages = "419--439", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14503", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:18 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Wang:2006:GNR, author = "Guilin Wang", title = "Generic non-repudiation protocols supporting transparent off-line {TTP}", journal = j-J-COMP-SECUR, volume = "14", number = "5", pages = "441--467", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14504", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:18 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lopez:2006:UPK, author = "Javier Lopez", title = "Unleashing public-key cryptography in wireless sensor networks", journal = j-J-COMP-SECUR, volume = "14", number = "5", pages = "469--482", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14505", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:18 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{McDaniel:2006:EPA, author = "Patrick McDaniel and Atul Prakash", title = "Enforcing provisioning and authorization policy in the {Antigone} system", journal = j-J-COMP-SECUR, volume = "14", number = "6", pages = "483--511", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14601", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Blyth:2006:PRT, author = "Andrew Blyth and Paula Thomas", title = "Performing real-time threat assessment of security incidents using data fusion of {IDS} logs", journal = j-J-COMP-SECUR, volume = "14", number = "6", pages = "513--534", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14602", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Aimeur:2006:BEC, author = "Esma A{\"\i}meur and Gilles Brassard and Flavien Serge Mani Onana", title = "Blind Electronic Commerce", journal = j-J-COMP-SECUR, volume = "14", number = "6", pages = "535--559", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14603", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Norman:2006:APC, author = "Gethin Norman and Vitaly Shmatikov", title = "Analysis of probabilistic contract signing", journal = j-J-COMP-SECUR, volume = "14", number = "6", pages = "561--589", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14604", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Smith:2006:ITP, author = "Geoffrey Smith", title = "Improved typings for probabilistic noninterference in a multi-threaded language", journal = j-J-COMP-SECUR, volume = "14", number = "6", pages = "591--623", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14605", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib; https://www.math.utah.edu/pub/tex/bib/multithreading.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2006:AIV, author = "Anonymous", title = "Author Index Volume 14 (2006)", journal = j-J-COMP-SECUR, volume = "14", number = "6", pages = "625--626", month = "????", year = "2006", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2006-14606", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:23 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2007:MGE, author = "Anonymous", title = "Message from the {Guest Editors}", journal = j-J-COMP-SECUR, volume = "15", number = "1", pages = "1--2", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:27 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zouridaki:2007:HQT, author = "Charikleia Zouridaki and Brian L. Mark and Marek Hejmo and Roshan K. Thomas", title = "{Hermes}: A quantitative trust establishment framework for reliable data packet delivery in {MANETs}", journal = j-J-COMP-SECUR, volume = "15", number = "1", pages = "3--38", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15102", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:27 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Raya:2007:SVA, author = "Maxim Raya and Jean-Pierre Hubaux", title = "Securing vehicular ad hoc networks", journal = j-J-COMP-SECUR, volume = "15", number = "1", pages = "39--68", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15103", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:27 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chan:2007:SSI, author = "Haowen Chan and Adrian Perrig and Bartosz Przydatek and Dawn Song", title = "{SIA}: Secure information aggregation in sensor networks", journal = j-J-COMP-SECUR, volume = "15", number = "1", pages = "69--102", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15104", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:27 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Radosavac:2007:DIM, author = "S. Radosavac and Alvaro A. C{\'a}rdenas and John S. Baras and George V. Moustakides", title = "Detecting {IEEE 802.11 MAC} layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers", journal = j-J-COMP-SECUR, volume = "15", number = "1", pages = "103--128", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15105", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:27 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Xu:2007:SGC, author = "Shouhuai Xu", title = "On the security of group communication schemes", journal = j-J-COMP-SECUR, volume = "15", number = "1", pages = "129--169", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15106", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:27 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zanin:2007:RRD, author = "Giorgio Zanin and Roberto {Di Pietro} and Luigi V. Mancini", title = "Robust {RSA} distributed signatures for large-scale long-lived ad hoc networks", journal = j-J-COMP-SECUR, volume = "15", number = "1", pages = "171--196", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15107", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:27 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Casola:2007:PBM, author = "Valentina Casola and Antonino Mazzeo and Nicola Mazzocca and Valeria Vittorini", title = "A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures", journal = j-J-COMP-SECUR, volume = "15", number = "2", pages = "197--229", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15201", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:30 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Tripunitara:2007:TCE, author = "Mahesh V. Tripunitara and Ninghui Li", title = "A theory for comparing the expressive power of access control models", journal = j-J-COMP-SECUR, volume = "15", number = "2", pages = "231--272", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15202", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:30 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Skormin:2007:PIA, author = "V. Skormin and A. Volynkin and D. Summerville and J. Moronski", title = "Prevention of information attacks by run-time detection of self-replication in computer codes", journal = j-J-COMP-SECUR, volume = "15", number = "2", pages = "273--302", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15203", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:30 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Wehner:2007:AWN, author = "Stephanie Wehner", title = "Analyzing worms and network traffic using compression", journal = j-J-COMP-SECUR, volume = "15", number = "3", pages = "303--320", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:34 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Clark:2007:SAQ, author = "David Clark and Sebastian Hunt and Pasquale Malacaria", title = "A static analysis for quantifying information flow in a simple imperative language", journal = j-J-COMP-SECUR, volume = "15", number = "3", pages = "321--371", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:34 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bossi:2007:CIF, author = "Annalisa Bossi and Carla Piazza and Sabina Rossi", title = "Compositional information flow security for concurrent programs", journal = j-J-COMP-SECUR, volume = "15", number = "3", pages = "373--416", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:34 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Wang:2007:PBI, author = "Lingyu Wang and Yingjiu Li and Sushil Jajodia and Duminda Wijesekera", title = "Parity-based inference control for multi-dimensional range sum queries", journal = j-J-COMP-SECUR, volume = "15", number = "4", pages = "417--445", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:38 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Skalka:2007:RMD, author = "Christian Skalka and X. Sean Wang and Peter Chapin", title = "Risk management for distributed authorization", journal = j-J-COMP-SECUR, volume = "15", number = "4", pages = "447--489", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:38 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Goto:2007:P, author = "Atsuhiro Goto", title = "Preface", journal = j-J-COMP-SECUR, volume = "15", number = "5", pages = "491--491", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15501", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:42 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bhargav-Spantzel:2007:UCT, author = "Abhilasha Bhargav-Spantzel and Jan Camenisch and Thomas Gross and Dieter Sommer", title = "User centricity: A taxonomy and open issues", journal = j-J-COMP-SECUR, volume = "15", number = "5", pages = "493--527", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15502", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:42 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bhargav-Spantzel:2007:PPM, author = "Abhilasha Bhargav-Spantzel and Anna C. Squicciarini and Shimon Modi and Matthew Young and Elisa Bertino and Stephen J. Elliott", title = "Privacy preserving multi-factor authentication with biometrics", journal = j-J-COMP-SECUR, volume = "15", number = "5", pages = "529--560", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15503", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:42 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Backes:2007:P, author = "Michael Backes and David Basin and Michael Waidner", title = "Preface", journal = j-J-COMP-SECUR, volume = "15", number = "6", pages = "561--561", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15601", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:45 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bugliesi:2007:DTA, author = "Michele Bugliesi and Riccardo Focardi and Matteo Maffei", title = "Dynamic types for authentication", journal = j-J-COMP-SECUR, volume = "15", number = "6", pages = "563--617", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15602", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:45 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Corin:2007:TAS, author = "R. Corin and S. Etalle and P. H. Hartel and A. Mader", title = "Timed analysis of security protocols", journal = j-J-COMP-SECUR, volume = "15", number = "6", pages = "619--645", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15603", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:45 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Barthe:2007:SIF, author = "Gilles Barthe and Leonor Prensa Nieto", title = "Secure information flow for a concurrent language with scheduling", journal = j-J-COMP-SECUR, volume = "15", number = "6", pages = "647--689", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15604", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:45 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Uribe:2007:AAF, author = "Tom{\'a}s E. Uribe and Steven Cheung", title = "Automatic analysis of firewall and network intrusion detection system configurations", journal = j-J-COMP-SECUR, volume = "15", number = "6", pages = "691--715", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15605", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:45 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2007:AIV, author = "Anonymous", title = "Author Index Volume 15 (2007)", journal = j-J-COMP-SECUR, volume = "15", number = "6", pages = "717--719", month = "????", year = "2007", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-15606", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:45 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zhang:2008:SVA, author = "Nan Zhang and Mark Ryan and Dimitar P. Guelev", title = "Synthesising verified access control systems through model checking", journal = j-J-COMP-SECUR, volume = "16", number = "1", pages = "1--61", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:48 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Krukow:2008:LFH, author = "Karl Krukow and Mogens Nielsen and Vladimiro Sassone", title = "A logical framework for history-based access control and reputation systems", journal = j-J-COMP-SECUR, volume = "16", number = "1", pages = "63--101", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16102", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:48 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yee:2008:GEIa, author = "George O. M. Yee and Ali A. Ghorbani and Patrick C. K. Hung", title = "{Guest Editors}' Introduction", journal = j-J-COMP-SECUR, volume = "16", number = "2", pages = "103--106", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16201", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zhou:2008:SPR, author = "Jie Zhou and Jim Alves-Foss", title = "Security policy refinement and enforcement for the design of multi-level secure systems", journal = j-J-COMP-SECUR, volume = "16", number = "2", pages = "107--131", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16202", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Mont:2008:PPE, author = "Marco Casassa Mont and Robert Thyne", title = "Privacy policy enforcement in enterprises with identity management solutions", journal = j-J-COMP-SECUR, volume = "16", number = "2", pages = "133--163", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16203", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Nayyar:2008:AAM, author = "Harshit Nayyar and Ali A. Ghorbani", title = "Approximate autoregressive modeling for network attack detection", journal = j-J-COMP-SECUR, volume = "16", number = "2", pages = "165--197", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16204", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Spindler:2008:PVS, author = "Torsten Spindler and Christoph Wartmann and Ludger Hovestadt and Daniel Roth and Luc {Van Gool} and Andreas Steffen", title = "Privacy in video surveilled spaces", journal = j-J-COMP-SECUR, volume = "16", number = "2", pages = "199--222", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16205", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Alam:2008:CBR, author = "Muhammad Alam and Michael Hafner and Ruth Breu", title = "Constraint based role based access control in the {SECTET}-framework", journal = j-J-COMP-SECUR, volume = "16", number = "2", pages = "223--260", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16206", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yee:2008:GEIb, author = "George O. M. Yee and Chunming Rong and Laurence T. Yang", title = "{Guest Editors}' Introduction", journal = j-J-COMP-SECUR, volume = "16", number = "3", pages = "261--264", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16301", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:56 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Elbirt:2008:AAI, author = "A. J. Elbirt", title = "Accelerated {AES} implementations via generalized instruction set extensions", journal = j-J-COMP-SECUR, volume = "16", number = "3", pages = "265--288", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16302", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:56 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kayem:2008:RCK, author = "Anne V. D. M. Kayem and Selim G. Akl and Patrick Martin", title = "On replacing cryptographic keys in hierarchical key management systems", journal = j-J-COMP-SECUR, volume = "16", number = "3", pages = "289--309", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16303", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:56 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Wang:2008:CBH, author = "Lifu Wang and Partha Dasgupta", title = "Coprocessor-based hierarchical trust management for software integrity and digital identity protection", journal = j-J-COMP-SECUR, volume = "16", number = "3", pages = "311--339", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16304", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:56 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hagen:2008:PAU, author = "Janne Merete Hagen and Tormod Kalberg Sivertsen and Chunming Rong", title = "Protection against unauthorized access and computer crime in {Norwegian} enterprises", journal = j-J-COMP-SECUR, volume = "16", number = "3", pages = "341--366", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16305", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:56 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Damiani:2008:GE, author = "Ernesto Damiani", title = "Guest Editorial", journal = j-J-COMP-SECUR, volume = "16", number = "4", pages = "367--368", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0338", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ardagna:2008:PAA, author = "C. A. Ardagna and M. Cremonini and S. {De Capitani di Vimercati} and P. Samarati", title = "A privacy-aware access control system", journal = j-J-COMP-SECUR, volume = "16", number = "4", pages = "369--397", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0328", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Goodrich:2008:NFI, author = "Michael T. Goodrich and Roberto Tamassia and Danfeng (Daphne) Yao", title = "Notarized federated {ID} management and authentication", journal = j-J-COMP-SECUR, volume = "16", number = "4", pages = "399--418", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0324", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Wang:2008:IIA, author = "Lingyu Wang and Chao Yao and Anoop Singhal and Sushil Jajodia", title = "Implementing interactive analysis of attack graphs using relational databases", journal = j-J-COMP-SECUR, volume = "16", number = "4", pages = "419--437", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0327", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Atluri:2008:ESP, author = "Vijayalakshmi Atluri and Heechang Shin and Jaideep Vaidya", title = "Efficient security policy enforcement for the mobile environment", journal = j-J-COMP-SECUR, volume = "16", number = "4", pages = "439--475", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0329", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Biskup:2008:PCQ, author = "Joachim Biskup and Lena Wiese", title = "Preprocessing for controlled query evaluation with availability policy", journal = j-J-COMP-SECUR, volume = "16", number = "4", pages = "477--494", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0325", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:23:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sabelfeld:2008:P, author = "Andrei Sabelfeld", title = "Preface", journal = j-J-COMP-SECUR, volume = "16", number = "5", pages = "495--495", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0331", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:03 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Backes:2008:KDM, author = "Michael Backes and Birgit Pfitzmann and Andre Scedrov", title = "Key-dependent message security under active attacks --- {BRSIM\slash UC}-soundness of {Dolev--Yao}-style encryption with key cycles", journal = j-J-COMP-SECUR, volume = "16", number = "5", pages = "497--530", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0332", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:03 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chatzikokolakis:2008:BRI, author = "Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden", title = "On the {Bayes} risk in information-hiding protocols", journal = j-J-COMP-SECUR, volume = "16", number = "5", pages = "531--571", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0333", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:03 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Corin:2008:SCS, author = "Ricardo Corin and Pierre-Malo Deni{\'e}lou and C{\'e}dric Fournet and Karthikeyan Bhargavan and James Leifer", title = "A secure compiler for session abstractions", journal = j-J-COMP-SECUR, volume = "16", number = "5", pages = "573--636", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0334", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:03 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Shroff:2008:SIF, author = "Paritosh Shroff and Scott F. Smith and Mark Thober", title = "Securing information flow via dynamic capture of dependencies", journal = j-J-COMP-SECUR, volume = "16", number = "5", pages = "637--688", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0335", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:03 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Tiplea:2008:SBS, author = "Ferucio L. {\c{T}}iplea and C{\u{a}}t{\u{a}}lin V. B{\^\i}rjoveanu and Constantin Enea and Ioana Boureanu", title = "Secrecy for bounded security protocols with freshness check is {NEXPTIME}-complete", journal = j-J-COMP-SECUR, volume = "16", number = "6", pages = "689--712", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-0306", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:06 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Traynor:2008:EOF, author = "Patrick Traynor and William Enck and Patrick McDaniel and Thomas {La Porta}", title = "Exploiting open functionality in {SMS}-capable cellular networks", journal = j-J-COMP-SECUR, volume = "16", number = "6", pages = "713--742", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2007-0308", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:06 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Murray:2008:NDA, author = "Toby Murray and Duncan Grove", title = "Non-delegatable authorities in capability systems", journal = j-J-COMP-SECUR, volume = "16", number = "6", pages = "743--759", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0314", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:06 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Belsis:2008:AEF, author = "Petros Belsis and Kostas Fragos and Stefanos Gritzalis and Christos Skourlas", title = "Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification", journal = j-J-COMP-SECUR, volume = "16", number = "6", pages = "761--790", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0319", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:06 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2008:AIV, author = "Anonymous", title = "Author Index Volume 16 (2008)", journal = j-J-COMP-SECUR, volume = "16", number = "6", pages = "791--793", month = "????", year = "2008", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-16605", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:06 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Petkovic:2009:P, author = "Milan Petkovi{\'c} and Willem Jonker", title = "Preface", journal = j-J-COMP-SECUR, volume = "17", number = "1", pages = "1--3", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0326", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yao:2009:EPT, author = "Chao Yao and Lingyu Wang and X. Sean Wang and Claudio Bettini and Sushil Jajodia", title = "Evaluating privacy threats in released database views by symmetric indistinguishability", journal = j-J-COMP-SECUR, volume = "17", number = "1", pages = "5--42", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0317", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Byun:2009:PPI, author = "Ji-Won Byun and Tiancheng Li and Elisa Bertino and Ninghui Li and Yonglak Sohn", title = "Privacy-preserving incremental data dissemination", journal = j-J-COMP-SECUR, volume = "17", number = "1", pages = "43--68", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0316", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bottcher:2009:IDA, author = "Stefan B{\"o}ttcher and Rita Hartel", title = "Information disclosure by answers to {XPath} queries", journal = j-J-COMP-SECUR, volume = "17", number = "1", pages = "69--99", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0318", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cheng:2009:QAV, author = "Weiwei Cheng and Kian-Lee Tan", title = "Query assurance verification for outsourced multi-dimensional databases", journal = j-J-COMP-SECUR, volume = "17", number = "1", pages = "101--126", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0315", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:10 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hu:2009:CRR, author = "Nan Hu and Giri K. Tayi and Chengyu Ma and Yingjiu Li", title = "Certificate revocation release policies", journal = j-J-COMP-SECUR, volume = "17", number = "2", pages = "127--157", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0330", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:14 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Herzberg:2009:FPT, author = "Amir Herzberg", title = "Folklore, practice and theory of robust combiners", journal = j-J-COMP-SECUR, volume = "17", number = "2", pages = "159--189", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0336", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:14 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Aziz:2009:CSA, author = "Benjamin Aziz and Simon N. Foley and John Herbert and Garret Swart", title = "Configuring storage-area networks using mandatory security", journal = j-J-COMP-SECUR, volume = "17", number = "2", pages = "191--210", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0337", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:14 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Vaidya:2009:ERM, author = "Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo and Haibing Lu", title = "Edge-{RMP}: Minimizing administrative assignments for role-based access control", journal = j-J-COMP-SECUR, volume = "17", number = "2", pages = "211--235", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0341", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:14 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bella:2009:JCS, author = "Giampaolo Bella and Peter Y. A. Ryan", title = "{{\booktitle{Journal of Computer Security}}}", journal = j-J-COMP-SECUR, volume = "17", number = "3", pages = "237--237", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0346", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:18 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Belsis:2009:AEF, author = "Petros Belsis and Kostas Fragos and Stefanos Gritzalis and Christos Skourlas", title = "Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification", journal = j-J-COMP-SECUR, volume = "17", number = "3", pages = "239--268", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0377", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:18 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Grothoff:2009:TBS, author = "Christian Grothoff and Krista Grothoff and Ryan Stutsman and Ludmila Alkhutova and Mikhail Atallah", title = "Translation-based steganography", journal = j-J-COMP-SECUR, volume = "17", number = "3", pages = "269--303", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0320", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:18 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Vigna:2009:REA, author = "Giovanni Vigna and Fredrik Valeur and Davide Balzarotti and William Robertson and Christopher Kruegel and Engin Kirda", title = "Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and {SQL} queries", journal = j-J-COMP-SECUR, volume = "17", number = "3", pages = "305--329", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0321", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:18 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Xu:2009:ASL, author = "Haizhi Xu and Steve J. Chapin", title = "Address-space layout randomization using code islands", journal = j-J-COMP-SECUR, volume = "17", number = "3", pages = "331--362", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0322", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:18 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Blanchet:2009:AVC, author = "Bruno Blanchet", title = "Automatic verification of correspondences for security protocols", journal = j-J-COMP-SECUR, volume = "17", number = "4", pages = "363--434", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0339", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:22 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Delaune:2009:VPT, author = "St{\'e}phanie Delaune and Steve Kremer and Mark Ryan", title = "Verifying privacy-type properties of electronic voting protocols", journal = j-J-COMP-SECUR, volume = "17", number = "4", pages = "435--487", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0340", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:22 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ding:2009:LFM, author = "Xuhua Ding and Gene Tsudik and Shouhuai Xu", title = "Leak-free mediated group signatures", journal = j-J-COMP-SECUR, volume = "17", number = "4", pages = "489--514", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0342", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:22 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Guttman:2009:I, author = "Joshua D. Guttman", title = "Introduction", journal = j-J-COMP-SECUR, volume = "17", number = "5", pages = "515--515", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0396", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sabelfeld:2009:DDP, author = "Andrei Sabelfeld and David Sands", title = "Declassification: Dimensions and principles", journal = j-J-COMP-SECUR, volume = "17", number = "5", pages = "517--548", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0352", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Matos:2009:DND, author = "Ana Almeida Matos and G{\'e}rard Boudol", title = "On declassification and the non-disclosure policy", journal = j-J-COMP-SECUR, volume = "17", number = "5", pages = "549--597", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0355", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Harrison:2009:AIF, author = "William L. Harrison and James Hook", title = "Achieving information flow security through monadic control of effects", journal = j-J-COMP-SECUR, volume = "17", number = "5", pages = "599--653", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0356", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Clarkson:2009:QIF, author = "Michael R. Clarkson and Andrew C. Myers and Fred B. Schneider", title = "Quantifying information flow with beliefs", journal = j-J-COMP-SECUR, volume = "17", number = "5", pages = "655--701", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0353", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hofheinz:2009:PRS, author = "Dennis Hofheinz and J{\"o}rn M{\"u}ller-Quade and Dominique Unruh", title = "Polynomial runtime in simulatability definitions", journal = j-J-COMP-SECUR, volume = "17", number = "5", pages = "703--735", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0354", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Adao:2009:SCF, author = "Pedro Ad{\~a}o and Gergei Bana and Jonathan Herzog and Andre Scedrov", title = "Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage", journal = j-J-COMP-SECUR, volume = "17", number = "5", pages = "737--797", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0358", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bartoletti:2009:PVS, author = "Massimo Bartoletti and Pierpaolo Degano and Gian Luigi Ferrari", title = "Planning and verifying service composition", journal = j-J-COMP-SECUR, volume = "17", number = "5", pages = "799--837", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0357", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:26 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Guette:2009:ATK, author = "Gilles Guette", title = "Automating trusted key rollover in {DNSSEC}", journal = j-J-COMP-SECUR, volume = "17", number = "6", pages = "839--854", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0343", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Preda:2009:SBC, author = "Mila Dalla Preda and Roberto Giacobazzi", title = "Semantics-based code obfuscation by abstract interpretation", journal = j-J-COMP-SECUR, volume = "17", number = "6", pages = "855--908", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0345", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jacobs:2009:SLS, author = "Bart Jacobs and Ichiro Hasuo", title = "Semantics and logic for security protocols", journal = j-J-COMP-SECUR, volume = "17", number = "6", pages = "909--944", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0348", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Dainotti:2009:CAA, author = "Alberto Dainotti and Antonio Pescap{\'e} and Giorgio Ventre", title = "A cascade architecture for {DoS} attacks detection based on the wavelet transform", journal = j-J-COMP-SECUR, volume = "17", number = "6", pages = "945--968", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0350", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2009:AIV, author = "Anonymous", title = "Author Index Volume 17 (2009)", journal = j-J-COMP-SECUR, volume = "17", number = "6", pages = "969--971", month = "????", year = "2009", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-17605", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Campolargo:2010:JSI, author = "M{\'a}rio Campolargo", title = "{JCS} special issue on {EU}-funded {ICT} research on Trust and Security: Foreword", journal = j-J-COMP-SECUR, volume = "18", number = "1", pages = "??--??", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0368", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:34 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Camenisch:2010:JSI, author = "Jan Camenisch and Javier Lopez and Fabio Massacci and Massimo Ciscato and Thomas Skordas", title = "{JCS} special issue on {EU}-funded {ICT} research on Trust and Security", journal = j-J-COMP-SECUR, volume = "18", number = "1", pages = "1--5", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0375", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:34 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bergholz:2010:NFA, author = "Andr{\'e} Bergholz and Jan {De Beer} and Sebastian Glahn and Marie-Francine Moens and Gerhard Paa{\ss} and Siehyun Strobel", title = "New filtering approaches for phishing email", journal = j-J-COMP-SECUR, volume = "18", number = "1", pages = "7--35", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0371", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:34 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Dam:2010:PCI, author = "Mads Dam and Bart Jacobs and Andreas Lundblad and Frank Piessens", title = "Provably correct inline monitoring for multithreaded {Java}-like programs", journal = j-J-COMP-SECUR, volume = "18", number = "1", pages = "37--59", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0365", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:34 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/java2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib; https://www.math.utah.edu/pub/tex/bib/multithreading.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Salvail:2010:STR, author = "Louis Salvail and Momtchil Peev and Eleni Diamanti and Romain All{\'e}aume and Norbert L{\"u}tkenhaus and Thomas L{\"a}nger", title = "Security of trusted repeater quantum key distribution networks", journal = j-J-COMP-SECUR, volume = "18", number = "1", pages = "61--87", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0373", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:34 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cabuk:2010:TAS, author = "Serdar Cabuk and Chris I. Dalton and Konrad Eriksson and Dirk Kuhlmann and HariGovind V. Ramasamy and Gianluca Ramunno and Ahmad-Reza Sadeghi and Matthias Schunter and Christian St{\"u}ble", title = "Towards automated security policy enforcement in multi-tenant virtual data centers", journal = j-J-COMP-SECUR, volume = "18", number = "1", pages = "89--121", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0376", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:34 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ardagna:2010:ECP, author = "Claudio A. Ardagna and Jan Camenisch and Markulf Kohlweiss and Ronald Leenes and Gregory Neven and Bart Priem and Pierangela Samarati and Dieter Sommer and Mario Verdicchio", title = "Exploiting cryptography for privacy-enhanced access control: A result of the {PRIME Project}", journal = j-J-COMP-SECUR, volume = "18", number = "1", pages = "123--160", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0367", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:34 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Argyropoulos:2010:BTP, author = "Savvas Argyropoulos and Dimitrios Tzovaras and Dimosthenis Ioannidis and Yannis Damousis and Michael G. Strintzis and Martin Braun and Serge Boverie", title = "Biometric template protection in multimodal authentication systems based on error correcting codes", journal = j-J-COMP-SECUR, volume = "18", number = "1", pages = "161--185", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0369", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:34 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jajodia:2010:E, author = "Sushil Jajodia and Jon Millen", title = "Editorial", journal = j-J-COMP-SECUR, volume = "18", number = "2", pages = "187--187", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0402", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:38 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gorla:2010:P, author = "Daniele Gorla and Catuscia Palamidessi", title = "Preface", journal = j-J-COMP-SECUR, volume = "18", number = "2", pages = "189--189", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0359", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:38 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Malacaria:2010:RAS, author = "Pasquale Malacaria", title = "Risk assessment of security threats for looping constructs", journal = j-J-COMP-SECUR, volume = "18", number = "2", pages = "191--228", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0360", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:38 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bodei:2010:DPT, author = "Chiara Bodei and Linda Brodo and Pierpaolo Degano and Han Gao", title = "Detecting and preventing type flaws at static time", journal = j-J-COMP-SECUR, volume = "18", number = "2", pages = "229--264", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0361", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:38 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hamadou:2010:CPS, author = "Sardaouna Hamadou and John Mullins", title = "Calibrating the power of schedulers for probabilistic polynomial-time calculus", journal = j-J-COMP-SECUR, volume = "18", number = "2", pages = "265--316", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0362", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:38 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Delaune:2010:SBA, author = "St{\'e}phanie Delaune and Steve Kremer and Mark D. Ryan", title = "Symbolic bisimulation for the applied pi calculus", journal = j-J-COMP-SECUR, volume = "18", number = "2", pages = "317--377", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0363", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:38 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lekkas:2010:PMT, author = "Dimitrios Lekkas and Dimitris Gritzalis", title = "{e-Passports} as a means towards a {Globally Interoperable Public Key Infrastructure}", journal = j-J-COMP-SECUR, volume = "18", number = "3", pages = "379--396", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0370", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:43 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Pala:2010:FPN, author = "Massimiliano Pala and Sean W. Smith", title = "Finding the {PKI} needles in the {Internet} haystack", journal = j-J-COMP-SECUR, volume = "18", number = "3", pages = "397--420", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0401", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:43 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Li:2010:CCB, author = "Jiguo Li and Xinyi Huang and Yi Mu and Willy Susilo and Qianhong Wu", title = "Constructions of certificate-based signature secure against key replacement attacks", journal = j-J-COMP-SECUR, volume = "18", number = "3", pages = "421--449", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0366", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:43 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Li:2010:ESS, author = "Chung Ki Li and Guomin Yang and Duncan S. Wong and Xiaotie Deng and Sherman S. M. Chow", title = "An efficient signcryption scheme with key privacy and its extension to ring signcryption", journal = j-J-COMP-SECUR, volume = "18", number = "3", pages = "451--473", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0374", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:43 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chadwick:2010:ICR, author = "David W. Chadwick and Sean Antony and Rune Bjerk", title = "Instant certificate revocation and publication using {WebDAV}", journal = j-J-COMP-SECUR, volume = "18", number = "3", pages = "475--496", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0372", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:43 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Goto:2010:P, author = "Atsuhiro Goto", title = "Preface", journal = j-J-COMP-SECUR, volume = "18", number = "4", pages = "497--497", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0381", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:47 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Saklikar:2010:IFV, author = "Samir Saklikar and Subir Saha", title = "Identity Federation for {VoIP} systems", journal = j-J-COMP-SECUR, volume = "18", number = "4", pages = "499--540", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2008-0349", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:47 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Baldwin:2010:AFI, author = "Adrian Baldwin and Marco Casassa Mont and Yolanta Beres and Simon Shiu", title = "Assurance for federated identity management", journal = j-J-COMP-SECUR, volume = "18", number = "4", pages = "541--572", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0380", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:47 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Modersheim:2010:CDS, author = "Sebastian M{\"o}dersheim and Luca Vigan{\`o} and David Basin", title = "Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols", journal = j-J-COMP-SECUR, volume = "18", number = "4", pages = "575--618", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0351", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:47 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Becker:2010:SDS, author = "Moritz Y. Becker and C{\'e}dric Fournet and Andrew D. Gordon", title = "{SecPAL}: Design and semantics of a decentralized authorization language", journal = j-J-COMP-SECUR, volume = "18", number = "4", pages = "619--665", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0364", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:47 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Conrad:2010:AUT, author = "James R. Conrad and Jim Alves-Foss and Sauchi Stephen Lee", title = "Analyzing uncertainty in {TG} protection graphs with {TG\slash MC}", journal = j-J-COMP-SECUR, volume = "18", number = "5", pages = "667--699", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0378", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:50 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Pucella:2010:IOS, author = "Riccardo Pucella and Fred B. Schneider", title = "Independence from obfuscation: A semantic framework for diversity", journal = j-J-COMP-SECUR, volume = "18", number = "5", pages = "701--749", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0379", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:50 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Giacobazzi:2010:ACU, author = "Roberto Giacobazzi and Isabella Mastroeni", title = "Adjoining classified and unclassified information by abstract interpretation", journal = j-J-COMP-SECUR, volume = "18", number = "5", pages = "751--797", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0382", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:50 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Pirretti:2010:SAB, author = "Matthew Pirretti and Patrick Traynor and Patrick McDaniel and Brent Waters", title = "Secure attribute-based systems", journal = j-J-COMP-SECUR, volume = "18", number = "5", pages = "799--837", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0383", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:50 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DiPietro:2010:HKS, author = "Roberto {Di Pietro} and Luigi V. Mancini and Alessandro Mei", title = "Hierarchies of keys in secure multicast communications", journal = j-J-COMP-SECUR, volume = "18", number = "5", pages = "839--860", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0384", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:50 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jovanovic:2010:SAD, author = "Nenad Jovanovic and Christopher Kruegel and Engin Kirda", title = "Static analysis for detecting taint-style vulnerabilities in web applications", journal = j-J-COMP-SECUR, volume = "18", number = "5", pages = "861--907", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0385", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:50 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Baudet:2010:GAC, author = "Mathieu Baudet and Bogdan Warinschi and Mart{\'\i}n Abadi", title = "Guessing attacks and the computational soundness of static equivalence", journal = j-J-COMP-SECUR, volume = "18", number = "5", pages = "909--968", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0386", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:50 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Focardi:2010:E, author = "Riccardo Focardi", title = "Editorial", journal = j-J-COMP-SECUR, volume = "18", number = "6", pages = "969--969", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0390", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Besson:2010:VRA, author = "Fr{\'e}d{\'e}ric Besson and Guillaume Dufay and Thomas Jensen and David Pichardie", title = "Verifying resource access control on mobile interactive devices", journal = j-J-COMP-SECUR, volume = "18", number = "6", pages = "971--998", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0387", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kremer:2010:CSA, author = "Steve Kremer and Laurent Mazar{\'e}", title = "Computationally sound analysis of protocols using bilinear pairings", journal = j-J-COMP-SECUR, volume = "18", number = "6", pages = "999--1033", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0388", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Roy:2010:ITP, author = "Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell", title = "Inductive trace properties for computational security", journal = j-J-COMP-SECUR, volume = "18", number = "6", pages = "1035--1073", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-389", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sabelfeld:2010:P, author = "Andrei Sabelfeld", title = "Preface", journal = j-J-COMP-SECUR, volume = "18", number = "6", pages = "1075--1075", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0391", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Backes:2010:CSS, author = "Michael Backes and Dominique Unruh", title = "Computational soundness of symbolic zero-knowledge proofs", journal = j-J-COMP-SECUR, volume = "18", number = "6", pages = "1077--1155", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0392", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Clarkson:2010:H, author = "Michael R. Clarkson and Fred B. Schneider", title = "Hyperproperties", journal = j-J-COMP-SECUR, volume = "18", number = "6", pages = "1157--1210", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0393", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Delaune:2010:FSA, author = "St{\'e}phanie Delaune and Steve Kremer and Graham Steel", title = "Formal security analysis of {PKCS\#11} and proprietary extensions", journal = j-J-COMP-SECUR, volume = "18", number = "6", pages = "1211--1245", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0394", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Goubault-Larrecq:2010:FMF, author = "Jean Goubault-Larrecq", title = "Finite models for formal security proofs", journal = j-J-COMP-SECUR, volume = "18", number = "6", pages = "1247--1299", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0395", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2010:AIV, author = "Anonymous", title = "Author Index Volume 18 (2010)", journal = j-J-COMP-SECUR, volume = "18", number = "6", pages = "1301--1305", month = "????", year = "2010", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-18610", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:54 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kopf:2011:ADI, author = "Boris K{\"o}pf and David Basin", title = "Automatically deriving information-theoretic bounds for adaptive side-channel attacks", journal = j-J-COMP-SECUR, volume = "19", number = "1", pages = "1--31", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0397", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:58 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gordon:2011:IIS, author = "Lawrence A. Gordon and Martin P. Loeb and Lei Zhou", title = "The impact of information security breaches: Has there been a downward shift in costs?", journal = j-J-COMP-SECUR, volume = "19", number = "1", pages = "33--56", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2009-0398", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:58 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DeAngelis:2011:SAT, author = "David DeAngelis and K. Suzanne Barber", title = "Security applications of trust in multi-agent systems", journal = j-J-COMP-SECUR, volume = "19", number = "1", pages = "57--99", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0399", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:58 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DSouza:2011:MCT, author = "Deepak D'Souza and Raveendra Holla and K. R. Raghavendra and Barbara Sprick", title = "Model-checking trace-based information flow properties", journal = j-J-COMP-SECUR, volume = "19", number = "1", pages = "101--138", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0400", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:58 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Nguyen:2011:APB, author = "L. H. Nguyen and A. W. Roscoe", title = "Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey", journal = j-J-COMP-SECUR, volume = "19", number = "1", pages = "139--201", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0403", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:58 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sinha:2011:SSS, author = "Anshuman Sinha", title = "A survey of system security in contactless electronic passports", journal = j-J-COMP-SECUR, volume = "19", number = "1", pages = "203--226", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0414", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:24:58 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Li:2011:GEP, author = "Yingjiu Li and Jianying Zhou", title = "{Guest Editor}s' preface", journal = j-J-COMP-SECUR, volume = "19", number = "2", pages = "227--228", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0405", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:03 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Alomair:2011:SLC, author = "Basel Alomair and Loukas Lazos and Radha Poovendran", title = "Securing low-cost {RFID} systems: An unconditionally secure approach", journal = j-J-COMP-SECUR, volume = "19", number = "2", pages = "229--257", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0406", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:03 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hancke:2011:PES, author = "Gerhard P. Hancke", title = "Practical eavesdropping and skimming attacks on high-frequency {RFID} tokens", journal = j-J-COMP-SECUR, volume = "19", number = "2", pages = "259--288", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0407", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:03 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Avoine:2011:FAR, author = "Gildas Avoine and Muhammed Ali Bing{\"o}l and S{\"u}leyman Karda{\c{s}} and C{\'e}dric Lauradoux and Benjamin Martin", title = "A framework for analyzing {RFID} distance bounding protocols", journal = j-J-COMP-SECUR, volume = "19", number = "2", pages = "289--317", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0408", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:03 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ng:2011:PRO, author = "Ching Yu Ng and Willy Susilo and Yi Mu and Rei Safavi-Naini", title = "Practical {RFID} ownership transfer scheme", journal = j-J-COMP-SECUR, volume = "19", number = "2", pages = "319--341", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0409", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:03 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Halevi:2011:TBH, author = "Tzipora Halevi and Nitesh Saxena and Shai Halevi", title = "Tree-based {HB} protocols for privacy-preserving authentication of {RFID} tags", journal = j-J-COMP-SECUR, volume = "19", number = "2", pages = "343--363", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0404", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:03 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Atluri:2011:P, author = "Vijay Atluri", title = "Preface", journal = j-J-COMP-SECUR, volume = "19", number = "3", pages = "365--365", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0425", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:07 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Dong:2011:SSE, author = "Changyu Dong and Giovanni Russello and Naranker Dulay", title = "Shared and searchable encrypted data for untrusted servers", journal = j-J-COMP-SECUR, volume = "19", number = "3", pages = "367--397", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0415", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:07 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Toahchoodee:2011:FAS, author = "Manachai Toahchoodee and Indrakshi Ray", title = "On the formalization and analysis of a spatio-temporal role-based access control model", journal = j-J-COMP-SECUR, volume = "19", number = "3", pages = "399--452", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0418", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:07 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{He:2011:SCP, author = "Xiaoyun He and Haibing Lu and Jaideep Vaidya and Nabil Adam", title = "Secure construction and publication of contingency tables from distributed data", journal = j-J-COMP-SECUR, volume = "19", number = "3", pages = "453--484", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0417", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:07 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Vaidya:2011:I, author = "Jaideep Vaidya and Ehud Gudes", title = "Introduction", journal = j-J-COMP-SECUR, volume = "19", number = "3", pages = "485--486", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0427", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:07 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Biskup:2011:IPV, author = "Joachim Biskup and Christian Gogolin and Jens Seiler and Torben Weibert", title = "Inference-proof view update transactions with forwarded refreshments", journal = j-J-COMP-SECUR, volume = "19", number = "3", pages = "487--529", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0420", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:07 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ciriani:2011:SDO, author = "Valentina Ciriani and Sabrina {De Capitani di Vimercati} and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati", title = "Selective data outsourcing for enforcing privacy", journal = j-J-COMP-SECUR, volume = "19", number = "3", pages = "531--566", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0422", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:07 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Foley:2011:MSP, author = "Simon N. Foley and William M. Fitzgerald", title = "Management of security policy configuration using a {Semantic Threat Graph} approach", journal = j-J-COMP-SECUR, volume = "19", number = "3", pages = "567--605", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0421", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:07 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Shin:2011:EES, author = "Heechang Shin and Vijayalakshmi Atluri and June-suh Cho", title = "Efficiently enforcing spatiotemporal access control under uncertain location information", journal = j-J-COMP-SECUR, volume = "19", number = "3", pages = "607--637", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0423", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:07 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Rieck:2011:AAM, author = "Konrad Rieck and Philipp Trinius and Carsten Willems and Thorsten Holz", title = "Automatic analysis of malware behavior using machine learning", journal = j-J-COMP-SECUR, volume = "19", number = "4", pages = "639--668", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0410", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:11 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{vanOorschot:2011:EPC, author = "P. C. van Oorschot and Julie Thorpe", title = "Exploiting predictability in click-based graphical passwords", journal = j-J-COMP-SECUR, volume = "19", number = "4", pages = "669--702", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0411", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:11 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Mannan:2011:LPD, author = "Mohammad Mannan and P. C. van Oorschot", title = "Leveraging personal devices for stronger password authentication from untrusted computers", journal = j-J-COMP-SECUR, volume = "19", number = "4", pages = "703--750", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0412", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:11 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DeCapitanidiVimercati:2011:AED, author = "Sabrina {De Capitani di Vimercati} and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati", title = "Authorization enforcement in distributed query evaluation", journal = j-J-COMP-SECUR, volume = "19", number = "4", pages = "751--794", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0413", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:11 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Shin:2011:PAM, author = "Heechang Shin and Jaideep Vaidya and Vijayalakshmi Atluri", title = "A profile anonymization model for location-based services", journal = j-J-COMP-SECUR, volume = "19", number = "5", pages = "795--833", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0416", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gritzalis:2011:SPM, author = "Dimitris Gritzalis and Giannis Marias and Yacine Rebahi and Yannis Soupionis and Sven Ehlert", title = "{SPIDER}: A platform for managing {SIP}-based {Spam over Internet Telephony (SPIT)}", journal = j-J-COMP-SECUR, volume = "19", number = "5", pages = "835--867", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2010-0419", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hsu:2011:WLC, author = "Francis Hsu and Hao Chen and Sridhar Machiraju", title = "{WebCallerID}: Leveraging cellular networks for {Web} authentication", journal = j-J-COMP-SECUR, volume = "19", number = "5", pages = "869--893", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0424", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Curtmola:2011:SSE, author = "Reza Curtmola and Juan Garay and Seny Kamara and Rafail Ostrovsky", title = "Searchable symmetric encryption: Improved definitions and efficient constructions", journal = j-J-COMP-SECUR, volume = "19", number = "5", pages = "895--934", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0426", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Dewri:2011:EPV, author = "Rinku Dewri and Indrajit Ray and Indrakshi Ray and Darrell Whitley", title = "Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization", journal = j-J-COMP-SECUR, volume = "19", number = "5", pages = "935--974", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0428", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kamil:2011:ATS, author = "Allaa Kamil and Gavin Lowe", title = "Analysing {TLS} in the strand spaces model", journal = j-J-COMP-SECUR, volume = "19", number = "5", pages = "975--1025", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0429", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:15 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gritzalis:2011:GEP, author = "Dimitris Gritzalis", title = "{Guest Editor}'s Preface", journal = j-J-COMP-SECUR, volume = "19", number = "6", pages = "1027--1028", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0441", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yasuoka:2011:BPQ, author = "Hirotoshi Yasuoka and Tachio Terauchi", title = "On bounding problems of quantitative information flow", journal = j-J-COMP-SECUR, volume = "19", number = "6", pages = "1029--1082", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0437", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zhang:2011:UTA, author = "Chao Zhang and Wei Zou and Tielei Wang and Yu Chen and Tao Wei", title = "Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat", journal = j-J-COMP-SECUR, volume = "19", number = "6", pages = "1083--1107", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0434", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Deng:2011:ZKB, author = "Robert H. Deng and Yingjiu Li and Moti Yung and Yunlei Zhao", title = "A zero-knowledge based framework for {RFID} privacy", journal = j-J-COMP-SECUR, volume = "19", number = "6", pages = "1109--1146", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0440", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Nithyanand:2011:UAR, author = "Rishab Nithyanand and Gene Tsudik and Ersin Uzun", title = "User-aided reader revocation in {PKI}-based {RFID} systems", journal = j-J-COMP-SECUR, volume = "19", number = "6", pages = "1147--1172", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0435", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2011:AIV, author = "Anonymous", title = "Author Index Volume 19 (2011)", journal = j-J-COMP-SECUR, volume = "19", number = "6", pages = "1173--1176", month = "????", year = "2011", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-19606", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Armando:2012:P, author = "Alessandro Armando and Gavin Lowe", title = "Preface", journal = j-J-COMP-SECUR, volume = "20", number = "1", pages = "1--1", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0438", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Alvim:2012:QIF, author = "M{\'a}rio S. Alvim and Miguel E. Andr{\'e}s and Catuscia Palamidessi", title = "Quantitative information flow in interactive systems", journal = j-J-COMP-SECUR, volume = "20", number = "1", pages = "3--50", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0433", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bielova:2012:IES, author = "Nataliia Bielova and Fabio Massacci", title = "Iterative enforcement by suppression: Towards practical enforcement theories", journal = j-J-COMP-SECUR, volume = "20", number = "1", pages = "51--79", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0431", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Costa:2012:MPS, author = "Gabriele Costa and Pierpaolo Degano and Fabio Martinelli", title = "Modular plans for secure service composition", journal = j-J-COMP-SECUR, volume = "20", number = "1", pages = "81--117", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0430", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zhou:2012:FAS, author = "Hongbin Zhou and Simon N. Foley", title = "Fast automatic security protocol generation", journal = j-J-COMP-SECUR, volume = "20", number = "2--3", pages = "119--167", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0432", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Stakhanova:2012:TCS, author = "Natalia Stakhanova and Chris Strasburg and Samik Basu and Johnny S. Wong", title = "Towards cost-sensitive assessment of intrusion response selection", journal = j-J-COMP-SECUR, volume = "20", number = "2--3", pages = "169--198", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0436", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bowen:2012:SGI, author = "Brian M. Bowen and Vasileios P. Kemerlis and Pratap Prabhu and Angelos D. Keromytis and Salvatore J. Stolfo", title = "A system for generating and injecting indistinguishable network decoys", journal = j-J-COMP-SECUR, volume = "20", number = "2--3", pages = "199--221", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2011-0439", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ahn:2012:PDR, author = "Gail-Joon Ahn and Jing Jin and Mohamed Shehab", title = "Policy-driven role-based access management for ad-hoc collaboration", journal = j-J-COMP-SECUR, volume = "20", number = "2--3", pages = "223--257", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0446", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Blanton:2012:SOC, author = "Marina Blanton and Mehrdad Aliasgari", title = "Secure outsourced computation of iris matching", journal = j-J-COMP-SECUR, volume = "20", number = "2--3", pages = "259--305", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0447", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Barthe:2012:P, author = "Gilles Barthe and Jorge Cuellar and Javier Lopez and Alexander Pretschner", title = "Preface", journal = j-J-COMP-SECUR, volume = "20", number = "4", pages = "307--308", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0462", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Armando:2012:SAS, author = "Alessandro Armando and Silvio Ranise", title = "Scalable automated symbolic analysis of administrative role-based access control policies by {SMT} solving", journal = j-J-COMP-SECUR, volume = "20", number = "4", pages = "309--352", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0461", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Garg:2012:SAL, author = "Deepak Garg and Frank Pfenning", title = "Stateful authorization logic --- Proof theory and a case study", journal = j-J-COMP-SECUR, volume = "20", number = "4", pages = "353--391", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0456", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bezzi:2012:MPI, author = "Michele Bezzi and Sabrina {De Capitani di Vimercati} and Sara Foresti and Giovanni Livraga and Pierangela Samarati and Roberto Sassi", title = "Modeling and preventing inferences from sensitive value distributions in data release", journal = j-J-COMP-SECUR, volume = "20", number = "4", pages = "393--436", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0457", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sun:2012:TAV, author = "Yanjie Sun and Chenyi Zhang and Jun Pang and Baptiste Alcalde and Sjouke Mauw", title = "A trust-augmented voting scheme for collaborative privacy management", journal = j-J-COMP-SECUR, volume = "20", number = "4", pages = "437--459", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0453", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Li:2012:GEP, author = "Yingjiu Li", title = "{Guest Editor}'s Preface", journal = j-J-COMP-SECUR, volume = "20", number = "5", pages = "461--462", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0448", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ciriani:2012:OAE, author = "Valentina Ciriani and Sabrina {De Capitani di Vimercati} and Sara Foresti and Giovanni Livraga and Pierangela Samarati", title = "An {OBDD} approach to enforce confidentiality and visibility constraints in data publishing", journal = j-J-COMP-SECUR, volume = "20", number = "5", pages = "463--508", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0449", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Biskup:2012:DPA, author = "Joachim Biskup", title = "Dynamic policy adaptation for inference control of queries to a propositional information system", journal = j-J-COMP-SECUR, volume = "20", number = "5", pages = "509--546", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0450", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Adaikkalavan:2012:MSD, author = "Raman Adaikkalavan and Xing Xie and Indrakshi Ray", title = "Multilevel secure data stream processing: Architecture and implementation", journal = j-J-COMP-SECUR, volume = "20", number = "5", pages = "547--581", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0451", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hong:2012:SED, author = "Yuan Hong and Jaideep Vaidya and Haibing Lu", title = "Secure and efficient distributed linear programming", journal = j-J-COMP-SECUR, volume = "20", number = "5", pages = "583--634", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0452", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Myers:2012:P, author = "Andrew Myers and Michael Backes", title = "Preface", journal = j-J-COMP-SECUR, volume = "20", number = "6", pages = "635--636", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0445", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chong:2012:RIR, author = "Stephen Chong", title = "Required information release", journal = j-J-COMP-SECUR, volume = "20", number = "6", pages = "637--676", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0442", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Becker:2012:IFT, author = "Moritz Y. Becker", title = "Information flow in trust management systems", journal = j-J-COMP-SECUR, volume = "20", number = "6", pages = "677--708", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0443", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kusters:2012:GBD, author = "Ralf K{\"u}sters and Tomasz Truderung and Andreas Vogt", title = "A game-based definition of coercion resistance and its applications", journal = j-J-COMP-SECUR, volume = "20", number = "6", pages = "709--764", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0444", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2012:AIV, author = "Anonymous", title = "Author Index Volume 20 (2012)", journal = j-J-COMP-SECUR, volume = "20", number = "6", pages = "765--767", month = "????", year = "2012", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-20605", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yarmand:2013:BBA, author = "Mohammad H. Yarmand and Kamran Sartipi and Douglas G. Down", title = "Behavior-based access control for distributed healthcare systems", journal = j-J-COMP-SECUR, volume = "21", number = "1", pages = "1--39", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0454", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:44 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Meier:2013:ECM, author = "Simon Meier and Cas Cremers and David Basin", title = "Efficient construction of machine-checked symbolic protocol security proofs", journal = j-J-COMP-SECUR, volume = "21", number = "1", pages = "41--87", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0455", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:44 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cortier:2013:AFH, author = "V{\'e}ronique Cortier and Ben Smyth", title = "Attacking and fixing {Helios}: An analysis of ballot secrecy", journal = j-J-COMP-SECUR, volume = "21", number = "1", pages = "89--148", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0458", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:44 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cuppens:2013:FSM, author = "Fr{\'e}d{\'e}ric Cuppens and Nora Cuppens-Boulahia and Yehia Elrakaiby", title = "Formal specification and management of security policies with collective group obligations", journal = j-J-COMP-SECUR, volume = "21", number = "1", pages = "149--190", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0459", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:44 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Geigel:2013:NNT, author = "Arturo Geigel", title = "Neural network {Trojan}", journal = j-J-COMP-SECUR, volume = "21", number = "2", pages = "191--232", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0460", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:48 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Phatak:2013:SIN, author = "Dhananjay Phatak and Alan T. Sherman and Nikhil Joshi and Bhushan Sonawane and Vivek G. Relan and Amol Dawalbhakta", title = "Spread Identity: A new dynamic address remapping mechanism for anonymity and {DDoS} defense", journal = j-J-COMP-SECUR, volume = "21", number = "2", pages = "233--281", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2012-0463", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:48 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kolesnikov:2013:SAP, author = "Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider", title = "A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design", journal = j-J-COMP-SECUR, volume = "21", number = "2", pages = "283--315", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130464", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:48 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jadliwala:2013:OMZ, author = "Murtuza Jadliwala and Igor Bilogrevic and Jean-Pierre Hubaux", title = "Optimizing mix-zone coverage in pervasive wireless networks", journal = j-J-COMP-SECUR, volume = "21", number = "3", pages = "317--346", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130465", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kobsa:2013:CJV, author = "Alfred Kobsa and Rishab Nithyanand and Gene Tsudik and Ersin Uzun", title = "Can {Jannie} verify? {Usability} of display-equipped {RFID} tags for security purposes", journal = j-J-COMP-SECUR, volume = "21", number = "3", pages = "347--370", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130470", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kreitz:2013:FSW, author = "Gunnar Kreitz", title = "Flow stealing: A well-timed redirection attack", journal = j-J-COMP-SECUR, volume = "21", number = "3", pages = "371--391", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130466", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Herzberg:2013:FJL, author = "Amir Herzberg and Ronen Margulies", title = "Forcing {Johnny} to login safely", journal = j-J-COMP-SECUR, volume = "21", number = "3", pages = "393--424", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130467", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DeCapitanidiVimercati:2013:SCM, author = "Sabrina {De Capitani di Vimercati} and Sara Foresti and Stefano Paraboschi and Gerardo Pelosi and Pierangela Samarati", title = "Supporting concurrency and multiple indexes in private access to outsourced data", journal = j-J-COMP-SECUR, volume = "21", number = "3", pages = "425--461", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130468", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:52 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Mardziel:2013:DEK, author = "Piotr Mardziel and Stephen Magill and Michael Hicks and Mudhakar Srivatsa", title = "Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation", journal = j-J-COMP-SECUR, volume = "21", number = "4", pages = "463--532", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130469", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:55 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zhou:2013:SVC, author = "Fangfei Zhou and Manish Goel and Peter Desnoyers and Ravi Sundaram", title = "Scheduler vulnerabilities and coordinated attacks in cloud computing", journal = j-J-COMP-SECUR, volume = "21", number = "4", pages = "533--559", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130474", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:55 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Homer:2013:AVM, author = "John Homer and Su Zhang and Xinming Ou and David Schmidt and Yanhui Du and S. Raj Rajagopalan and Anoop Singhal", title = "Aggregating vulnerability metrics in enterprise networks using attack graphs", journal = j-J-COMP-SECUR, volume = "21", number = "4", pages = "561--597", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130475", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:55 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Visconti:2013:SIA, author = "Ivan Visconti", title = "Special Issue: Advances in Security for Communication Networks", journal = j-J-COMP-SECUR, volume = "21", number = "5", pages = "599--600", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130483", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Baron:2013:SPM, author = "Joshua Baron and Karim {El Defrawy} and Kirill Minkovich and Rafail Ostrovsky and Eric Tressler", title = "{5PM}: Secure pattern matching", journal = j-J-COMP-SECUR, volume = "21", number = "5", pages = "601--625", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130481", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib; https://www.math.utah.edu/pub/tex/bib/string-matching.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Blazy:2013:SBS, author = "Olivier Blazy and Georg Fuchsbauer and David Pointcheval and Damien Vergnaud", title = "Short blind signatures", journal = j-J-COMP-SECUR, volume = "21", number = "5", pages = "627--661", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130477", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gentry:2013:FSB, author = "Craig Gentry and Shai Halevi and Chris Peikert and Nigel P. Smart", title = "Field switching in {BGV}-style homomorphic encryption", journal = j-J-COMP-SECUR, volume = "21", number = "5", pages = "663--684", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130480", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lipmaa:2013:MEC, author = "Helger Lipmaa and Bingsheng Zhang", title = "A more efficient computationally sound non-interactive zero-knowledge shuffle argument", journal = j-J-COMP-SECUR, volume = "21", number = "5", pages = "685--719", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130478", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Myers:2013:BBC, author = "Steven Myers and Mona Sergi and abhi shelat", title = "Black-box construction of a more than non-malleable {CCA1} encryption scheme from plaintext awareness", journal = j-J-COMP-SECUR, volume = "21", number = "5", pages = "721--748", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130485", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Nieto:2013:PVC, author = "Juan Gonz{\'a}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila", title = "Publicly verifiable ciphertexts", journal = j-J-COMP-SECUR, volume = "21", number = "5", pages = "749--778", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130473", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:25:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Degano:2013:P, author = "Pierpaolo Degano and Joshua D. Guttman", title = "Preface", journal = j-J-COMP-SECUR, volume = "21", number = "6", pages = "779--780", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130488", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:04 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Paiola:2013:VSP, author = "Miriam Paiola and Bruno Blanchet", title = "Verification of security protocols with lists: From length one to unbounded length", journal = j-J-COMP-SECUR, volume = "21", number = "6", pages = "781--816", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130471", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:04 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Basin:2013:PRI, author = "David Basin and Cas Cremers and Simon Meier", title = "Provably repairing the {ISO\slash IEC 9798} standard for entity authentication", journal = j-J-COMP-SECUR, volume = "21", number = "6", pages = "817--846", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130472", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:04 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Arapinis:2013:PSC, author = "Myrto Arapinis and Sergiu Bursuc and Mark Ryan", title = "Privacy-supporting cloud computing by in-browser key translation", journal = j-J-COMP-SECUR, volume = "21", number = "6", pages = "847--880", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130489", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:04 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Barthe:2013:VIH, author = "Gilles Barthe and Benjamin Gr{\'e}goire and Sylvain Heraud and Federico Olmedo and Santiago Zanella-B{\'e}guelin", title = "Verified indifferentiable hashing into elliptic curves", journal = j-J-COMP-SECUR, volume = "21", number = "6", pages = "881--917", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130476", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:04 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Acar:2013:CCP, author = "Umut A. Acar and Amal Ahmed and James Cheney and Roly Perera", title = "A core calculus for provenance", journal = j-J-COMP-SECUR, volume = "21", number = "6", pages = "919--969", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130487", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:04 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Centenaro:2013:TBA, author = "Matteo Centenaro and Riccardo Focardi and Flaminia L. Luccio", title = "Type-based analysis of key management in {PKCS\#11} cryptographic devices", journal = j-J-COMP-SECUR, volume = "21", number = "6", pages = "971--1007", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130479", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:04 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2013:AIV, author = "Anonymous", title = "Author Index Volume 21 (2013)", journal = j-J-COMP-SECUR, volume = "21", number = "6", pages = "1009--1012", month = "????", year = "2013", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2013-21608", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:04 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lu:2014:OFR, author = "Haibing Lu and Jaideep Vaidya and Vijayalakshmi Atluri", title = "An optimization framework for role mining", journal = j-J-COMP-SECUR, volume = "22", number = "1", pages = "1--31", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130484", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:08 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yuen:2014:TCT, author = "Tsz Hon Yuen and Willy Susilo and Yi Mu", title = "Towards a cryptographic treatment of publish\slash subscribe systems", journal = j-J-COMP-SECUR, volume = "22", number = "1", pages = "33--67", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130486", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:08 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Niu:2014:FVS, author = "Jianwei Niu and Mark Reith and William H. Winsborough", title = "Formal verification of security properties in trust management policy", journal = j-J-COMP-SECUR, volume = "22", number = "1", pages = "69--153", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130490", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:08 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Peddinti:2014:WSQ, author = "Sai Teja Peddinti and Nitesh Saxena", title = "{Web} search query privacy: Evaluating query obfuscation and anonymizing networks", journal = j-J-COMP-SECUR, volume = "22", number = "1", pages = "155--199", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130491", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:08 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chatzikokolakis:2014:FAS, author = "Konstantinos Chatzikokolakis and Sebastian Alexander M{\"o}dersheim and Catuscia Palamidessi and Jun Pang", title = "Foundational aspects of security", journal = j-J-COMP-SECUR, volume = "22", number = "2", pages = "201--202", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140497", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Guttman:2014:EPP, author = "Joshua D. Guttman", title = "Establishing and preserving protocol security goals", journal = j-J-COMP-SECUR, volume = "22", number = "2", pages = "203--267", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140499", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ngo:2014:EVC, author = "Tri Minh Ngo and Mari{\"e}lle Stoelinga and Marieke Huisman", title = "Effective verification of confidentiality for multi-threaded programs", journal = j-J-COMP-SECUR, volume = "22", number = "2", pages = "269--300", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130492", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib; https://www.math.utah.edu/pub/tex/bib/multithreading.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Backes:2014:UIR, author = "Michael Backes and C{\u{a}}t{\u{a}}lin Hri{\c{t}}cu and Matteo Maffei", title = "Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations", journal = j-J-COMP-SECUR, volume = "22", number = "2", pages = "301--353", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130493", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Blundo:2014:EEP, author = "Carlo Blundo and Emiliano {De Cristofaro} and Paolo Gasti", title = "{EsPRESSO}: Efficient privacy-preserving evaluation of sample set similarity", journal = j-J-COMP-SECUR, volume = "22", number = "3", pages = "355--381", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130482", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:16 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Soupionis:2014:GTA, author = "Yannis Soupionis and Remous-Aris Koutsiamanis and Pavlos Efraimidis and Dimitris Gritzalis", title = "A game-theoretic analysis of preventing spam over {Internet Telephony} via audio {CAPTCHA}-based authentication", journal = j-J-COMP-SECUR, volume = "22", number = "3", pages = "383--413", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140496", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:16 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bisht:2014:ADP, author = "Prithvi Bisht and Timothy Hinrichs and Nazari Skrupsky and V. N. Venkatakrishnan", title = "Automated detection of parameter tampering opportunities and vulnerabilities in web applications", journal = j-J-COMP-SECUR, volume = "22", number = "3", pages = "415--465", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140498", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:16 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Desmet:2014:P, author = "Lieven Desmet and Martin Johns and Benjamin Livshits and Andrei Sabelfeld", title = "Preface", journal = j-J-COMP-SECUR, volume = "22", number = "4", pages = "467--468", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140506", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DeGroef:2014:SME, author = "Willem {De Groef} and Dominique Devriese and Nick Nikiforakis and Frank Piessens", title = "Secure multi-execution of web scripts: Theory and practice", journal = j-J-COMP-SECUR, volume = "22", number = "4", pages = "469--509", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130495", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Politz:2014:TBV, author = "Joe Gibbs Politz and Arjun Guha and Shriram Krishnamurthi", title = "Typed-based verification of {Web} sandboxes", journal = j-J-COMP-SECUR, volume = "22", number = "4", pages = "511--565", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140504", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Heiderich:2014:SAS, author = "M. Heiderich and M. Niemietz and F. Schuster and T. Holz and J. Schwenk", title = "Scriptless attacks: Stealing more pie without touching the sill", journal = j-J-COMP-SECUR, volume = "22", number = "4", pages = "567--599", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-130494", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bansal:2014:DCA, author = "Chetan Bansal and Karthikeyan Bhargavan and Antoine Delignat-Lavaud and Sergio Maffeis", title = "Discovering concrete attacks on website authorization by formal analysis", journal = j-J-COMP-SECUR, volume = "22", number = "4", pages = "601--657", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140503", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:20 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Backes:2014:MGE, author = "Michael Backes and Steve Zdancewic", title = "Message from the {Guest Editors}", journal = j-J-COMP-SECUR, volume = "22", number = "5", pages = "659--660", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140505", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Basin:2014:OFA, author = "David Basin and Samuel J. Burri and G{\"u}nter Karjoth", title = "Obstruction-free authorization enforcement: Aligning security and business objectives", journal = j-J-COMP-SECUR, volume = "22", number = "5", pages = "661--698", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140500", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Schlesinger:2014:MPA, author = "Cole Schlesinger and Karthik Pattabiraman and Nikhil Swamy and David Walker and Benjamin Zorn", title = "Modular protections against non-control data attacks", journal = j-J-COMP-SECUR, volume = "22", number = "5", pages = "699--742", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140502", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Arapinis:2014:SVS, author = "Myrto Arapinis and Joshua Phillips and Eike Ritter and Mark D. Ryan", title = "{StatVerif}: Verification of stateful processes", journal = j-J-COMP-SECUR, volume = "22", number = "5", pages = "743--821", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140501", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Dupressoir:2014:GGP, author = "Fran{\c{c}}ois Dupressoir and Andrew D. Gordon and Jan J{\"u}rjens and David A. Naumann", title = "Guiding a general-purpose {C} verifier to prove cryptographic protocols", journal = j-J-COMP-SECUR, volume = "22", number = "5", pages = "823--866", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140508", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:24 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Akinyele:2014:MGA, author = "Joseph A. Akinyele and Matthew Green and Susan Hohenberger and Matthew Pagano", title = "Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes", journal = j-J-COMP-SECUR, volume = "22", number = "6", pages = "867--912", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140507", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Braun:2014:CTM, author = "Johannes Braun and Florian Volk and Jiska Classen and Johannes Buchmann and Max M{\"u}hlh{\"a}user", title = "{CA} trust management for the {Web PKI}", journal = j-J-COMP-SECUR, volume = "22", number = "6", pages = "913--959", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140509", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Uzun:2014:SAT, author = "Emre Uzun and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural and Anna Lisa Ferrara and Gennaro Parlato and P. Madhusudan", title = "Security analysis for temporal role based access control", journal = j-J-COMP-SECUR, volume = "22", number = "6", pages = "961--996", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140510", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chen:2014:PUQ, author = "Yen-Chung Chen and Yu-Sung Wu and Wen-Guey Tzeng", title = "Preserving user query privacy in cloud-based security services", journal = j-J-COMP-SECUR, volume = "22", number = "6", pages = "997--1024", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140520", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Buchmann:2014:TMS, author = "Nicolas Buchmann and Harald Baier", title = "Towards a more secure and scalable verifying {PKI} of {eMRTD}", journal = j-J-COMP-SECUR, volume = "22", number = "6", pages = "1025--1049", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140522", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2014:AIV, author = "Anonymous", title = "Author Index Volume 22 (2014)", journal = j-J-COMP-SECUR, volume = "22", number = "6", pages = "1051--1054", month = "????", year = "2014", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-2014-22606", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:28 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yang:2015:PAA, author = "Ping Yang and Mikhail I. Gofman and Scott D. Stoller and Zijiang Yang", title = "Policy analysis for administrative role based access control without separate administration", journal = j-J-COMP-SECUR, volume = "23", number = "1", pages = "1--29", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140511", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Mitra:2015:GTR, author = "Barsha Mitra and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya", title = "The generalized temporal role mining problem", journal = j-J-COMP-SECUR, volume = "23", number = "1", pages = "31--58", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140512", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DeCapitanidiVimercati:2015:LAI, author = "Sabrina {De Capitani di Vimercati} and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati", title = "Loose associations to increase utility in data publishing", journal = j-J-COMP-SECUR, volume = "23", number = "1", pages = "59--88", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140513", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{AlBouna:2015:ATD, author = "Bechara {Al Bouna} and Chris Clifton and Qutaibah Malluhi", title = "Anonymizing transactional datasets", journal = j-J-COMP-SECUR, volume = "23", number = "1", pages = "89--106", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140517", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lu:2015:TUO, author = "Haibing Lu and Yuan Hong and Yanjiang Yang and Lian Duan and Nazia Badar", title = "Towards user-oriented {RBAC} model", journal = j-J-COMP-SECUR, volume = "23", number = "1", pages = "107--129", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140519", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Liu:2015:JSD, author = "Wen Ming Liu and Lingyu Wang and Lei Zhang and Shunzhi Zhu", title = "$k$-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure", journal = j-J-COMP-SECUR, volume = "23", number = "2", pages = "131--165", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140514", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bates:2015:AWK, author = "Adam Bates and Kevin R. B. Butler and Micah Sherr and Clay Shields and Patrick Traynor and Dan Wallach", title = "Accountable wiretapping --- or --- {I} know they can hear you now", journal = j-J-COMP-SECUR, volume = "23", number = "2", pages = "167--195", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140515", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{vanderMeyden:2015:WII, author = "Ron van der Meyden", title = "What, indeed, is intransitive noninterference?", journal = j-J-COMP-SECUR, volume = "23", number = "2", pages = "197--228", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140516", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Boureanu:2015:PPS, author = "Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay", title = "Practical and provably secure distance-bounding", journal = j-J-COMP-SECUR, volume = "23", number = "2", pages = "229--257", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140518", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:36 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gibson-Robinson:2015:VLS, author = "Thomas Gibson-Robinson and Allaa Kamil and Gavin Lowe", title = "Verifying layered security protocols", journal = j-J-COMP-SECUR, volume = "23", number = "3", pages = "259--307", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150526", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Dimitrakakis:2015:ELA, author = "Christos Dimitrakakis and Aikaterini Mitrokotsa and Serge Vaudenay", title = "Expected loss analysis for authentication in constrained channels", journal = j-J-COMP-SECUR, volume = "23", number = "3", pages = "309--329", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140521", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cade:2015:PGI, author = "David Cad{\'e} and Bruno Blanchet", title = "Proved generation of implementations from computationally secure protocol specifications", journal = j-J-COMP-SECUR, volume = "23", number = "3", pages = "331--402", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150524", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yuan:2015:PPC, author = "Jiawei Yuan and Shucheng Yu", title = "{PCPOR}: Public and constant-cost proofs of retrievability in {cloud1}", journal = j-J-COMP-SECUR, volume = "23", number = "3", pages = "403--425", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150525", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Alvim:2015:ILD, author = "M{\'a}rio S. Alvim and Miguel E. Andr{\'e}s and Konstantinos Chatzikokolakis and Pierpaolo Degano and Catuscia Palamidessi", title = "On the information leakage of differentially-private mechanisms", journal = j-J-COMP-SECUR, volume = "23", number = "4", pages = "427--469", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150528", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:43 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Shen:2015:DIC, author = "Shiuan-Tzuo Shen and Wen-Guey Tzeng", title = "Delegated integrity check for hierarchical cloud data", journal = j-J-COMP-SECUR, volume = "23", number = "4", pages = "471--508", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150527", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:43 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bugliesi:2015:CPB, author = "Michele Bugliesi and Stefano Calzavara and Riccardo Focardi and Wilayat Khan", title = "{CookiExt}: Patching the browser against session hijacking attacks", journal = j-J-COMP-SECUR, volume = "23", number = "4", pages = "509--537", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150529", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:43 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Spalazzi:2015:SIS, author = "Luca Spalazzi and Luca Vigan{\`o}", title = "Special issue on security and high performance computing systems", journal = j-J-COMP-SECUR, volume = "23", number = "5", pages = "539--540", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150537", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:46 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lowden:2015:DPA, author = "Jason Lowden and Marcin {\L}ukowiak and Sonia Lopez Alarcon", title = "Design and performance analysis of efficient {Keccak} tree hashing on {GPU} architectures", journal = j-J-COMP-SECUR, volume = "23", number = "5", pages = "541--562", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150534", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:46 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bella:2015:SSP, author = "Giampaolo Bella and Paul Curzon and Gabriele Lenzini", title = "Service security and privacy as a socio-technical problem", journal = j-J-COMP-SECUR, volume = "23", number = "5", pages = "563--585", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150536", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:46 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Dreier:2015:BFP, author = "Jannik Dreier and Jean-Guillaume Dumas and Pascal Lafourcade", title = "{Brandt}'s fully private auction protocol revisited", journal = j-J-COMP-SECUR, volume = "23", number = "5", pages = "587--610", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150535", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:46 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Merlo:2015:MEP, author = "Alessio Merlo and Mauro Migliardi and Paolo Fontanelli", title = "Measuring and estimating power consumption in {Android} to support energy-based intrusion detection", journal = j-J-COMP-SECUR, volume = "23", number = "5", pages = "611--637", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150530", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:46 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2015:RPS, author = "Anonymous", title = "Regular Paper Section", journal = j-J-COMP-SECUR, volume = "23", number = "5", pages = "639--639", month = "????", year = "2015", CODEN = "JCSIET", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:46 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Belim:2015:AGR, author = "Sergey Belim and Nadezda Bogachenko and Evgeniy Ilushechkin", title = "An analysis of graphs that represent a role-based security policy hierarchy", journal = j-J-COMP-SECUR, volume = "23", number = "5", pages = "641--657", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150532", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:46 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Li:2015:NAC, author = "Jin Li and Xiaofeng Chen and Jingwei Li and Chunfu Jia and Jianfeng Ma and Wenjing Lou", title = "New access control systems based on outsourced attribute-based encryption", journal = j-J-COMP-SECUR, volume = "23", number = "6", pages = "659--683", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150533", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:51 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Alshehri:2015:FFS, author = "Ali Alshehri and Steve Schneider", title = "A formal framework for security analysis of {NFC} mobile coupon protocols", journal = j-J-COMP-SECUR, volume = "23", number = "6", pages = "685--707", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150531", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:51 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bonatti:2015:EDR, author = "Piero Bonatti and Clemente Galdi and Davide Torres", title = "Event-driven {RBAC}", journal = j-J-COMP-SECUR, volume = "23", number = "6", pages = "709--757", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150539", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:51 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Mallios:2015:PCE, author = "Yannis Mallios and Lujo Bauer and Dilsun Kaynar and Fabio Martinelli and Charles Morisset", title = "Probabilistic cost enforcement of security policies", journal = j-J-COMP-SECUR, volume = "23", number = "6", pages = "759--787", month = "????", year = "2015", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150538", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:51 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2015:AIV, author = "Anonymous", title = "Author Index Volume 23 (2015)", journal = j-J-COMP-SECUR, volume = "23", number = "6", pages = "789--791", month = "????", year = "2015", CODEN = "JCSIET", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:51 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bohl:2016:SUC, author = "Florian B{\"o}hl and Dominique Unruh", title = "Symbolic universal composability", journal = j-J-COMP-SECUR, volume = "24", number = "1", pages = "1--38", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-140523", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:55 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Rafnsson:2016:SME, author = "Willard Rafnsson and Andrei Sabelfeld", title = "Secure multi-execution: Fine-grained, declassification-aware, and transparent", journal = j-J-COMP-SECUR, volume = "24", number = "1", pages = "39--90", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150541", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:55 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Luo:2016:MCM, author = "Zhengqin Luo and Jos{\'e} Fragoso Santos and Ana Almeida Matos and Tamara Rezk", title = "{Mashic} compiler: Mashup sandboxing based on inter-frame communication", journal = j-J-COMP-SECUR, volume = "24", number = "1", pages = "91--136", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160542", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:55 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Carter:2016:SOG, author = "Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler", title = "Secure outsourced garbled circuit evaluation for mobile devices", journal = j-J-COMP-SECUR, volume = "24", number = "2", pages = "137--180", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-150540", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hedin:2016:IFS, author = "Daniel Hedin and Luciano Bello and Andrei Sabelfeld", title = "Information-flow security for {JavaScript} and its {APIs}", journal = j-J-COMP-SECUR, volume = "24", number = "2", pages = "181--234", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160544", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/java2010.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Taglienti:2016:UAP, author = "Claudio Taglienti and James Cannady", title = "The user attribution problem and the challenge of persistent surveillance of user activity in complex networks", journal = j-J-COMP-SECUR, volume = "24", number = "2", pages = "235--288", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160546", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chen:2016:PEP, author = "Yu Chen and Zongyang Zhang", title = "Publicly evaluable pseudorandom functions and their applications", journal = j-J-COMP-SECUR, volume = "24", number = "2", pages = "289--320", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160547", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:26:59 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Vavilis:2016:SBQ, author = "Sokratis Vavilis and Milan Petkovi{\'c} and Nicola Zannone", title = "A severity-based quantification of data leakages in database systems", journal = j-J-COMP-SECUR, volume = "24", number = "3", pages = "321--345", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160543", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 12 16:13:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DeCapitanidiVimercati:2016:EIC, author = "Sabrina {De Capitani di Vimercati} and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati", title = "Efficient integrity checks for join queries in the cloud", journal = j-J-COMP-SECUR, volume = "24", number = "3", pages = "347--378", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160545", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 12 16:13:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Le:2016:MCR, author = "Meixing Le and Krishna Kant and Malek Athamnah and Sushil Jajodia", title = "Minimum cost rule enforcement for cooperative database access", journal = j-J-COMP-SECUR, volume = "24", number = "3", pages = "379--403", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160548", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 12 16:13:31 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jing:2016:TML, author = "Yiming Jing and Gail-Joon Ahn and Hongxin Hu and Haehyun Cho and Ziming Zhao", title = "{TripleMon}: A multi-layer security framework for mediating inter-process communication on {Android}", journal = j-J-COMP-SECUR, volume = "24", number = "4", pages = "405--426", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160552", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 12 16:13:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bodei:2016:CAS, author = "Chiara Bodei and Pierpaolo Degano and Letterio Galletta and Francesco Salvatori", title = "Context-aware security: Linguistic mechanisms and static analysis", journal = j-J-COMP-SECUR, volume = "24", number = "4", pages = "427--477", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160551", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 12 16:13:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DiCrescenzo:2016:PPP, author = "Giovanni {Di Crescenzo} and Debra L. Cook and Allen McIntosh and Euthimios Panagos", title = "Practical and privacy-preserving information retrieval from a database table", journal = j-J-COMP-SECUR, volume = "24", number = "4", pages = "479--506", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160550", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 12 16:13:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kar:2016:SSI, author = "Debabrata Kar and Suvasini Panigrahi and Srikanth Sundararajan", title = "{SQLiDDS}: {SQL} injection detection using document similarity measure", journal = j-J-COMP-SECUR, volume = "24", number = "4", pages = "507--539", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160554", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 12 16:13:32 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lester:2016:IFA, author = "Martin Lester and Luke Ong and Max Sch{\"a}fer", title = "Information flow analysis for a dynamically typed language with staged metaprogramming", journal = j-J-COMP-SECUR, volume = "24", number = "5", pages = "541--582", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160557", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:06 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kremer:2016:AAS, author = "Steve Kremer and Robert K{\"u}nnemann", title = "Automated analysis of security protocols with global state", journal = j-J-COMP-SECUR, volume = "24", number = "5", pages = "583--616", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160556", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:06 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DSouza:2016:MCT, author = "Deepak D'Souza and K. R. Raghavendra", title = "Model-checking trace-based information flow properties for infinite-state systems", journal = j-J-COMP-SECUR, volume = "24", number = "5", pages = "617--643", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160549", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:06 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sonchack:2016:ELS, author = "John Sonchack and Adam J. Aviv", title = "Exploring large scale security system reproducibility with the {LESS} simulator", journal = j-J-COMP-SECUR, volume = "24", number = "5", pages = "645--665", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160553", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:06 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Davidson:2016:CSS, author = "Michal Davidson and Tamir Tassa and Ehud Gudes", title = "Content sharing schemes in {DRM} systems with enhanced performance and privacy preservation", journal = j-J-COMP-SECUR, volume = "24", number = "6", pages = "667--688", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-15746", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:07 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{deAmorim:2016:VIF, author = "Arthur Azevedo de Amorim and Nathan Collins and Andr{\'e} DeHon and Delphine Demange and C{\u{a}}t{\u{a}}lin Hri{\c{t}}cu and David Pichardie and Benjamin C. Pierce and Randy Pollack and Andrew Tolmach", title = "A verified information-flow architecture", journal = j-J-COMP-SECUR, volume = "24", number = "6", pages = "689--734", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-15784", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:07 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Jajodia:2016:UTP, author = "Sushil Jajodia and Noseong Park and Edoardo Serra and V. S. Subrahmanian", title = "Using temporal probabilistic logic for optimal monitoring of security events with limited resources", journal = j-J-COMP-SECUR, volume = "24", number = "6", pages = "735--791", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160555", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:07 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Guanciale:2016:PSM, author = "Roberto Guanciale and Hamed Nemati and Mads Dam and Christoph Baumann", title = "Provably secure memory isolation for {Linux} on {ARM}", journal = j-J-COMP-SECUR, volume = "24", number = "6", pages = "793--837", month = "????", year = "2016", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-160558", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:07 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib; https://www.math.utah.edu/pub/tex/bib/linux.bib; https://www.math.utah.edu/pub/tex/bib/unix.bib; https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2016:AIV, author = "Anonymous", title = "Author Index Volume 24 (2016)", journal = j-J-COMP-SECUR, volume = "24", number = "6", pages = "839--841", month = "????", year = "2016", CODEN = "JCSIET", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:07 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Halpern:2017:QQP, author = "Joseph Y. Halpern", title = "From qualitative to quantitative proofs of security properties using first-order conditional logic", journal = j-J-COMP-SECUR, volume = "25", number = "1", pages = "1--19", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-15774", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:08 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cortier:2017:FAN, author = "V{\'e}ronique Cortier and Cyrille Wiedling", title = "A formal analysis of the {Norwegian} {E}-voting protocol", journal = j-J-COMP-SECUR, volume = "25", number = "1", pages = "21--57", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-15777", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:08 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Wuller:2017:DPP, author = "Stefan W{\"u}ller and Daniel Mayer and Fabian F{\"o}rg and Samuel Sch{\"u}ppen and Benjamin Assadsolimani and Ulrike Meyer and Susanne Wetzel", title = "Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques", journal = j-J-COMP-SECUR, volume = "25", number = "1", pages = "59--81", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16830", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:08 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Crampton:2017:BOW, author = "Jason Crampton and Gregory Gutin and Daniel Karapetyan and R{\'e}mi Watrigant", title = "The bi-objective workflow satisfiability problem and workflow resiliency", journal = j-J-COMP-SECUR, volume = "25", number = "1", pages = "83--115", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16849", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:08 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Continella:2017:PAW, author = "Andrea Continella and Michele Carminati and Mario Polino and Andrea Lanzi and Stefano Zanero and Federico Maggi", title = "{Prometheus}: Analyzing {WebInject}-based information stealers", journal = j-J-COMP-SECUR, volume = "25", number = "2", pages = "117--137", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-15773", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:09 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Guan:2017:SKE, author = "Albert Guan and Wen-Guey Tzeng", title = "A secret key establishment protocol for wireless networks using noisy channels", journal = j-J-COMP-SECUR, volume = "25", number = "2", pages = "139--151", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-15807", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:09 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lin:2017:SAC, author = "Chung-Yi Lin and Wen-Guey Tzeng", title = "Strategy analysis for cloud storage reliability management based on game theory", journal = j-J-COMP-SECUR, volume = "25", number = "2", pages = "153--171", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16813", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:09 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Migault:2017:DEI, author = "Daniel Migault and Tobias Guggemos and Sylvain Killian and Maryline Laurent and Guy Pujolle and Jean Philippe Wary", title = "{Diet-ESP}: {IP} layer security for {IoT}", journal = j-J-COMP-SECUR, volume = "25", number = "2", pages = "173--203", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16857", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:09 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Mohamed:2017:SUD, author = "Manar Mohamed and Song Gao and Niharika Sachdeva and Nitesh Saxena and Chengcui Zhang and Ponnurangam Kumaraguru and Paul C. {Van Oorschot}", title = "On the security and usability of dynamic cognitive game {CAPTCHAs}", journal = j-J-COMP-SECUR, volume = "25", number = "3", pages = "205--230", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16847", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:10 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cheng:2017:SFN, author = "Yao Cheng and Yingjiu Li and Robert Deng and Lingyun Ying and Wei He", title = "A study on a feasible no-root approach on {Android}", journal = j-J-COMP-SECUR, volume = "25", number = "3", pages = "231--253", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16866", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:10 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{dosSantos:2017:AFE, author = "Daniel Ricardo dos Santos and Silvio Ranise and Luca Compagna and Serena Elisa Ponta", title = "Automatically finding execution scenarios to deploy security-sensitive workflows", journal = j-J-COMP-SECUR, volume = "25", number = "3", pages = "255--282", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16894", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:10 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Choo:2017:DOS, author = "Euijin Choo and Ting Yu and Min Chi", title = "Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis", journal = j-J-COMP-SECUR, volume = "25", number = "3", pages = "283--318", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16941", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Jun 5 17:50:10 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Murray:2017:SIV, author = "Toby Murray and Andrei Sabelfeld and Lujo Bauer", title = "Special issue on verified information flow security", journal = j-J-COMP-SECUR, volume = "25", number = "4--5", pages = "319--321", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-0559", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:12 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Broberg:2017:PPP, author = "Niklas Broberg and Bart van Delft and David Sands", title = "{Paragon} --- Practical programming with information flow control", journal = j-J-COMP-SECUR, volume = "25", number = "4--5", pages = "323--365", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-15791", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:12 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Liu:2017:FBO, author = "Jed Liu and Owen Arden and Michael D. George and Andrew C. Myers", title = "{Fabric}: Building open distributed systems securely by construction", journal = j-J-COMP-SECUR, volume = "25", number = "4--5", pages = "367--426", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-15805", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:12 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Giffin:2017:HPD, author = "Daniel Giffin and Amit Levy and Deian Stefan and David Terei and David Mazi{\`e}res and John Mitchell and Alejandro Russo", title = "{Hails}: Protecting data privacy in untrusted web applications", journal = j-J-COMP-SECUR, volume = "25", number = "4--5", pages = "427--461", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-15801", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:12 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Rocchetto:2017:IBM, author = "Marco Rocchetto and Luca Vigan{\`o} and Marco Volpe", title = "An interpolation-based method for the verification of security protocols", journal = j-J-COMP-SECUR, volume = "25", number = "6", pages = "463--510", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16832", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:13 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Crampton:2017:CEI, author = "Jason Crampton and Naomi Farley and Gregory Gutin and Mark Jones and Bertram Poettering", title = "Cryptographic enforcement of information flow policies without public information via tree partitions", journal = j-J-COMP-SECUR, volume = "25", number = "6", pages = "511--535", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16863", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:13 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chen:2017:RDI, author = "Bo Chen and Reza Curtmola", title = "Remote data integrity checking with server-side repair", journal = j-J-COMP-SECUR, volume = "25", number = "6", pages = "537--584", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16868", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:13 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Kanovich:2017:TCC, author = "Max Kanovich and Tajana Ban Kirigin and Vivek Nigam and Andre Scedrov and Carolyn Talcott", title = "Time, computational complexity, and probability in the analysis of distance-bounding protocols", journal = j-J-COMP-SECUR, volume = "25", number = "6", pages = "585--630", month = "????", year = "2017", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-0560", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:13 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Anonymous:2017:AIV, author = "Anonymous", title = "Author Index Volume 25 (2017)", journal = j-J-COMP-SECUR, volume = "25", number = "6", pages = "631--633", month = "????", year = "2017", CODEN = "JCSIET", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:13 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Moataz:2018:SSE, author = "Tarik Moataz and Indrajit Ray and Indrakshi Ray and Abdullatif Shikfa and Fr{\'e}d{\'e}ric Cuppens and Nora Cuppens", title = "Substring search over encrypted data", journal = j-J-COMP-SECUR, volume = "26", number = "1", pages = "1--30", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-14652", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:14 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Preda:2018:CPD, author = "Mila Dalla Preda and Isabella Mastroeni", title = "Characterizing a property-driven obfuscation strategy", journal = j-J-COMP-SECUR, volume = "26", number = "1", pages = "31--69", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-14672", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:14 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Sprenger:2018:RSP, author = "Christoph Sprenger and David Basin", title = "Refining security protocols", journal = j-J-COMP-SECUR, volume = "26", number = "1", pages = "71--120", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16814", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:14 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Stoller:2018:MHT, author = "Scott D. Stoller and Thang Bui", title = "Mining hierarchical temporal roles with multiple metrics", journal = j-J-COMP-SECUR, volume = "26", number = "1", pages = "121--142", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-17989", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:14 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{DeCapitanidiVimercati:2018:EAW, author = "Sabrina {De Capitani di Vimercati} and Sara Foresti and Stefano Paraboschi and Gerardo Pelosi and Pierangela Samarati", title = "Enforcing authorizations while protecting access confidentiality", journal = j-J-COMP-SECUR, volume = "26", number = "2", pages = "143--175", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171004", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:15 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Levy:2018:SHB, author = "Silvie Levy and Ehud Gudes and Nurit Gal-Oz", title = "Sharing-habits based privacy control in social networks", journal = j-J-COMP-SECUR, volume = "26", number = "2", pages = "177--205", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171012", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:15 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Neville:2018:RAF, author = "Ultan Neville and Simon N. Foley", title = "Reasoning about firewall policies through refinement and composition", journal = j-J-COMP-SECUR, volume = "26", number = "2", pages = "207--254", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-17971", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:15 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Gupta:2018:SCA, author = "Haritabh Gupta and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya", title = "A side-channel attack on smartphones: Deciphering key taps using built-in microphones", journal = j-J-COMP-SECUR, volume = "26", number = "2", pages = "255--281", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-17975", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:15 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Diao:2018:AMU, author = "Wenrui Diao and Rui Liu and Xiangyu Liu and Zhe Zhou and Zhou Li and Kehuan Zhang", title = "Accessing mobile user's privacy based on {IME} personalization: Understanding and practical attacks", journal = j-J-COMP-SECUR, volume = "26", number = "3", pages = "283--309", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16909", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:16 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Shirvanian:2018:SVI, author = "Maliheh Shirvanian and Nitesh Saxena and Dibya Mukhopadhyay", title = "Short voice imitation man-in-the-middle attacks on {Crypto Phones}: Defeating humans and machines", journal = j-J-COMP-SECUR, volume = "26", number = "3", pages = "311--333", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-17970", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:16 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Bischof:2018:LDS, author = "Simon Bischof and Joachim Breitner and J{\"u}rgen Graf and Martin Hecker and Martin Mohr and Gregor Snelting", title = "Low-deterministic security for low-nondeterministic programs", journal = j-J-COMP-SECUR, volume = "26", number = "3", pages = "335--366", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-17984", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:16 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Blanchet:2018:ARE, author = "Bruno Blanchet and Ben Smyth", title = "Automated reasoning for equivalences in the applied pi calculus with barriers", journal = j-J-COMP-SECUR, volume = "26", number = "3", pages = "367--422", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171013", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:16 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ranise:2018:AEA, author = "Silvio Ranise and Anh Truong and Luca Vigan{\`o}", title = "Automated and efficient analysis of administrative temporal {RBAC} policies with role hierarchies", journal = j-J-COMP-SECUR, volume = "26", number = "4", pages = "423--458", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-15756", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:17 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Nguyen:2018:ASP, author = "Binh Thanh Nguyen and Christoph Sprenger and Cas Cremers", title = "Abstractions for security protocol verification", journal = j-J-COMP-SECUR, volume = "26", number = "4", pages = "459--508", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-15769", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:17 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Giustolisi:2018:ICM, author = "Rosario Giustolisi and Giampaolo Bella and Gabriele Lenzini", title = "Invalid certificates in modern browsers: a socio-technical analysis", journal = j-J-COMP-SECUR, volume = "26", number = "4", pages = "509--541", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-16891", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:17 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Balagani:2018:IAC, author = "Kiran S. Balagani and Paolo Gasti and Aaron Elliott and Azriel Richardson and Mike O'Neal", title = "The impact of application context on privacy and performance of keystroke authentication systems", journal = j-J-COMP-SECUR, volume = "26", number = "4", pages = "543--556", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171017", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:17 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hallgren:2018:AB, author = "Per Hallgren and Ravi Kishore and Mart{\'\i}n Ochoa and Andrei Sabelfeld", title = "Assuring {BetterTimes}", journal = j-J-COMP-SECUR, volume = "26", number = "4", pages = "557--587", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171085", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:17 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Luckett:2018:ISM, author = "Patrick Luckett and J. Todd McDonald and William B. Glisson and Ryan Benton and Joel Dawson and Blair A. Doyle", title = "Identifying stealth malware using {CPU} power consumption and learning algorithms", journal = j-J-COMP-SECUR, volume = "26", number = "5", pages = "589--613", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171060", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:18 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chakraborty:2018:HAD, author = "Tanmoy Chakraborty and Sushil Jajodia and Noseong Park and Andrea Pugliese and Edoardo Serra and V. S. Subrahmanian", title = "Hybrid adversarial defense: Merging honeypots and traditional security methods", journal = j-J-COMP-SECUR, volume = "26", number = "5", pages = "615--645", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171094", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:18 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Chen:2018:KSQ, author = "Ling Chen and Ting Yu and Rada Chirkova", title = "{$k$-Skyband} query answering with differential privacy", journal = j-J-COMP-SECUR, volume = "26", number = "5", pages = "647--676", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171101", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:18 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Fuhry:2018:HPS, author = "Benny Fuhry and Raad Bahmani and Ferdinand Brasser and Florian Hahn and Florian Kerschbaum and Ahmad-Reza Sadeghi", title = "{HardIDX}: Practical and secure index with {SGX} in a malicious environment", journal = j-J-COMP-SECUR, volume = "26", number = "5", pages = "677--706", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171103", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:18 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Han:2018:RAM, author = "Jin Han and Wangyu Zang and Li Liu and Songqing Chen and Meng Yu", title = "Risk-aware multi-objective optimized virtual machine placement in the cloud", journal = j-J-COMP-SECUR, volume = "26", number = "5", pages = "707--730", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171104", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:18 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib; https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Lorenzi:2018:TDR, author = "David Lorenzi and Emre Uzun and Jaideep Vaidya and Shamik Sural and Vijayalakshmi Atluri", title = "Towards designing robust {CAPTCHAs}", journal = j-J-COMP-SECUR, volume = "26", number = "6", pages = "731--760", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-17947", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:19 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Borbor:2018:SUV, author = "Daniel Borbor and Lingyu Wang and Sushil Jajodia and Anoop Singhal", title = "Surviving unpatchable vulnerabilities through heterogeneous network hardening options", journal = j-J-COMP-SECUR, volume = "26", number = "6", pages = "761--789", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171106", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:19 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zhang:2018:PPV, author = "Jun Zhang and Meiqi He and Gongxian Zeng and Siu-Ming Yiu", title = "Privacy-preserving verifiable elastic net among multiple institutions in the cloud", journal = j-J-COMP-SECUR, volume = "26", number = "6", pages = "791--815", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171107", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:19 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Barenghi:2018:SPX, author = "Alessandro Barenghi and Nicholas Mainardi and Gerardo Pelosi", title = "Systematic parsing of {X.509}: Eradicating security issues with a parse tree", journal = j-J-COMP-SECUR, volume = "26", number = "6", pages = "817--849", month = "????", year = "2018", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171110", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:19 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Maffei:2019:GOP, author = "Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schr{\"o}der", title = "Group {ORAM} for privacy and access control in outsourced personal records", journal = j-J-COMP-SECUR, volume = "27", number = "1", pages = "1--47", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171030", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:20 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Salva:2019:CAS, author = "S{\'e}bastien Salva and Loukmen Regainia", title = "A catalogue associating security patterns and attack steps to design secure applications", journal = j-J-COMP-SECUR, volume = "27", number = "1", pages = "49--74", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171063", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:20 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Demay:2019:PSS, author = "Gr{\'e}gory Demay and Peter Ga{\v{z}}i and Ueli Maurer and Bj{\"o}rn Tackmann", title = "Per-session security: Password-based cryptography revisited", journal = j-J-COMP-SECUR, volume = "27", number = "1", pages = "75--111", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-181131", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:20 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Armknecht:2019:PIR, author = "Frederik Armknecht and Zinaida Benenson and Philipp Morgner and Christian M{\"u}ller and Christian Riess", title = "Privacy implications of room climate data", journal = j-J-COMP-SECUR, volume = "27", number = "1", pages = "113--136", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-181133", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:20 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Blazy:2019:VCT, author = "Sandrine Blazy and David Pichardie and Alix Trieu", title = "Verifying constant-time implementations by abstract interpretation", journal = j-J-COMP-SECUR, volume = "27", number = "1", pages = "137--163", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-181136", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:20 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Majumdar:2019:LPD, author = "Suryadipta Majumdar and Azadeh Tabiban and Yosr Jarraya and Momen Oqaily and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi", title = "Learning probabilistic dependencies among events for proactive security auditing in clouds", journal = j-J-COMP-SECUR, volume = "27", number = "2", pages = "165--202", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-181137", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:21 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Cremers:2019:SAG, author = "Cas Cremers and Martin Dehnel-Wild and Kevin Milner", title = "Secure authentication in the grid: a formal analysis of {DNP3 SAv5}", journal = j-J-COMP-SECUR, volume = "27", number = "2", pages = "203--232", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-181139", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:21 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Calzavara:2019:SSH, author = "Stefano Calzavara and Alvise Rabitti and Michele Bugliesi", title = "Sub-session hijacking on the web: Root causes and prevention", journal = j-J-COMP-SECUR, volume = "27", number = "2", pages = "233--257", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-181149", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:21 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Tian:2019:DSD, author = "Yangguang Tian and Yingjiu Li and Guomin Yang and Willy Susilo and Yi Mu and Hui Cui and Yinghui Zhang", title = "{DABKE}: Secure deniable attribute-based key exchange framework", journal = j-J-COMP-SECUR, volume = "27", number = "2", pages = "259--275", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-181201", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:21 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Hirschi:2019:MUV, author = "Lucca Hirschi and David Baelde and St{\'e}phanie Delaune", title = "A method for unbounded verification of privacy-type properties", journal = j-J-COMP-SECUR, volume = "27", number = "3", pages = "277--342", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-171070", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:22 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Zavatteri:2019:LMS, author = "Matteo Zavatteri and Luca Vigan{\`o}", title = "Last man standing: Static, decremental and dynamic resiliency via controller synthesis", journal = j-J-COMP-SECUR, volume = "27", number = "3", pages = "343--373", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-181244", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:22 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yu:2019:CAF, author = "Xingjie Yu and Michael Shiwen Thang and Yingjiu Li and Robert Huijie Deng", title = "Collusion attacks and fair time-locked deposits for fast-payment transactions in {Bitcoin}", journal = j-J-COMP-SECUR, volume = "27", number = "3", pages = "375--403", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-191274", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:22 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Balagani:2019:PPP, author = "Kiran Balagani and Matteo Cardaioli and Mauro Conti and Paolo Gasti and Martin Georgiev and Tristan Gurtler and Daniele Lain and Charissa Miller and Kendall Molas and Nikita Samarin and Eugen Saraci and Gene Tsudik and Lynn Wu", title = "{PILOT}: Password and {PIN} information leakage from obfuscated typing videos", journal = j-J-COMP-SECUR, volume = "27", number = "4", pages = "405--425", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-191289", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:23 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Alhebaishi:2019:MIT, author = "Nawaf Alhebaishi and Lingyu Wang and Sushil Jajodia and Anoop Singhal", title = "Mitigating the insider threat of remote administrators in clouds through maintenance task assignments", journal = j-J-COMP-SECUR, volume = "27", number = "4", pages = "427--458", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-191306", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:23 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Urban:2019:ALP, author = "Tobias Urban and Dennis Tatang and Thorsten Holz and Norbert Pohlmann", title = "Analyzing leakage of personal information by malware", journal = j-J-COMP-SECUR, volume = "27", number = "4", pages = "459--481", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-191287", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:23 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Batra:2019:DAP, author = "Gunjan Batra and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural", title = "Deploying {ABAC} policies using {RBAC} systems", journal = j-J-COMP-SECUR, volume = "27", number = "4", pages = "483--506", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-191315", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:23 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Stergiopoulos:2019:USC, author = "George Stergiopoulos and Georgia Chronopoulou and Evangelos Bitsikas and Nikolaos Tsalis and Dimitris Gritzalis", title = "Using side channel {TCP} features for real-time detection of malware connections", journal = j-J-COMP-SECUR, volume = "27", number = "5", pages = "507--520", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-191286", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:24 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Rubio:2019:TAI, author = "Juan E. Rubio and Rodrigo Roman and Cristina Alcaraz and Yan Zhang", title = "Tracking {APTs} in industrial ecosystems: a proof of concept", journal = j-J-COMP-SECUR, volume = "27", number = "5", pages = "521--546", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-191293", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:24 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Ma:2019:TOP, author = "Ziqiang Ma and Quanwei Cai and Jingqiang Lin and Bo Luo and Jiwu Jing", title = "Towards the optimal performance of integrating {Warm and Delay} against remote cache timing side channels on block ciphers", journal = j-J-COMP-SECUR, volume = "27", number = "5", pages = "547--580", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-191296", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:24 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", }