@Preamble{"\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-J-COMP-SECUR = "Journal of Computer Security"}
@Article{Jajodia:1992:EPa,
author = "Sushil Jajodia and Jonathan Millen",
title = "{Editors}' Preface",
journal = j-J-COMP-SECUR,
volume = "1",
number = "1",
pages = "1--3",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-1101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:05 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Meadows:1992:AFM,
author = "Catherine Meadows",
title = "Applying Formal Methods to the Analysis of a Key
Management Protocol",
journal = j-J-COMP-SECUR,
volume = "1",
number = "1",
pages = "5--35",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-1102",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:05 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{McLean:1992:PNF,
author = "John McLean",
title = "Proving Noninterference and Functional Correctness
Using Traces",
journal = j-J-COMP-SECUR,
volume = "1",
number = "1",
pages = "37--57",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-1103",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:05 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sandhu:1992:EPS,
author = "Ravi S. Sandhu",
title = "Expressive Power of the Schematic Protection Model",
journal = j-J-COMP-SECUR,
volume = "1",
number = "1",
pages = "59--98",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-1104",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:05 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bieber:1992:LVS,
author = "Pierre Bieber and Fr{\'e}d{\'e}ric Cuppens",
title = "A Logical View of Secure Dependencies",
journal = j-J-COMP-SECUR,
volume = "1",
number = "1",
pages = "99--129",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-1105",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:05 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:1992:CPE,
author = "Anonymous",
title = "Call for Papers: {European Symposium on Research in
Computer Security}",
journal = j-J-COMP-SECUR,
volume = "1",
number = "1",
pages = "131--131",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-1106",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:05 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sandhu:1992:GEP,
author = "Ravi Sandhu",
title = "{Guest Editor}'s Preface",
journal = j-J-COMP-SECUR,
volume = "1",
number = "2",
pages = "131--132",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-1201",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:09 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gupta:1992:TTP,
author = "Sarbari Gupta and Virgil D. Gligor",
title = "Towards a Theory of Penetration-Resistant Systems and
Its Applications",
journal = j-J-COMP-SECUR,
volume = "1",
number = "2",
pages = "133--158",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-1202",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:09 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Foley:1992:ASN,
author = "Simon N. Foley",
title = "Aggregation and Separation as Noninterference
Properties",
journal = j-J-COMP-SECUR,
volume = "1",
number = "2",
pages = "159--188",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-1203",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:09 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Motro:1992:UMS,
author = "Amihai Motro",
title = "A Unified Model for Security and Integrity in
Relational Databases",
journal = j-J-COMP-SECUR,
volume = "1",
number = "2",
pages = "189--213",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-1204",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:09 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jajodia:1992:EPb,
author = "Sushil Jajodia and Jonathan Millen",
title = "{Editors}' Preface",
journal = j-J-COMP-SECUR,
volume = "1",
number = "3--4",
pages = "215--215",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-13-401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lunt:1992:GEP,
author = "Teresa F. Lunt and John McLean",
title = "{Guest Editors}' Preface",
journal = j-J-COMP-SECUR,
volume = "1",
number = "3--4",
pages = "217--218",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-13-402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Wray:1992:ACT,
author = "John C. Wray",
title = "An Analysis of Covert Timing Channels",
journal = j-J-COMP-SECUR,
volume = "1",
number = "3--4",
pages = "219--232",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-13-403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hu:1992:RTC,
author = "Wei-Ming Hu",
title = "Reducing Timing Channels with Fuzzy Time",
journal = j-J-COMP-SECUR,
volume = "1",
number = "3--4",
pages = "233--254",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-13-404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gray:1992:TMF,
author = "James W. {Gray III}",
title = "Toward a Mathematical Foundation for Information Flow
Security",
journal = j-J-COMP-SECUR,
volume = "1",
number = "3--4",
pages = "255--294",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-13-405",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Tardo:1992:SGA,
author = "Joseph J. Tardo and Kannan Alagappan",
title = "{SPX}: Global Authentication Using Public Key
Certificates",
journal = j-J-COMP-SECUR,
volume = "1",
number = "3--4",
pages = "295--316",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-13-406",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Syverson:1992:KBS,
author = "Paul F. Syverson",
title = "Knowledge, Belief, and Semantics in the Analysis of
Cryptographic Protocols",
journal = j-J-COMP-SECUR,
volume = "1",
number = "3--4",
pages = "317--334",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-13-407",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ammann:1992:ESP,
author = "Paul E. Ammann and Ravi S. Sandhu",
title = "The Extended Schematic Protection Model",
journal = j-J-COMP-SECUR,
volume = "1",
number = "3--4",
pages = "335--383",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-13-408",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jacob:1992:BTA,
author = "Jeremy Jacob",
title = "Basic Theorems about Security",
journal = j-J-COMP-SECUR,
volume = "1",
number = "3--4",
pages = "385--411",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-13-409",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:1992:AI,
author = "Anonymous",
title = "Author Index",
journal = j-J-COMP-SECUR,
volume = "1",
number = "3--4",
pages = "413--413",
month = "????",
year = "1992",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1992-13-410",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jajodia:1993:EPa,
author = "Sushil Jajodia and Jonathan Millen",
title = "{Editors}' Preface",
journal = j-J-COMP-SECUR,
volume = "2",
number = "2--3",
pages = "85--85",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-22-301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:17 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{McLean:1993:GEP,
author = "John McLean and Richard Kemmerer",
title = "{Guest Editors}' Preface",
journal = j-J-COMP-SECUR,
volume = "2",
number = "2--3",
pages = "87--88",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-22-302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:17 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Millen:1993:RAM,
author = "Jonathan K. Millen",
title = "A Resource Allocation Model for Denial of Service
Protection",
journal = j-J-COMP-SECUR,
volume = "2",
number = "2--3",
pages = "89--106",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-22-303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:17 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Woo:1993:ADS,
author = "Thomas Y. C. Woo and Simon S. Lam",
title = "Authorization in Distributed Systems: A New Approach",
journal = j-J-COMP-SECUR,
volume = "2",
number = "2--3",
pages = "107--136",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-22-304",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:17 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gligor:1993:IRA,
author = "Virgil D. Gligor and Shyh-Wei Luan and Joseph N.
Pato",
title = "On Inter-Realm Authentication in Large Distributed
Systems",
journal = j-J-COMP-SECUR,
volume = "2",
number = "2--3",
pages = "137--157",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-22-305",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:17 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Epstein:1993:HAW,
author = "Jeremy Epstein and John McHugh and Hilarie Orman and
Rita Pascale and Ann Marmor-Squires and Bonnie Danner
and Charles R. Martin and Martha Branstad and Glenn
Benson and Doug Rothnie",
title = "A High Assurance Window System Prototype",
journal = j-J-COMP-SECUR,
volume = "2",
number = "2--3",
pages = "159--190",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-22-306",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:17 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Yahalom:1993:OAT,
author = "Raphael Yahalom",
title = "Optimality of Asynchronous Two-Party Secure
Data-Exchange Protocols",
journal = j-J-COMP-SECUR,
volume = "2",
number = "2--3",
pages = "191--209",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-22-307",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:17 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Littlewood:1993:TOM,
author = "Bev Littlewood and Sarah Brocklehurst and Norman
Fenton and Peter Mellor and Stella Page and David
Wright and John Dobson and John McDermid and Dieter
Gollmann",
title = "Towards Operational Measures of Computer Security",
journal = j-J-COMP-SECUR,
volume = "2",
number = "2--3",
pages = "211--229",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-22-308",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:17 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Thomas:1993:KAM,
author = "Roshan K. Thomas and Ravi S. Sandhu",
title = "A Kernelized Architecture for Multilevel Secure
Object-Oriented Databases Supporting Write-Up",
journal = j-J-COMP-SECUR,
volume = "2",
number = "2--3",
pages = "231--275",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-22-309",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:17 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Millen:1993:EPb,
author = "Jonathan Millen",
title = "{Editor}'s Preface",
journal = j-J-COMP-SECUR,
volume = "2",
number = "4",
pages = "277--277",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-2401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Horton:1993:CVP,
author = "J. D. Horton and R. H. Cooper and W. F. Hyslop and B.
G. Nickerson and O. K. Ward and Robert Harland and
Elton Ashby and W. M. Stewart",
title = "The Cascade Vulnerability Problem",
journal = j-J-COMP-SECUR,
volume = "2",
number = "4",
pages = "279--290",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-2402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Trostle:1993:MFT,
author = "Jonathan T. Trostle",
title = "Modelling a Fuzzy Time System",
journal = j-J-COMP-SECUR,
volume = "2",
number = "4",
pages = "291--309",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-2403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Atluri:1993:ASC,
author = "Vijayalakshmi Atluri and Sushil Jajodia and Elisa
Bertino",
title = "Achieving Stricter Correctness Requirements in
Multilevel Secure Database Management Systems",
journal = j-J-COMP-SECUR,
volume = "2",
number = "4",
pages = "311--351",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-2404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:1993:AI,
author = "Anonymous",
title = "Author Index",
journal = j-J-COMP-SECUR,
volume = "2",
number = "4",
pages = "353--354",
month = "????",
year = "1993",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1993-2405",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jajodia:1995:EPa,
author = "Sushil Jajodia and Jonathan Millen",
title = "{Editors}' Preface",
journal = j-J-COMP-SECUR,
volume = "3",
number = "1",
pages = "1--1",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gong:1995:GEP,
author = "Li Gong",
title = "{Guest Editor}'s Preface",
journal = j-J-COMP-SECUR,
volume = "3",
number = "1",
pages = "3--3",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3102",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Focardi:1995:CSP,
author = "Riccardo Focardi and Roberto Gorrieri",
title = "A Classification of Security Properties for Process
Algebras",
journal = j-J-COMP-SECUR,
volume = "3",
number = "1",
pages = "5--33",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3103",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Millen:1995:UFC,
author = "Jonathan K. Millen",
title = "Unwinding Forward Correctability",
journal = j-J-COMP-SECUR,
volume = "3",
number = "1",
pages = "35--54",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3104",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bevier:1995:SBA,
author = "William R. Bevier and William D. Young",
title = "A State-based Approach to Noninterference",
journal = j-J-COMP-SECUR,
volume = "3",
number = "1",
pages = "55--70",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3105",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Simmons:1995:RTI,
author = "G. J. Simmons and Catherine Meadows",
title = "The Role of Trust in Information Integrity Protocols",
journal = j-J-COMP-SECUR,
volume = "3",
number = "1",
pages = "71--84",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3106",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Millen:1995:EPb,
author = "Jonathan K. Millen",
title = "{Editor}'s Preface",
journal = j-J-COMP-SECUR,
volume = "3",
number = "2--3",
pages = "85--85",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-32-301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ammann:1995:CCS,
author = "Paul Ammann and Frank Jaeckle and Sushil Jajodia",
title = "Concurrency Control in a Secure Multilevel Database
via a Two-Snapshot Algorithm",
journal = j-J-COMP-SECUR,
volume = "3",
number = "2--3",
pages = "87--113",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-32-302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kang:1995:TMM,
author = "I. E. Kang and T. F. Keefe",
title = "Transaction Management for Multilevel Secure
Replicated Databases",
journal = j-J-COMP-SECUR,
volume = "3",
number = "2--3",
pages = "115--145",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-32-303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hinke:1995:FAD,
author = "Thomas H. Hinke and Harry S. Delugach and Asha
Chandrasekhar",
title = "A Fast Algorithm for Detecting Second Paths in
Database Inference Analysis",
journal = j-J-COMP-SECUR,
volume = "3",
number = "2--3",
pages = "147--168",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-32-304",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bertino:1995:EAM,
author = "Elisa Bertino and Fabio Origgi and Pierangela
Samarati",
title = "An Extended Authorization Model for Object Databases",
journal = j-J-COMP-SECUR,
volume = "3",
number = "2--3",
pages = "169--206",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-32-305",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Notargiacomo:1995:MMI,
author = "LouAnna Notargiacomo and Barbara T. Blaustein and
Catherine D. McCollum",
title = "Merging Models: Integrity, Dynamic Separation of Duty
and Trusted Data Management",
journal = j-J-COMP-SECUR,
volume = "3",
number = "2--3",
pages = "207--230",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-32-306",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jajodia:1995:EPc,
author = "Sushil Jajodia and Jonathan Millen",
title = "{Editors}' Preface",
journal = j-J-COMP-SECUR,
volume = "3",
number = "4",
pages = "231--231",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Foley:1995:SSC,
author = "Simon N. Foley and Jeremy L. Jacob",
title = "Specifying Security for Computer Supported
Collaborative Working",
journal = j-J-COMP-SECUR,
volume = "3",
number = "4",
pages = "233--253",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chen:1995:DTA,
author = "Liqun Chen and Dieter Gollmann and Christopher J.
Mitchell",
title = "Distributing Trust Amongst Multiple Authentication
Servers",
journal = j-J-COMP-SECUR,
volume = "3",
number = "4",
pages = "255--267",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zakinthinos:1995:CNI,
author = "A. Zakinthinos and E. S. Lee",
title = "The Composability of Non-Interference",
journal = j-J-COMP-SECUR,
volume = "3",
number = "4",
pages = "269--281",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bishop:1995:TIT,
author = "Matt Bishop",
title = "Theft of Information in the Take-{Grant} Protection
Model",
journal = j-J-COMP-SECUR,
volume = "3",
number = "4",
pages = "283--308",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3405",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Blundo:1995:MKD,
author = "C. Blundo and Luiz A. Frota Mattos and D. R. Stinson",
title = "Multiple Key Distribution Maintaining User Anonymity
via Broadcast Channels",
journal = j-J-COMP-SECUR,
volume = "3",
number = "4",
pages = "309--322",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3406",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:1995:CP,
author = "Anonymous",
title = "Call for Papers",
journal = j-J-COMP-SECUR,
volume = "3",
number = "4",
pages = "323--324",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3407",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:1995:AIV,
author = "Anonymous",
title = "Author Index Volume 3",
journal = j-J-COMP-SECUR,
volume = "3",
number = "4",
pages = "325--326",
month = "????",
year = "1995",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1994/1995-3408",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bertino:1996:GEP,
author = "Elisa Bertino and G{\'e}rard Eizenberg and Roger M.
Needham",
title = "Guest-editors' preface",
journal = j-J-COMP-SECUR,
volume = "4",
number = "1",
pages = "1--2",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-4101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{dAusbourg:1996:CCD,
author = "Bruno d'Ausbourg and Christel Calas",
title = "Controlling causal dependencies over a secure
network",
journal = j-J-COMP-SECUR,
volume = "4",
number = "1",
pages = "3--25",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-4102",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Roscoe:1996:NIT,
author = "A. W. Roscoe and J. C. P. Woodcock and L. Wulf",
title = "Non-interference through determinism",
journal = j-J-COMP-SECUR,
volume = "4",
number = "1",
pages = "27--53",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-4103",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Maurer:1996:CSB,
author = "Ueli M. Maurer and Pierre E. Schmid",
title = "A calculus for security boots trapping in distributed
systems",
journal = j-J-COMP-SECUR,
volume = "4",
number = "1",
pages = "55--80",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-4104",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jiwa:1996:BAD,
author = "Azad Jiwa and Thomas Hardjono and Jennifer Seberry",
title = "Beacons for authentication in distributed systems",
journal = j-J-COMP-SECUR,
volume = "4",
number = "1",
pages = "81--96",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-4105",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hauser:1996:RSP,
author = "Ralf Hauser and Philippe Janson and Gene Tsudik and
Els {Van Herreweghen} and Refik Molva",
title = "Robust and secure password and key change method",
journal = j-J-COMP-SECUR,
volume = "4",
number = "1",
pages = "97--111",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-4106",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:1996:IA,
author = "Anonymous",
title = "Information for authors",
journal = j-J-COMP-SECUR,
volume = "4",
number = "1",
pages = "113--119",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-4107",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jajodia:1996:EPa,
author = "Sushil Jajodia and Jonathan Millen",
title = "{Editors}' preface",
journal = j-J-COMP-SECUR,
volume = "4",
number = "2--3",
pages = "121--121",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-42-301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:41 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Shieh:1996:DIL,
author = "Shiuh-Pyng Shieh and Virgil D. Gligor",
title = "Detecting illicit leakage of information in operating
systems",
journal = j-J-COMP-SECUR,
volume = "4",
number = "2--3",
pages = "123--148",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-42-302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:41 MDT 2016",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/061242.html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
keywords = "information hiding; steganography",
}
@Article{Ammann:1996:EPM,
author = "Paul Ammann and Ravi S. Sandhu and Richard Lipton",
title = "The expressive power of multi-parent creation in
monotonic access control models",
journal = j-J-COMP-SECUR,
volume = "4",
number = "2--3",
pages = "149--165",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-42-303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:41 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Volpano:1996:STS,
author = "Dennis Volpano and Cynthia Irvine and Geoffrey Smith",
title = "A sound type system for secure flow analysis",
journal = j-J-COMP-SECUR,
volume = "4",
number = "2--3",
pages = "167--187",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-42-304",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:41 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{McDermott:1996:APC,
author = "John McDermott and Ravi Mukkamala",
title = "Analytic performance comparison of transaction
processing algorithms for the {SINTRA}
replicated-architecture database system",
journal = j-J-COMP-SECUR,
volume = "4",
number = "2--3",
pages = "189--228",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-42-305",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:41 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Millen:1996:EPB,
author = "Jonathan Millen",
title = "{Editor}'s preface to the {Bell--LaPadula} model",
journal = j-J-COMP-SECUR,
volume = "4",
number = "2--3",
pages = "229--231",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-42-306",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:41 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{LaPadula:1996:F,
author = "Leonard J. LaPadula",
title = "Foreword",
journal = j-J-COMP-SECUR,
volume = "4",
number = "2--3",
pages = "233--238",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-42-307",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:41 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{LaPadula:1996:MTR,
author = "Leonard J. LaPadula and D. Elliott Bell",
title = "{MITRE} Technical Report 2547, Volume {II}",
journal = j-J-COMP-SECUR,
volume = "4",
number = "2--3",
pages = "239--263",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-42-308",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:41 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jajodia:1996:EPb,
author = "Sushil Jajodia and Jonathan Millen",
title = "{Editors}' preface",
journal = j-J-COMP-SECUR,
volume = "4",
number = "4",
pages = "265--265",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-4401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:45 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Reiter:1996:KMS,
author = "Michael K. Reiter and Matthew K. Franklin and John B.
Lacy and Rebecca N. Wright",
title = "The {$ \Omega $} key management service",
journal = j-J-COMP-SECUR,
volume = "4",
number = "4",
pages = "267--287",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-4402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:45 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chuang:1996:SAN,
author = "Shaw-Cheng Chuang",
title = "Securing {ATM} networks",
journal = j-J-COMP-SECUR,
volume = "4",
number = "4",
pages = "289--329",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-4403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:45 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bishop:1996:CIF,
author = "Matt Bishop",
title = "Conspiracy and information flow in the {Take-Grant
Protection Model}",
journal = j-J-COMP-SECUR,
volume = "4",
number = "4",
pages = "331--359",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-4404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:45 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:1996:AIV,
author = "Anonymous",
title = "Author Index Volume 4 (1996)",
journal = j-J-COMP-SECUR,
volume = "4",
number = "4",
pages = "361--362",
month = "????",
year = "1996",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1996-4405",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:45 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bertino:1997:GEP,
author = "Elisa Bertino and Emilio Montolivo and Helmut Kurth",
title = "Guest editors' preface",
journal = j-J-COMP-SECUR,
volume = "5",
number = "1",
pages = "1--2",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bonatti:1997:MHS,
author = "P. A. Bonatti and M. L. Sapino and V. S.
Subrahmanian",
title = "Merging heterogeneous security orderings",
journal = j-J-COMP-SECUR,
volume = "5",
number = "1",
pages = "3--29",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5102",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lotz:1997:TSM,
author = "Volkmar Lotz",
title = "Threat scenarios as a means to formally develop secure
systems",
journal = j-J-COMP-SECUR,
volume = "5",
number = "1",
pages = "31--67",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5103",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Camenisch:1997:DPS,
author = "Jan Camenisch and Ueli Maurer and Markus Stadler",
title = "Digital payment systems with passive
anonymity-revoking trustees",
journal = j-J-COMP-SECUR,
volume = "5",
number = "1",
pages = "69--89",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5104",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Asokan:1997:SSS,
author = "N. Asokan and G. Tsudik and M. Waidner",
title = "Server-supported signatures",
journal = j-J-COMP-SECUR,
volume = "5",
number = "1",
pages = "91--108",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5105",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jajodia:1997:EP,
author = "Sushil Jajodia and Jonathan Millen",
title = "{Editors}' preface",
journal = j-J-COMP-SECUR,
volume = "5",
number = "2",
pages = "109--109",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5201",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:53 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Merritt:1997:GEP,
author = "Michael Merritt",
title = "Guest editor's preface",
journal = j-J-COMP-SECUR,
volume = "5",
number = "2",
pages = "111--112",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5202",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:53 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Malkhi:1997:HTS,
author = "Dahlia Malkhi and Michael Reiter",
title = "A high-throughput secure reliable multicast protocol",
journal = j-J-COMP-SECUR,
volume = "5",
number = "2",
pages = "113--127",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5203",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:53 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sinclair:1997:ASS,
author = "Jane Sinclair",
title = "Action systems for security specification",
journal = j-J-COMP-SECUR,
volume = "5",
number = "2",
pages = "129--154",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5204",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:53 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DeCapitanidiVimercati:1997:ASE,
author = "Sabrina {De Capitani di Vimercati} and Pierangela
Samarati",
title = "Authorization specification and enforcement in
federated database systems",
journal = j-J-COMP-SECUR,
volume = "5",
number = "2",
pages = "155--188",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5205",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:53 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bertino:1997:SIS,
author = "Elisa Bertino and Pierangela Samarati and Gian Paolo
Rossi",
title = "Special issue on Security in the {World Wide Web
(WWW)}",
journal = j-J-COMP-SECUR,
volume = "5",
number = "3",
pages = "189--190",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:57 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bergadano:1997:SAP,
author = "F. Bergadano and B. Crispo and M. Lomas",
title = "Strong authentication and privacy with standard
browsers",
journal = j-J-COMP-SECUR,
volume = "5",
number = "3",
pages = "191--212",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:57 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Quisquater:1997:ASS,
author = "Jean-Jacques Quisquater and Marc Joye",
title = "Authentication of sequences with the {SL$_2$} hash
function: application to video sequences",
journal = j-J-COMP-SECUR,
volume = "5",
number = "3",
pages = "213--223",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:57 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bryce:1997:CEI,
author = "Ciar{\'a}n Bryce and Winfried K{\"u}hnhauser and
R{\'e}my Amouroux and Mauricio L{\'o}pez and Harry
Rudnik",
title = "{CWASAR}: a {European} infrastructure for secure
electronic commerce",
journal = j-J-COMP-SECUR,
volume = "5",
number = "3",
pages = "225--235",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5304",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:57 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Syverson:1997:PWB,
author = "Paul F. Syverson and Michael G. Reed and David M.
Goldschlag",
title = "Private {Web} browsing",
journal = j-J-COMP-SECUR,
volume = "5",
number = "3",
pages = "237--248",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5305",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:57 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Roscheisen:1997:NCD,
author = "Martin R{\"o}scheisen and Terry Winograd",
title = "A network-centric design for relationship-based
security and access control",
journal = j-J-COMP-SECUR,
volume = "5",
number = "3",
pages = "249--254",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5306",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:57 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Winslett:1997:UDC,
author = "M. Winslett and N. Ching and V. Jones and I.
Slepchin",
title = "Using digital credentials on the {World Wide Web}",
journal = j-J-COMP-SECUR,
volume = "5",
number = "3",
pages = "255--267",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5307",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:20:57 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Samarati:1997:GEP,
author = "Pierangela Samarati and Ravi Sandhu",
title = "Guest editors' preface",
journal = j-J-COMP-SECUR,
volume = "5",
number = "4",
pages = "269--270",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:01 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Castano:1997:ADG,
author = "S. Castano and S. {De Capitani di Vimercati} and M. G.
Fugini",
title = "Automated derivation of global authorizations for
database federations",
journal = j-J-COMP-SECUR,
volume = "5",
number = "4",
pages = "271--301",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:01 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Atluri:1997:EMD,
author = "Vijayalakshmi Atluri and Wei-Kuang Huang",
title = "Enforcing mandatory and discretionary security in
workflow management systems",
journal = j-J-COMP-SECUR,
volume = "5",
number = "4",
pages = "303--339",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:01 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Demurjian:1997:TDP,
author = "S. A. {Demurjian Sr.} and T. C. Ting",
title = "Towards a definitive paradigm for security in
object-oriented systems and applications",
journal = j-J-COMP-SECUR,
volume = "5",
number = "4",
pages = "341--382",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:01 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:1997:AIV,
author = "Anonymous",
title = "Author Index Volume 5 (1997)",
journal = j-J-COMP-SECUR,
volume = "5",
number = "4",
pages = "383--384",
month = "????",
year = "1997",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1997-5405",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:01 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Foley:1998:GEP,
author = "Simon N. Foley",
title = "Guest editors' preface",
journal = j-J-COMP-SECUR,
volume = "6",
number = "1--2",
pages = "1--1",
month = "????",
year = "1998",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1998-61-201",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:05 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Abadi:1998:SLL,
author = "Mart{\'\i}n Abadi",
title = "On {SDSI}'s linked local name spaces",
journal = j-J-COMP-SECUR,
volume = "6",
number = "1--2",
pages = "3--21",
month = "????",
year = "1998",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1998-61-202",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:05 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gray:1998:PSC,
author = "James W. {Gray III} and Kin Fai {Epsilon Ip} and
King-Shan Lui",
title = "Provable security for cryptographic protocols ---
exact analysis and engineering applications",
journal = j-J-COMP-SECUR,
volume = "6",
number = "1--2",
pages = "23--52",
month = "????",
year = "1998",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1998-61-203",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:05 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lowe:1998:CCA,
author = "Gavin Lowe",
title = "{Casper}: A compiler for the analysis of security
protocols",
journal = j-J-COMP-SECUR,
volume = "6",
number = "1--2",
pages = "53--84",
month = "????",
year = "1998",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1998-61-204",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:05 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Paulson:1998:IAV,
author = "Lawrence C. Paulson",
title = "The inductive approach to verifying cryptographic
protocols",
journal = j-J-COMP-SECUR,
volume = "6",
number = "1--2",
pages = "85--128",
month = "????",
year = "1998",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1998-61-205",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:05 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Matsumoto:1998:HCC,
author = "Tsutomu Matsumoto",
title = "Human--computer cryptography: An attempt",
journal = j-J-COMP-SECUR,
volume = "6",
number = "3",
pages = "129--149",
month = "????",
year = "1998",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-980076",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:08 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hofmeyr:1998:IDU,
author = "Steven A. Hofmeyr and Stephanie Forrest and Anil
Somayaji",
title = "Intrusion detection using sequences of system calls",
journal = j-J-COMP-SECUR,
volume = "6",
number = "3",
pages = "151--180",
month = "????",
year = "1998",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-980109",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:08 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ray:1998:SBT,
author = "Indrakshi Ray and Paul Ammann and Sushil Jajodia",
title = "A semantic-based transaction processing model for
multilevel transactions",
journal = j-J-COMP-SECUR,
volume = "6",
number = "3",
pages = "181--217",
month = "????",
year = "1998",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-980108",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:08 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Knudsen:1998:SMD,
author = "Lars R. Knudsen and Keith M. Martin",
title = "In search of multiple domain key recovery",
journal = j-J-COMP-SECUR,
volume = "6",
number = "4",
pages = "219--235",
month = "????",
year = "1998",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1998-6401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Franklin:1998:AML,
author = "Matthew K. Franklin and Dahlia Malkhi",
title = "Auditable metering with lightweight security",
journal = j-J-COMP-SECUR,
volume = "6",
number = "4",
pages = "237--255",
month = "????",
year = "1998",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1998-6402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Casati:1998:EWA,
author = "Fabio Casati and Silvana Castano and Maria Grazia
Fugini",
title = "Enforcing workflow authorization constraints using
triggers",
journal = j-J-COMP-SECUR,
volume = "6",
number = "4",
pages = "257--285",
month = "????",
year = "1998",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1998-6403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:1998:AIV,
author = "Anonymous",
title = "Author Index Volume 6 (1998)",
journal = j-J-COMP-SECUR,
volume = "6",
number = "4",
pages = "287--287",
month = "????",
year = "1998",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1998-6404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Millen:1999:SSI,
author = "Jonathan Millen",
title = "Special section on Intrusion Detection",
journal = j-J-COMP-SECUR,
volume = "7",
number = "1",
pages = "1--1",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-7101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Daniels:1999:IHA,
author = "Thomas E. Daniels and Eugene H. Spafford",
title = "Identification of host audit data to detect attacks on
low-level {IP} vulnerabilities",
journal = j-J-COMP-SECUR,
volume = "7",
number = "1",
pages = "3--35",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-7102",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Vigna:1999:NNB,
author = "Giovanni Vigna and Richard A. Kemmerer",
title = "{NetSTAT}: A network-based intrusion detection
system",
journal = j-J-COMP-SECUR,
volume = "7",
number = "1",
pages = "37--71",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-7103",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Blundo:1999:NRD,
author = "Carlo Blundo and Barbara Masucci",
title = "A note on the randomness in dynamic threshold
schemes",
journal = j-J-COMP-SECUR,
volume = "7",
number = "1",
pages = "73--85",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-7104",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Foley:1999:GEP,
author = "Simon N. Foley",
title = "Guest editor's preface",
journal = j-J-COMP-SECUR,
volume = "7",
number = "2--3",
pages = "87--87",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-72-301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:19 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lowe:1999:TCR,
author = "Gavin Lowe",
title = "Towards a completeness result for model checking of
security protocols",
journal = j-J-COMP-SECUR,
volume = "7",
number = "2--3",
pages = "89--146",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-72-302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:19 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Roscoe:1999:PSP,
author = "A. W. Roscoe and P. J. Broadfoot",
title = "Proving security protocols with model checkers by data
independence techniques",
journal = j-J-COMP-SECUR,
volume = "7",
number = "2--3",
pages = "147--190",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-72-303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:19 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Fabrega:1999:SSP,
author = "F. Javier Thayer F{\'a}brega and Jonathan C. Herzog
and Joshua D. Guttman",
title = "Strand spaces: proving security protocols correct",
journal = j-J-COMP-SECUR,
volume = "7",
number = "2--3",
pages = "191--230",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-72-304",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:19 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Volpano:1999:PNC,
author = "Dennis Volpano and Geoffrey Smith",
title = "Probabilistic noninterference in a concurrent
language",
journal = j-J-COMP-SECUR,
volume = "7",
number = "2--3",
pages = "231--253",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-72-305",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:19 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lin:1999:GEP,
author = "T. Y. Lin",
title = "Guest editor's preface",
journal = j-J-COMP-SECUR,
volume = "7",
number = "4",
pages = "255--255",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-7401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bertino:1999:SOD,
author = "Elisa Bertino and Elena Ferrari",
title = "Secure object deletion and garbage collection in
multilevel object bases",
journal = j-J-COMP-SECUR,
volume = "7",
number = "4",
pages = "257--285",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-7402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gudes:1999:MSI,
author = "Ehud Gudes and Martin S. Olivier and Reind P. van de
Riet",
title = "Modelling, specifying and implementing workflow
security in {Cyberspace}",
journal = j-J-COMP-SECUR,
volume = "7",
number = "4",
pages = "287--315",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-7403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sandhu:1999:RBA,
author = "Ravi Sandhu and Venkata Bhamidipati",
title = "Role-based administration of user-role assignment: The
{URA97} model and its {Oracle} implementation",
journal = j-J-COMP-SECUR,
volume = "7",
number = "4",
pages = "317--342",
month = "????",
year = "1999",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-1999-7404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lin:2000:GEP,
author = "T. Y. Lin",
title = "Guest editor's preface",
journal = j-J-COMP-SECUR,
volume = "8",
number = "1",
pages = "1--1",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-8101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:27 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Atluri:2000:SBE,
author = "Vijayalakshmi Atluri and Wei-Kuang Huang and Elisa
Bertino",
title = "A semantic-based execution model for multilevel secure
workflows",
journal = j-J-COMP-SECUR,
volume = "8",
number = "1",
pages = "3--41",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-8102",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:27 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hale:2000:TBA,
author = "John Hale and Jody Threet and Sujeet Shenoi",
title = "A ticket-based access control architecture for object
systems",
journal = j-J-COMP-SECUR,
volume = "8",
number = "1",
pages = "43--65",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-8103",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:27 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Spalka:2000:SNS,
author = "Adrian Spalka and Armin B. Cremers",
title = "Structured name-spaces in secure databases",
journal = j-J-COMP-SECUR,
volume = "8",
number = "1",
pages = "67--86",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-8104",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:27 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Deswarte:2000:GEP,
author = "Yves Deswarte and Catherine Meadows",
title = "Guest editors' preface",
journal = j-J-COMP-SECUR,
volume = "8",
number = "2--3",
pages = "87--87",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-82-301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Karjoth:2000:ACS,
author = "G{\"u}nter Karjoth",
title = "Authorization in {CORBA} Security",
journal = j-J-COMP-SECUR,
volume = "8",
number = "2--3",
pages = "89--108",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-82-302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bertino:2000:LBA,
author = "Elisa Bertino and Francesco Buccafurri and Elena
Ferrari and Pasquale Rullo",
title = "A logic-based approach for enforcing access control",
journal = j-J-COMP-SECUR,
volume = "8",
number = "2--3",
pages = "109--139",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-82-303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kelsey:2000:SCC,
author = "John Kelsey and Bruce Schneier and David Wagner and
Chris Hall",
title = "Side channel cryptanalysis of product ciphers",
journal = j-J-COMP-SECUR,
volume = "8",
number = "2--3",
pages = "141--158",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-82-304",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Wespi:2000:FVV,
author = "Andreas Wespi and Herv{\'e} Debar and Marc Dacier and
Mehdi Nassehi",
title = "Fixed- vs. variable-length patterns for detecting
suspicious process behavior",
journal = j-J-COMP-SECUR,
volume = "8",
number = "2--3",
pages = "159--181",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-82-305",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Horn:2000:APF,
author = "G{\"u}nther Horn and Bart Preneel",
title = "Authentication and payment in future mobile systems",
journal = j-J-COMP-SECUR,
volume = "8",
number = "2--3",
pages = "183--207",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-82-306",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Atluri:2000:PNB,
author = "Vijayalakshmi Atluri and Wei-Kuang Huang",
title = "A {Petri} net based safety analysis of workflow
authorization models",
journal = j-J-COMP-SECUR,
volume = "8",
number = "2--3",
pages = "209--240",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-82-307",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Atluri:2000:GEP,
author = "Vijay Atluri and John Hale",
title = "{Guest Editor}'s preface",
journal = j-J-COMP-SECUR,
volume = "8",
number = "4",
pages = "241--242",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-8401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Liu:2000:ICI,
author = "Peng Liu and Sushil Jajodia and Catherine D.
McCollum",
title = "Intrusion confinement by isolation in information
systems",
journal = j-J-COMP-SECUR,
volume = "8",
number = "4",
pages = "243--279",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-8402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Clifton:2000:USS,
author = "Chris Clifton",
title = "Using sample size to limit exposure to data mining",
journal = j-J-COMP-SECUR,
volume = "8",
number = "4",
pages = "281--307",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-8403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bertino:2000:TAB,
author = "Elisa Bertino and Piero Andrea Bonatti and Elena
Ferrari and Maria Luisa Sapino",
title = "Temporal authorization bases: From specification to
integration",
journal = j-J-COMP-SECUR,
volume = "8",
number = "4",
pages = "309--353",
month = "????",
year = "2000",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2000-8404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Syverson:2001:GEP,
author = "Paul F. Syverson",
title = "{Guest Editor}'s preface",
journal = j-J-COMP-SECUR,
volume = "9",
number = "1--2",
pages = "1--2",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-91-201",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hui:2001:FPS,
author = "Mei Lin Hui and Gavin Lowe",
title = "Fault-preserving simplifying transformations for
security protocols",
journal = j-J-COMP-SECUR,
volume = "9",
number = "1--2",
pages = "3--46",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-91-202",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Song:2001:ANA,
author = "Dawn Xiaodong Song and Sergey Berezin and Adrian
Perrig",
title = "{Athena}: a novel approach to efficient automatic
security protocol analysis",
journal = j-J-COMP-SECUR,
volume = "9",
number = "1--2",
pages = "47--74",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-91-203",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ryan:2001:PAN,
author = "P. Y. A. Ryan and S. A. Schneider",
title = "Process algebra and non-interference",
journal = j-J-COMP-SECUR,
volume = "9",
number = "1--2",
pages = "75--103",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-91-204",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Halpern:2001:LSL,
author = "Joseph Y. Halpern and Ron van der Meyden",
title = "A logic for {SDSI}'s linked local name spaces",
journal = j-J-COMP-SECUR,
volume = "9",
number = "1--2",
pages = "105--142",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-91-205",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Meadows:2001:CBF,
author = "Catherine Meadows",
title = "A cost-based framework for analysis of denial of
service in networks",
journal = j-J-COMP-SECUR,
volume = "9",
number = "1--2",
pages = "143--164",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-91-206",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jajodia:2001:MST,
author = "Sushil Jajodia and Vijayalakshmi Atluri and Thomas F.
Keefe and Catherine D. McCollum and Ravi Mukkamala",
title = "Multilevel secure transaction processing",
journal = j-J-COMP-SECUR,
volume = "9",
number = "3",
pages = "165--195",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-9301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:43 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Paulson:2001:RBS,
author = "Lawrence C. Paulson",
title = "Relations between secrets: two formal analyses of the
{Yahalom} protocol",
journal = j-J-COMP-SECUR,
volume = "9",
number = "3",
pages = "197--216",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-9302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:43 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Besson:2001:MCS,
author = "Fr{\'e}d{\'e}ric Besson and Thomas Jensen and Daniel
{Le M{\'e}tayer} and Tommy Thorn",
title = "Model checking security properties of control flow
graphs",
journal = j-J-COMP-SECUR,
volume = "9",
number = "3",
pages = "217--250",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-9303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:43 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DeCapitanidiVimercati:2001:GIP,
author = "Sabrina {De Capitani di Vimercati} and Patrick Lincoln
and Livio Ricciulli and Pierangela Samarati",
title = "Global infrastructure protection system",
journal = j-J-COMP-SECUR,
volume = "9",
number = "4",
pages = "251--283",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-9401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:46 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Clarke:2001:CCD,
author = "Dwaine Clarke and Jean-Emile Elien and Carl Ellison
and Matt Fredette and Alexander Morcos and Ronald L.
Rivest",
title = "Certificate chain discovery in {SPKI\slash SDSI}",
journal = j-J-COMP-SECUR,
volume = "9",
number = "4",
pages = "285--322",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-9402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:46 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Wright:2001:DGM,
author = "Rebecca N. Wright and Patrick D. Lincoln and Jonathan
K. Millen",
title = "Depender graphs: A method of fault-tolerant
certificate distribution",
journal = j-J-COMP-SECUR,
volume = "9",
number = "4",
pages = "323--338",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-9403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:46 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2001:AIV,
author = "Anonymous",
title = "Author Index Volume 9 (2001)",
journal = j-J-COMP-SECUR,
volume = "9",
number = "4",
pages = "339--340",
month = "????",
year = "2001",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2001-9404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:46 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Frincke:2002:GEP,
author = "Deborah Frincke",
title = "{Guest Editor}'s preface",
journal = j-J-COMP-SECUR,
volume = "10",
number = "1--2",
pages = "1--3",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-101-201",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lee:2002:TCS,
author = "Wenke Lee and Wei Fan and Matthew Miller and Salvatore
J. Stolfo and Erez Zadok",
title = "Toward cost-sensitive modeling for intrusion detection
and response",
journal = j-J-COMP-SECUR,
volume = "10",
number = "1--2",
pages = "5--22",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-101-202",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kerschbaum:2002:UIS,
author = "Florian Kerschbaum and Eugene H. Spafford and Diego
Zamboni",
title = "Using internal sensors and embedded detectors for
intrusion detection",
journal = j-J-COMP-SECUR,
volume = "10",
number = "1--2",
pages = "23--70",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-101-203",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Eckmann:2002:SAL,
author = "Steven T. Eckmann and Giovanni Vigna and Richard A.
Kemmerer",
title = "{STATL}: An attack language for state-based intrusion
detection",
journal = j-J-COMP-SECUR,
volume = "10",
number = "1--2",
pages = "71--103",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-101-204",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Staniford:2002:PAD,
author = "Stuart Staniford and James A. Hoagland and Joseph M.
McAlerney",
title = "Practical automated detection of stealthy portscans",
journal = j-J-COMP-SECUR,
volume = "10",
number = "1--2",
pages = "105--136",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-101-205",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Li:2002:EPA,
author = "Yingjiu Li and Ningning Wu and X. Sean Wang and Sushil
Jajodia",
title = "Enhancing profiles for anomaly detection using time
granularities",
journal = j-J-COMP-SECUR,
volume = "10",
number = "1--2",
pages = "137--157",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-101-206",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Spinellis:2002:PID,
author = "Diomidis Spinellis and Dimitris Gritzalis",
title = "Panoptis: Intrusion detection using a domain-specific
language",
journal = j-J-COMP-SECUR,
volume = "10",
number = "1--2",
pages = "159--176",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-101-207",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Yasinsac:2002:ESP,
author = "Alec Yasinsac",
title = "An environment for security protocol intrusion
detection",
journal = j-J-COMP-SECUR,
volume = "10",
number = "1--2",
pages = "177--188",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-101-208",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ramakrishnan:2002:MBA,
author = "C. R. Ramakrishnan and R. Sekar",
title = "Model-based analysis of configuration
vulnerabilities",
journal = j-J-COMP-SECUR,
volume = "10",
number = "1--2",
pages = "189--209",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-101-209",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:49 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jajodia:2002:GEP,
author = "Sushil Jajodia and Dimitris Gritzalis",
title = "{Guest Editor}s' preface",
journal = j-J-COMP-SECUR,
volume = "10",
number = "3",
pages = "211--211",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-10301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Levine:2002:HMB,
author = "Brian Neil Levine and Clay Shields",
title = "Hordes: a multicast based protocol for anonymity",
journal = j-J-COMP-SECUR,
volume = "10",
number = "3",
pages = "213--240",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-10302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bonatti:2002:UFR,
author = "Piero A. Bonatti and Pierangela Samarati",
title = "A uniform framework for regulating service access and
information release on the {Web}",
journal = j-J-COMP-SECUR,
volume = "10",
number = "3",
pages = "241--271",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-10303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Buldas:2002:ECA,
author = "Ahto Buldas and Peeter Laud and Helger Lipmaa",
title = "Eliminating counterevidence with applications to
accountable certificate management",
journal = j-J-COMP-SECUR,
volume = "10",
number = "3",
pages = "273--296",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-10304",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Wright:2002:DGM,
author = "Rebecca N. Wright and Patrick D. Lincoln and Jonathan
K. Millen",
title = "Depender graphs: A method of fault-tolerant
certificate distribution",
journal = j-J-COMP-SECUR,
volume = "10",
number = "3",
pages = "297--297",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-10305",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cuppens:2002:GEP,
author = "Fr{\'e}d{\'e}ric Cuppens",
title = "{Guest Editor}'s preface",
journal = j-J-COMP-SECUR,
volume = "10",
number = "4",
pages = "299--300",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-10401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:58 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Brose:2002:MAC,
author = "Gerald Brose",
title = "Manageable access control for {CORBA}",
journal = j-J-COMP-SECUR,
volume = "10",
number = "4",
pages = "301--337",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-10402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:58 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Schellhorn:2002:VFS,
author = "Gerhard Schellhorn and Wolfgang Reif and Axel Schairer
and Paul Karger and Vernon Austel and David Toll",
title = "Verified formal security models for multiapplicative
smart cards",
journal = j-J-COMP-SECUR,
volume = "10",
number = "4",
pages = "339--367",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-10403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:58 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bieber:2002:CSI,
author = "P. Bieber and J. Cazin and P. Girard and J.-L. Lanet
and V. Wiels and G. Zanon",
title = "Checking secure interactions of smart card applets:
extended version",
journal = j-J-COMP-SECUR,
volume = "10",
number = "4",
pages = "369--398",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-10404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:58 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Welch:2002:URM,
author = "Ian Welch and Robert J. Stroud",
title = "Using reflection as a mechanism for enforcing security
policies on compiled code",
journal = j-J-COMP-SECUR,
volume = "10",
number = "4",
pages = "399--432",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-10405",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:58 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2002:AIV,
author = "Anonymous",
title = "Author Index Volume 10 (2002)",
journal = j-J-COMP-SECUR,
volume = "10",
number = "4",
pages = "433--434",
month = "????",
year = "2002",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2002-10406",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:21:58 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Iheagwara:2003:CEE,
author = "Charles Iheagwara and Andrew Blyth and Mukesh
Singhal",
title = "A comparative experimental evaluation study of
intrusion detection system performance in a gigabit
environment",
journal = j-J-COMP-SECUR,
volume = "11",
number = "1",
pages = "1--33",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:02 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Li:2003:DCC,
author = "Ninghui Li and William H. Winsborough and John C.
Mitchell",
title = "Distributed credential chain discovery in trust
management",
journal = j-J-COMP-SECUR,
volume = "11",
number = "1",
pages = "35--86",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11102",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:02 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bella:2003:IVS,
author = "Giampaolo Bella",
title = "Inductive verification of smart card protocols",
journal = j-J-COMP-SECUR,
volume = "11",
number = "1",
pages = "87--132",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11103",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:02 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Syverson:2003:GEP,
author = "Paul F. Syverson",
title = "{Guest Editor}'s preface",
journal = j-J-COMP-SECUR,
volume = "11",
number = "2",
pages = "133--133",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11201",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:06 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sewell:2003:SCU,
author = "Peter Sewell and Jan Vitek",
title = "Secure composition of untrusted code: box $ \pi $,
wrappers, and causality types",
journal = j-J-COMP-SECUR,
volume = "11",
number = "2",
pages = "135--187",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11202",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:06 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cohen:2003:FOV,
author = "Ernie Cohen",
title = "First-order verification of cryptographic protocols",
journal = j-J-COMP-SECUR,
volume = "11",
number = "2",
pages = "189--216",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11203",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:06 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Heather:2003:HPT,
author = "James Heather and Gavin Lowe and Steve Schneider",
title = "How to prevent type flaw attacks on security
protocols",
journal = j-J-COMP-SECUR,
volume = "11",
number = "2",
pages = "217--244",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11204",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:06 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kakkar:2003:RAS,
author = "Pankaj Kakkar and Carl A. Gunter and Mart{\'\i}n
Abadi",
title = "Reasoning about secrecy for active networks",
journal = j-J-COMP-SECUR,
volume = "11",
number = "2",
pages = "245--287",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11205",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:06 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Thuraisingham:2003:GEP,
author = "Bhavani Thuraisingham and Reind van de Riet",
title = "{Guest Editor}s' preface",
journal = j-J-COMP-SECUR,
volume = "11",
number = "3",
pages = "289--289",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Devanbu:2003:ADP,
author = "Premkumar Devanbu and Michael Gertz and Charles Martel
and Stuart G. Stubblebine",
title = "Authentic data publication over the {Internet}",
journal = j-J-COMP-SECUR,
volume = "11",
number = "3",
pages = "291--314",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Barbara:2003:CBC,
author = "Daniel Barbar{\'a} and Rajni Goel and Sushil Jajodia",
title = "A checksum-based corruption detection technique",
journal = j-J-COMP-SECUR,
volume = "11",
number = "3",
pages = "315--329",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hale:2003:PAC,
author = "John Hale and Mauricio Papa and Sujeet Shenoi",
title = "Programmable access control",
journal = j-J-COMP-SECUR,
volume = "11",
number = "3",
pages = "331--351",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11304",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Teepe:2003:WAS,
author = "Wouter Teepe and Reind van de Riet and Martin
Olivier",
title = "{WorkFlow} analyzed for security and privacy in using
databases",
journal = j-J-COMP-SECUR,
volume = "11",
number = "3",
pages = "353--363",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11305",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Altenschmidt:2003:SMR,
author = "C. Altenschmidt and J. Biskup and U. Flegel and Y.
Karabulut",
title = "Secure mediation: requirements, design, and
architecture",
journal = j-J-COMP-SECUR,
volume = "11",
number = "3",
pages = "365--398",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11306",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kremer:2003:GBV,
author = "Steve Kremer and Jean-Fran{\c{c}}ois Raskin",
title = "A game-based verification of non-repudiation and fair
exchange protocols",
journal = j-J-COMP-SECUR,
volume = "11",
number = "3",
pages = "399--429",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11307",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Campbell:2003:ECP,
author = "Katherine Campbell and Lawrence A. Gordon and Martin
P. Loeb and Lei Zhou",
title = "The economic cost of publicly announced information
security breaches: empirical evidence from the stock
market",
journal = j-J-COMP-SECUR,
volume = "11",
number = "3",
pages = "431--448",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11308",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Schneider:2003:GEP,
author = "Steve Schneider",
title = "{Guest Editor}'s preface",
journal = j-J-COMP-SECUR,
volume = "11",
number = "4",
pages = "449--450",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:14 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gordon:2003:ATS,
author = "Andrew D. Gordon and Alan Jeffrey",
title = "Authenticity by typing for security protocols",
journal = j-J-COMP-SECUR,
volume = "11",
number = "4",
pages = "451--519",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:14 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sumii:2003:LRE,
author = "Eijiro Sumii and Benjamin C. Pierce",
title = "Logical relations for encryption",
journal = j-J-COMP-SECUR,
volume = "11",
number = "4",
pages = "521--554",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:14 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Pereira:2003:SAU,
author = "Olivier Pereira and Jean-Jacques Quisquater",
title = "Some attacks upon authenticated group key agreement
protocols",
journal = j-J-COMP-SECUR,
volume = "11",
number = "4",
pages = "555--580",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:14 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Halpern:2003:LRS,
author = "Joseph Y. Halpern and Ron van der Meyden",
title = "A logical reconstruction of {SPKI}",
journal = j-J-COMP-SECUR,
volume = "11",
number = "4",
pages = "581--613",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11405",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:14 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Mantel:2003:UAS,
author = "Heiko Mantel and Andrei Sabelfeld",
title = "A unifying approach to the security of distributed and
multi-threaded programs",
journal = j-J-COMP-SECUR,
volume = "11",
number = "4",
pages = "615--676",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11406",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:14 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
https://www.math.utah.edu/pub/tex/bib/multithreading.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Durgin:2003:CLP,
author = "Nancy Durgin and John Mitchell and Dusko Pavlovic",
title = "A compositional logic for proving security properties
of protocols",
journal = j-J-COMP-SECUR,
volume = "11",
number = "4",
pages = "677--721",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11407",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:14 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2003:AIV,
author = "Anonymous",
title = "Author Index Volume 11 (2003)",
journal = j-J-COMP-SECUR,
volume = "11",
number = "4",
pages = "723--725",
month = "????",
year = "2003",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2003-11408",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:14 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Guttman:2004:GEP,
author = "Joshua Guttman",
title = "{Guest Editor}'s preface",
journal = j-J-COMP-SECUR,
volume = "12",
number = "1",
pages = "1--1",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:19 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hughes:2004:IHA,
author = "Dominic Hughes and Vitaly Shmatikov",
title = "Information hiding, anonymity and privacy: a modular
approach",
journal = j-J-COMP-SECUR,
volume = "12",
number = "1",
pages = "3--36",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12102",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:19 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DiPierro:2004:ANI,
author = "Alessandra {Di Pierro} and Chris Hankin and Herbert
Wiklicky",
title = "Approximate non-interference",
journal = j-J-COMP-SECUR,
volume = "12",
number = "1",
pages = "37--81",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12103",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:19 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lowe:2004:APS,
author = "Gavin Lowe",
title = "Analysing protocols subject to guessing attacks",
journal = j-J-COMP-SECUR,
volume = "12",
number = "1",
pages = "83--97",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12104",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:19 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Micciancio:2004:CTA,
author = "Daniele Micciancio and Bogdan Warinschi",
title = "Completeness theorems for the {Abadi--Rogaway}
language of encrypted expressions",
journal = j-J-COMP-SECUR,
volume = "12",
number = "1",
pages = "99--129",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12105",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:19 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
https://www.math.utah.edu/pub/tex/bib/sgml2000.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chander:2004:RTM,
author = "Ajay Chander and Drew Dean and John C. Mitchell",
title = "Reconstructing trust management",
journal = j-J-COMP-SECUR,
volume = "12",
number = "1",
pages = "131--164",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12106",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:19 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ourston:2004:CIA,
author = "Dirk Ourston and Sara Matzner and William Stump and
Bryan Hopkins",
title = "Coordinated {Internet} attacks: responding to attack
complexity",
journal = j-J-COMP-SECUR,
volume = "12",
number = "2",
pages = "165--190",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12201",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Aldini:2004:PAA,
author = "Alessandro Aldini and Mario Bravetti and Roberto
Gorrieri",
title = "A process-algebraic approach for the analysis of
probabilistic noninterference",
journal = j-J-COMP-SECUR,
volume = "12",
number = "2",
pages = "191--245",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12202",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Durgin:2004:MRC,
author = "Nancy Durgin and Patrick Lincoln and John Mitchell and
Andre Scedrov",
title = "Multiset rewriting and the complexity of bounded
security protocols",
journal = j-J-COMP-SECUR,
volume = "12",
number = "2",
pages = "247--311",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12203",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Schneider:2004:GEP,
author = "Steve Schneider",
title = "{Guest Editor}'s preface",
journal = j-J-COMP-SECUR,
volume = "12",
number = "3--4",
pages = "313--315",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-123-401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jha:2004:MCS,
author = "S. Jha and T. Reps",
title = "Model checking {SPKI\slash SDSI}",
journal = j-J-COMP-SECUR,
volume = "12",
number = "3--4",
pages = "317--353",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-123-402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Shmatikov:2004:PAA,
author = "Vitaly Shmatikov",
title = "Probabilistic analysis of an anonymity system",
journal = j-J-COMP-SECUR,
volume = "12",
number = "3--4",
pages = "355--377",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-123-403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Broadfoot:2004:EAW,
author = "P. J. Broadfoot and A. W. Roscoe",
title = "Embedding agents within the intruder to detect
parallel attacks",
journal = j-J-COMP-SECUR,
volume = "12",
number = "3--4",
pages = "379--408",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-123-404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Guttman:2004:ATD,
author = "Joshua D. Guttman",
title = "Authentication tests and disjoint encryption: A design
method for security protocols",
journal = j-J-COMP-SECUR,
volume = "12",
number = "3--4",
pages = "409--433",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-123-405",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gordon:2004:TEA,
author = "Andrew D. Gordon and Alan Jeffrey",
title = "Types and effects for asymmetric cryptographic
protocols",
journal = j-J-COMP-SECUR,
volume = "12",
number = "3--4",
pages = "435--483",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-123-406",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Duggan:2004:TBC,
author = "Dominic Duggan",
title = "Type-based cryptographic operations",
journal = j-J-COMP-SECUR,
volume = "12",
number = "3--4",
pages = "485--550",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-123-407",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Buttyan:2004:FMR,
author = "Levente Butty{\'a}n and Jean-Pierre Hubaux and Srdjan
{\v{C}}apkun",
title = "A formal model of rational exchange and its
application to the analysis of {Syverson}'s protocol",
journal = j-J-COMP-SECUR,
volume = "12",
number = "3--4",
pages = "551--587",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-123-408",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Backes:2004:PL,
author = "Michael Backes and Birgit Pfitzmann and Michael
Waidner and Michael Steiner",
title = "Polynomial liveness",
journal = j-J-COMP-SECUR,
volume = "12",
number = "3--4",
pages = "589--617",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-123-409",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lowe:2004:DIF,
author = "Gavin Lowe",
title = "Defining information flow quantity",
journal = j-J-COMP-SECUR,
volume = "12",
number = "3--4",
pages = "619--653",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-123-410",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Wang:2004:CBI,
author = "Lingyu Wang and Duminda Wijesekera and Sushil
Jajodia",
title = "Cardinality-based inference control in data cubes",
journal = j-J-COMP-SECUR,
volume = "12",
number = "5",
pages = "655--692",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12501",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DiPietro:2004:KMH,
author = "Roberto {Di Pietro} and Luigi V. Mancini and
Alessandro Mei",
title = "Key management for high bandwidth secure multicast",
journal = j-J-COMP-SECUR,
volume = "12",
number = "5",
pages = "693--709",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12502",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cho:2004:GKR,
author = "Taenam Cho and Sang-Ho Lee and Won Kim",
title = "A group key recovery mechanism based on logical key
hierarchy",
journal = j-J-COMP-SECUR,
volume = "12",
number = "5",
pages = "711--736",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12503",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zhang:2004:RAR,
author = "Jian Zhang and Jian Gong and Yong Ding",
title = "Research on automated rollbackability of intrusion
response",
journal = j-J-COMP-SECUR,
volume = "12",
number = "5",
pages = "737--751",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12504",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Buchholz:2004:PPO,
author = "Florian P. Buchholz and Clay Shields",
title = "Providing process origin information to aid in
computer forensic investigations",
journal = j-J-COMP-SECUR,
volume = "12",
number = "5",
pages = "753--776",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12505",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Iheagwara:2004:CEM,
author = "Charles Iheagwara and Andrew Blyth and Mukesh
Singhal",
title = "Cost effective management frameworks for intrusion
detection systems",
journal = j-J-COMP-SECUR,
volume = "12",
number = "5",
pages = "777--798",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12506",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Atluri:2004:CWS,
author = "Vijayalakshmi Atluri and Soon Ae Chun and Pietro
Mazzoleni",
title = "{Chinese} wall security for decentralized workflow
management systems",
journal = j-J-COMP-SECUR,
volume = "12",
number = "6",
pages = "799--840",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12601",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Devanbu:2004:FAX,
author = "Premkumar Devanbu and Michael Gertz and April Kwong
and Charles Martel and Glen Nuckolls and Stuart G.
Stubblebine",
title = "Flexible authentication of {XML} documents",
journal = j-J-COMP-SECUR,
volume = "12",
number = "6",
pages = "841--864",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12602",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Guttman:2004:FAP,
author = "Joshua D. Guttman and F. Javier Thayer and Lenore D.
Zuck",
title = "The faithfulness of abstract protocol analysis:
Message authentication",
journal = j-J-COMP-SECUR,
volume = "12",
number = "6",
pages = "865--891",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12603",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Meadows:2004:FSA,
author = "Catherine Meadows and Paul Syverson and Iliano
Cervesato",
title = "Formal specification and analysis of the {Group Domain
of Interpretation Protocol} using {NPATRL} and the {NRL
Protocol Analyzer}",
journal = j-J-COMP-SECUR,
volume = "12",
number = "6",
pages = "893--931",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12604",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2004:AIV,
author = "Anonymous",
title = "Author Index Volume 12 (2004)",
journal = j-J-COMP-SECUR,
volume = "12",
number = "6",
pages = "933--935",
month = "????",
year = "2004",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2004-12605",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gorrieri:2005:GEP,
author = "Roberto Gorrieri",
title = "{Guest Editor}'s preface",
journal = j-J-COMP-SECUR,
volume = "13",
number = "1",
pages = "1--2",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bistarelli:2005:RMR,
author = "Stefano Bistarelli and Iliano Cervesato and Gabriele
Lenzini and Fabio Martinelli",
title = "Relating multiset rewriting and process algebras for
security protocol analysis",
journal = j-J-COMP-SECUR,
volume = "13",
number = "1",
pages = "3--47",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13102",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bodei:2005:CSP,
author = "Chiara Bodei and Pierpaolo Degano and Corrado Priami",
title = "Checking security policies through an enhanced
{Control Flow Analysis}",
journal = j-J-COMP-SECUR,
volume = "13",
number = "1",
pages = "49--85",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13103",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bugliesi:2005:NIP,
author = "Michele Bugliesi and Sabina Rossi",
title = "Non-interference proof techniques for the analysis of
cryptographic protocols",
journal = j-J-COMP-SECUR,
volume = "13",
number = "1",
pages = "87--113",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13104",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Guttman:2005:VIF,
author = "Joshua D. Guttman and Amy L. Herzog and John D.
Ramsdell and Clement W. Skorupka",
title = "Verifying information flow goals in {Security-Enhanced
Linux}",
journal = j-J-COMP-SECUR,
volume = "13",
number = "1",
pages = "115--134",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13105",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
https://www.math.utah.edu/pub/tex/bib/linux.bib;
https://www.math.utah.edu/pub/tex/bib/unix.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ramanujam:2005:DCE,
author = "R. Ramanujam and S. P. Suresh",
title = "Decidability of context-explicit security protocols",
journal = j-J-COMP-SECUR,
volume = "13",
number = "1",
pages = "135--165",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13106",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Shmatikov:2005:RBT,
author = "Vitaly Shmatikov and Carolyn Talcott",
title = "Reputation-based trust management",
journal = j-J-COMP-SECUR,
volume = "13",
number = "1",
pages = "167--190",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13107",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:39 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bertino:2005:ACU,
author = "E. Bertino and E. Ferrari and G. Mella",
title = "An approach to cooperative updates of {XML} documents
in distributed systems",
journal = j-J-COMP-SECUR,
volume = "13",
number = "2",
pages = "191--242",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13201",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:44 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zuquete:2005:EHQ,
author = "Andr{\'e} Z{\'u}quete",
title = "An efficient high quality random number generator for
multi-programmed systems",
journal = j-J-COMP-SECUR,
volume = "13",
number = "2",
pages = "243--263",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13202",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:44 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://dl.acm.org/citation.cfm?id=1077819.1077821",
acknowledgement = ack-nhfb,
acmid = "1077821",
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
keywords = "operating systems; Pentium processors; random number
generators; time samples",
pagecount = "21",
}
@Article{Cervesato:2005:CBS,
author = "Iliano Cervesato and Nancy A. Durgin and Patrick D.
Lincoln and John C. Mitchell and Andre Scedrov",
title = "A comparison between strand spaces and multiset
rewriting for security protocol analysis",
journal = j-J-COMP-SECUR,
volume = "13",
number = "2",
pages = "265--316",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13203",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:44 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Heather:2005:DPE,
author = "James Heather and Steve Schneider",
title = "A decision procedure for the existence of a rank
function",
journal = j-J-COMP-SECUR,
volume = "13",
number = "2",
pages = "317--344",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13204",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:44 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Focardi:2005:GEP,
author = "Riccardo Focardi",
title = "{Guest Editor}'s preface",
journal = j-J-COMP-SECUR,
volume = "13",
number = "3",
pages = "345--345",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:47 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bodei:2005:SVS,
author = "Chiara Bodei and Mikael Buchholtz and Pierpaolo Degano
and Flemming Nielson and Hanne Riis Nielson",
title = "Static validation of security protocols",
journal = j-J-COMP-SECUR,
volume = "13",
number = "3",
pages = "347--390",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:47 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bossi:2005:IFS,
author = "Annalisa Bossi and Damiano Macedonio and Carla Piazza
and Sabina Rossi",
title = "Information flow in secure contexts",
journal = j-J-COMP-SECUR,
volume = "13",
number = "3",
pages = "391--422",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:47 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Datta:2005:DSC,
author = "Anupam Datta and Ante Derek and John C. Mitchell and
Dusko Pavlovic",
title = "A derivation system and compositional logic for
security protocols",
journal = j-J-COMP-SECUR,
volume = "13",
number = "3",
pages = "423--482",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13304",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:47 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Halpern:2005:AIH,
author = "Joseph Y. Halpern and Kevin R. O'Neill",
title = "Anonymity and information hiding in multiagent
systems",
journal = j-J-COMP-SECUR,
volume = "13",
number = "3",
pages = "483--514",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13305",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:47 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Millen:2005:SPAa,
author = "Jonathan Millen and Vitaly Shmatikov",
title = "Symbolic protocol analysis with an {Abelian} group
operator or {Diffie--Hellman} exponentiation",
journal = j-J-COMP-SECUR,
volume = "13",
number = "3",
pages = "515--564",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13306",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:47 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Warinschi:2005:CAN,
author = "Bogdan Warinschi",
title = "A computational analysis of the
{Needham--Schroeder--(Lowe)} protocol",
journal = j-J-COMP-SECUR,
volume = "13",
number = "3",
pages = "565--591",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13307",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:47 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Vaidya:2005:SSI,
author = "Jaideep Vaidya and Chris Clifton",
title = "Secure set intersection cardinality with application
to association rule mining",
journal = j-J-COMP-SECUR,
volume = "13",
number = "4",
pages = "593--622",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Yu:2005:SUI,
author = "Meng Yu and Peng Liu and Wanyu Zang",
title = "Specifying and using intrusion masking models to
process distributed operations",
journal = j-J-COMP-SECUR,
volume = "13",
number = "4",
pages = "623--658",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Stolfo:2005:CET,
author = "Salvatore J. Stolfo and Frank Apap and Eleazar Eskin
and Katherine Heller and Shlomo Hershkop and Andrew
Honig and Krysta Svore",
title = "A comparative evaluation of two algorithms for
{Windows Registry Anomaly Detection}",
journal = j-J-COMP-SECUR,
volume = "13",
number = "4",
pages = "659--693",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Millen:2005:SPAb,
author = "Jonathan Millen and Vitaly Shmatikov",
title = "Symbolic protocol analysis with an {Abelian} group
operator or {Diffie--Hellman} exponentiation",
journal = j-J-COMP-SECUR,
volume = "13",
number = "4",
pages = "695--695",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bella:2005:GEP,
author = "Giampaolo Bella and Peter Ryan",
title = "{Guest Editors}' preface",
journal = j-J-COMP-SECUR,
volume = "13",
number = "5",
pages = "697--697",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13501",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:56 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bistarelli:2005:SCB,
author = "Stefano Bistarelli and Simon N. Foley and Barry
O'Sullivan",
title = "A soft constraint-based approach to the cascade
vulnerability problem",
journal = j-J-COMP-SECUR,
volume = "13",
number = "5",
pages = "699--720",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13502",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:56 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Collberg:2005:SWF,
author = "Christian Collberg and Tapas Ranjan Sahoo",
title = "Software watermarking in the frequency domain:
Implementation, analysis, and attacks",
journal = j-J-COMP-SECUR,
volume = "13",
number = "5",
pages = "721--755",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13503",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:56 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Nenadic:2005:RBV,
author = "Aleksandra Nenadi{\'c} and Ning Zhang and Qi Shi",
title = "{RSA-based Verifiable and Recoverable Encryption of
Signatures} and its application in certified e-mail
delivery",
journal = j-J-COMP-SECUR,
volume = "13",
number = "5",
pages = "757--777",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13504",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:56 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Siaterlis:2005:OSA,
author = "Christos Siaterlis and Vasilis Maglaris",
title = "One step ahead to multisensor data fusion for {DDoS}
detection",
journal = j-J-COMP-SECUR,
volume = "13",
number = "5",
pages = "779--806",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13505",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:22:56 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Molsa:2005:MDS,
author = "Jarmo M{\"o}ls{\"a}",
title = "Mitigating denial of service attacks: A tutorial",
journal = j-J-COMP-SECUR,
volume = "13",
number = "6",
pages = "807--837",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13601",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:00 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sherwood:2005:PPS,
author = "Rob Sherwood and Bobby Bhattacharjee and Aravind
Srinivasan",
title = "{P5}: A protocol for scalable anonymous
communication",
journal = j-J-COMP-SECUR,
volume = "13",
number = "6",
pages = "839--876",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13602",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:00 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Pescape:2005:EAA,
author = "Antonio Pescap{\`e} and Giorgio Ventre",
title = "Experimental analysis of attacks against intradomain
routing protocols",
journal = j-J-COMP-SECUR,
volume = "13",
number = "6",
pages = "877--903",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13603",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:00 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2005:AIV,
author = "Anonymous",
title = "Author Index Volume 13 (2005)",
journal = j-J-COMP-SECUR,
volume = "13",
number = "6",
pages = "905--907",
month = "????",
year = "2005",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2005-13604",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:00 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cortier:2006:SAP,
author = "V{\'e}ronique Cortier and St{\'e}phanie Delaune and
Pascal Lafourcade",
title = "A survey of algebraic properties used in cryptographic
protocols",
journal = j-J-COMP-SECUR,
volume = "14",
number = "1",
pages = "1--43",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:04 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cimato:2006:UMU,
author = "Stelvio Cimato and Antonella Cresti and Paolo D'Arco",
title = "A unified model for unconditionally secure key
distribution",
journal = j-J-COMP-SECUR,
volume = "14",
number = "1",
pages = "45--64",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14102",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:04 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Focardi:2006:IFS,
author = "Riccardo Focardi and Sabina Rossi",
title = "Information flow security in dynamic contexts",
journal = j-J-COMP-SECUR,
volume = "14",
number = "1",
pages = "65--110",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14103",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:04 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Focardi:2006:P,
author = "Riccardo Focardi",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "14",
number = "2",
pages = "111--111",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14201",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:08 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Braghin:2006:RBA,
author = "Chiara Braghin and Daniele Gorla and Vladimiro
Sassone",
title = "Role-based access control for a distributed calculus",
journal = j-J-COMP-SECUR,
volume = "14",
number = "2",
pages = "113--155",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14202",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:08 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Myers:2006:ERD,
author = "Andrew C. Myers and Andrei Sabelfeld and Steve
Zdancewic",
title = "Enforcing Robust Declassification and Qualified
Robustness",
journal = j-J-COMP-SECUR,
volume = "14",
number = "2",
pages = "157--196",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14203",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:08 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Pereira:2006:IBS,
author = "Olivier Pereira and Jean-Jacques Quisquater",
title = "On the impossibility of building secure {Cliques}-type
authenticated group key agreement protocols",
journal = j-J-COMP-SECUR,
volume = "14",
number = "2",
pages = "197--246",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14204",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:08 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Goto:2006:P,
author = "Atsuhiro Goto",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "14",
number = "3",
pages = "247--247",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:11 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Candebat:2006:SPM,
author = "Thibault Candebat and David Gray",
title = "Secure pseudonym management using mediated
identity-based encryption",
journal = j-J-COMP-SECUR,
volume = "14",
number = "3",
pages = "249--267",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:11 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bhargav-Spantzel:2006:EPD,
author = "Abhilasha Bhargav-Spantzel and Anna C. Squicciarini
and Elisa Bertino",
title = "Establishing and protecting digital identity in
federation systems",
journal = j-J-COMP-SECUR,
volume = "14",
number = "3",
pages = "269--300",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:11 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zhu:2006:GEG,
author = "Sencun Zhu and Sanjeev Setia and Shouhuai Xu and
Sushil Jajodia",
title = "{GKMPAN}: An Efficient Group Rekeying Scheme for
Secure Multicast in Ad-Hoc Networks",
journal = j-J-COMP-SECUR,
volume = "14",
number = "4",
pages = "301--325",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Eamani:2006:LBP,
author = "Arun K. Eamani and A. Prasad Sistla",
title = "Language based policy analysis in a {SPKI} Trust
Management System",
journal = j-J-COMP-SECUR,
volume = "14",
number = "4",
pages = "327--357",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Xia:2006:EWD,
author = "Jianhong Xia and Sarma Vangala and Jiang Wu and Lixin
Gao and Kevin Kwiat",
title = "Effective worm detection for various scan techniques",
journal = j-J-COMP-SECUR,
volume = "14",
number = "4",
pages = "359--387",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zhou:2006:P,
author = "Jianying Zhou and Meng-Chow Kang",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "14",
number = "5",
pages = "389--390",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14501",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:18 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Price:2006:PKI,
author = "Geraint Price",
title = "Public Key Infrastructures: A research agenda",
journal = j-J-COMP-SECUR,
volume = "14",
number = "5",
pages = "391--417",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14502",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:18 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lippert:2006:LCM,
author = "M. Lippert and V. Karatsiolis and A. Wiesmaier and J.
Buchmann",
title = "Life-cycle management of {X.509} certificates based on
{LDAP} directories",
journal = j-J-COMP-SECUR,
volume = "14",
number = "5",
pages = "419--439",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14503",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:18 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Wang:2006:GNR,
author = "Guilin Wang",
title = "Generic non-repudiation protocols supporting
transparent off-line {TTP}",
journal = j-J-COMP-SECUR,
volume = "14",
number = "5",
pages = "441--467",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14504",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:18 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lopez:2006:UPK,
author = "Javier Lopez",
title = "Unleashing public-key cryptography in wireless sensor
networks",
journal = j-J-COMP-SECUR,
volume = "14",
number = "5",
pages = "469--482",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14505",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:18 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{McDaniel:2006:EPA,
author = "Patrick McDaniel and Atul Prakash",
title = "Enforcing provisioning and authorization policy in the
{Antigone} system",
journal = j-J-COMP-SECUR,
volume = "14",
number = "6",
pages = "483--511",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14601",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Blyth:2006:PRT,
author = "Andrew Blyth and Paula Thomas",
title = "Performing real-time threat assessment of security
incidents using data fusion of {IDS} logs",
journal = j-J-COMP-SECUR,
volume = "14",
number = "6",
pages = "513--534",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14602",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Aimeur:2006:BEC,
author = "Esma A{\"\i}meur and Gilles Brassard and Flavien Serge
Mani Onana",
title = "Blind Electronic Commerce",
journal = j-J-COMP-SECUR,
volume = "14",
number = "6",
pages = "535--559",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14603",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Norman:2006:APC,
author = "Gethin Norman and Vitaly Shmatikov",
title = "Analysis of probabilistic contract signing",
journal = j-J-COMP-SECUR,
volume = "14",
number = "6",
pages = "561--589",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14604",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Smith:2006:ITP,
author = "Geoffrey Smith",
title = "Improved typings for probabilistic noninterference in
a multi-threaded language",
journal = j-J-COMP-SECUR,
volume = "14",
number = "6",
pages = "591--623",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14605",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
https://www.math.utah.edu/pub/tex/bib/multithreading.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2006:AIV,
author = "Anonymous",
title = "Author Index Volume 14 (2006)",
journal = j-J-COMP-SECUR,
volume = "14",
number = "6",
pages = "625--626",
month = "????",
year = "2006",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2006-14606",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:23 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2007:MGE,
author = "Anonymous",
title = "Message from the {Guest Editors}",
journal = j-J-COMP-SECUR,
volume = "15",
number = "1",
pages = "1--2",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:27 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zouridaki:2007:HQT,
author = "Charikleia Zouridaki and Brian L. Mark and Marek Hejmo
and Roshan K. Thomas",
title = "{Hermes}: A quantitative trust establishment framework
for reliable data packet delivery in {MANETs}",
journal = j-J-COMP-SECUR,
volume = "15",
number = "1",
pages = "3--38",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15102",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:27 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Raya:2007:SVA,
author = "Maxim Raya and Jean-Pierre Hubaux",
title = "Securing vehicular ad hoc networks",
journal = j-J-COMP-SECUR,
volume = "15",
number = "1",
pages = "39--68",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15103",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:27 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chan:2007:SSI,
author = "Haowen Chan and Adrian Perrig and Bartosz Przydatek
and Dawn Song",
title = "{SIA}: Secure information aggregation in sensor
networks",
journal = j-J-COMP-SECUR,
volume = "15",
number = "1",
pages = "69--102",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15104",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:27 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Radosavac:2007:DIM,
author = "S. Radosavac and Alvaro A. C{\'a}rdenas and John S.
Baras and George V. Moustakides",
title = "Detecting {IEEE 802.11 MAC} layer misbehavior in ad
hoc networks: Robust strategies against individual and
colluding attackers",
journal = j-J-COMP-SECUR,
volume = "15",
number = "1",
pages = "103--128",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15105",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:27 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Xu:2007:SGC,
author = "Shouhuai Xu",
title = "On the security of group communication schemes",
journal = j-J-COMP-SECUR,
volume = "15",
number = "1",
pages = "129--169",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15106",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:27 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zanin:2007:RRD,
author = "Giorgio Zanin and Roberto {Di Pietro} and Luigi V.
Mancini",
title = "Robust {RSA} distributed signatures for large-scale
long-lived ad hoc networks",
journal = j-J-COMP-SECUR,
volume = "15",
number = "1",
pages = "171--196",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15107",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:27 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Casola:2007:PBM,
author = "Valentina Casola and Antonino Mazzeo and Nicola
Mazzocca and Valeria Vittorini",
title = "A policy-based methodology for security evaluation: A
Security Metric for Public Key Infrastructures",
journal = j-J-COMP-SECUR,
volume = "15",
number = "2",
pages = "197--229",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15201",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:30 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Tripunitara:2007:TCE,
author = "Mahesh V. Tripunitara and Ninghui Li",
title = "A theory for comparing the expressive power of access
control models",
journal = j-J-COMP-SECUR,
volume = "15",
number = "2",
pages = "231--272",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15202",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:30 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Skormin:2007:PIA,
author = "V. Skormin and A. Volynkin and D. Summerville and J.
Moronski",
title = "Prevention of information attacks by run-time
detection of self-replication in computer codes",
journal = j-J-COMP-SECUR,
volume = "15",
number = "2",
pages = "273--302",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15203",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:30 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Wehner:2007:AWN,
author = "Stephanie Wehner",
title = "Analyzing worms and network traffic using
compression",
journal = j-J-COMP-SECUR,
volume = "15",
number = "3",
pages = "303--320",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:34 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Clark:2007:SAQ,
author = "David Clark and Sebastian Hunt and Pasquale
Malacaria",
title = "A static analysis for quantifying information flow in
a simple imperative language",
journal = j-J-COMP-SECUR,
volume = "15",
number = "3",
pages = "321--371",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:34 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bossi:2007:CIF,
author = "Annalisa Bossi and Carla Piazza and Sabina Rossi",
title = "Compositional information flow security for concurrent
programs",
journal = j-J-COMP-SECUR,
volume = "15",
number = "3",
pages = "373--416",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:34 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Wang:2007:PBI,
author = "Lingyu Wang and Yingjiu Li and Sushil Jajodia and
Duminda Wijesekera",
title = "Parity-based inference control for multi-dimensional
range sum queries",
journal = j-J-COMP-SECUR,
volume = "15",
number = "4",
pages = "417--445",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:38 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Skalka:2007:RMD,
author = "Christian Skalka and X. Sean Wang and Peter Chapin",
title = "Risk management for distributed authorization",
journal = j-J-COMP-SECUR,
volume = "15",
number = "4",
pages = "447--489",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:38 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Goto:2007:P,
author = "Atsuhiro Goto",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "15",
number = "5",
pages = "491--491",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15501",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:42 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bhargav-Spantzel:2007:UCT,
author = "Abhilasha Bhargav-Spantzel and Jan Camenisch and
Thomas Gross and Dieter Sommer",
title = "User centricity: A taxonomy and open issues",
journal = j-J-COMP-SECUR,
volume = "15",
number = "5",
pages = "493--527",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15502",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:42 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bhargav-Spantzel:2007:PPM,
author = "Abhilasha Bhargav-Spantzel and Anna C. Squicciarini
and Shimon Modi and Matthew Young and Elisa Bertino and
Stephen J. Elliott",
title = "Privacy preserving multi-factor authentication with
biometrics",
journal = j-J-COMP-SECUR,
volume = "15",
number = "5",
pages = "529--560",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15503",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:42 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Backes:2007:P,
author = "Michael Backes and David Basin and Michael Waidner",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "15",
number = "6",
pages = "561--561",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15601",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:45 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bugliesi:2007:DTA,
author = "Michele Bugliesi and Riccardo Focardi and Matteo
Maffei",
title = "Dynamic types for authentication",
journal = j-J-COMP-SECUR,
volume = "15",
number = "6",
pages = "563--617",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15602",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:45 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Corin:2007:TAS,
author = "R. Corin and S. Etalle and P. H. Hartel and A. Mader",
title = "Timed analysis of security protocols",
journal = j-J-COMP-SECUR,
volume = "15",
number = "6",
pages = "619--645",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15603",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:45 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Barthe:2007:SIF,
author = "Gilles Barthe and Leonor Prensa Nieto",
title = "Secure information flow for a concurrent language with
scheduling",
journal = j-J-COMP-SECUR,
volume = "15",
number = "6",
pages = "647--689",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15604",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:45 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Uribe:2007:AAF,
author = "Tom{\'a}s E. Uribe and Steven Cheung",
title = "Automatic analysis of firewall and network intrusion
detection system configurations",
journal = j-J-COMP-SECUR,
volume = "15",
number = "6",
pages = "691--715",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15605",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:45 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2007:AIV,
author = "Anonymous",
title = "Author Index Volume 15 (2007)",
journal = j-J-COMP-SECUR,
volume = "15",
number = "6",
pages = "717--719",
month = "????",
year = "2007",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-15606",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:45 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zhang:2008:SVA,
author = "Nan Zhang and Mark Ryan and Dimitar P. Guelev",
title = "Synthesising verified access control systems through
model checking",
journal = j-J-COMP-SECUR,
volume = "16",
number = "1",
pages = "1--61",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:48 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Krukow:2008:LFH,
author = "Karl Krukow and Mogens Nielsen and Vladimiro Sassone",
title = "A logical framework for history-based access control
and reputation systems",
journal = j-J-COMP-SECUR,
volume = "16",
number = "1",
pages = "63--101",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16102",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:48 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Yee:2008:GEIa,
author = "George O. M. Yee and Ali A. Ghorbani and Patrick C. K.
Hung",
title = "{Guest Editors}' Introduction",
journal = j-J-COMP-SECUR,
volume = "16",
number = "2",
pages = "103--106",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16201",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zhou:2008:SPR,
author = "Jie Zhou and Jim Alves-Foss",
title = "Security policy refinement and enforcement for the
design of multi-level secure systems",
journal = j-J-COMP-SECUR,
volume = "16",
number = "2",
pages = "107--131",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16202",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Mont:2008:PPE,
author = "Marco Casassa Mont and Robert Thyne",
title = "Privacy policy enforcement in enterprises with
identity management solutions",
journal = j-J-COMP-SECUR,
volume = "16",
number = "2",
pages = "133--163",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16203",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Nayyar:2008:AAM,
author = "Harshit Nayyar and Ali A. Ghorbani",
title = "Approximate autoregressive modeling for network attack
detection",
journal = j-J-COMP-SECUR,
volume = "16",
number = "2",
pages = "165--197",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16204",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Spindler:2008:PVS,
author = "Torsten Spindler and Christoph Wartmann and Ludger
Hovestadt and Daniel Roth and Luc {Van Gool} and
Andreas Steffen",
title = "Privacy in video surveilled spaces",
journal = j-J-COMP-SECUR,
volume = "16",
number = "2",
pages = "199--222",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16205",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Alam:2008:CBR,
author = "Muhammad Alam and Michael Hafner and Ruth Breu",
title = "Constraint based role based access control in the
{SECTET}-framework",
journal = j-J-COMP-SECUR,
volume = "16",
number = "2",
pages = "223--260",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16206",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Yee:2008:GEIb,
author = "George O. M. Yee and Chunming Rong and Laurence T.
Yang",
title = "{Guest Editors}' Introduction",
journal = j-J-COMP-SECUR,
volume = "16",
number = "3",
pages = "261--264",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16301",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:56 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Elbirt:2008:AAI,
author = "A. J. Elbirt",
title = "Accelerated {AES} implementations via generalized
instruction set extensions",
journal = j-J-COMP-SECUR,
volume = "16",
number = "3",
pages = "265--288",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16302",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:56 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kayem:2008:RCK,
author = "Anne V. D. M. Kayem and Selim G. Akl and Patrick
Martin",
title = "On replacing cryptographic keys in hierarchical key
management systems",
journal = j-J-COMP-SECUR,
volume = "16",
number = "3",
pages = "289--309",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16303",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:56 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Wang:2008:CBH,
author = "Lifu Wang and Partha Dasgupta",
title = "Coprocessor-based hierarchical trust management for
software integrity and digital identity protection",
journal = j-J-COMP-SECUR,
volume = "16",
number = "3",
pages = "311--339",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16304",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:56 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hagen:2008:PAU,
author = "Janne Merete Hagen and Tormod Kalberg Sivertsen and
Chunming Rong",
title = "Protection against unauthorized access and computer
crime in {Norwegian} enterprises",
journal = j-J-COMP-SECUR,
volume = "16",
number = "3",
pages = "341--366",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16305",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:56 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Damiani:2008:GE,
author = "Ernesto Damiani",
title = "Guest Editorial",
journal = j-J-COMP-SECUR,
volume = "16",
number = "4",
pages = "367--368",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0338",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ardagna:2008:PAA,
author = "C. A. Ardagna and M. Cremonini and S. {De Capitani di
Vimercati} and P. Samarati",
title = "A privacy-aware access control system",
journal = j-J-COMP-SECUR,
volume = "16",
number = "4",
pages = "369--397",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0328",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Goodrich:2008:NFI,
author = "Michael T. Goodrich and Roberto Tamassia and Danfeng
(Daphne) Yao",
title = "Notarized federated {ID} management and
authentication",
journal = j-J-COMP-SECUR,
volume = "16",
number = "4",
pages = "399--418",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0324",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Wang:2008:IIA,
author = "Lingyu Wang and Chao Yao and Anoop Singhal and Sushil
Jajodia",
title = "Implementing interactive analysis of attack graphs
using relational databases",
journal = j-J-COMP-SECUR,
volume = "16",
number = "4",
pages = "419--437",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0327",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Atluri:2008:ESP,
author = "Vijayalakshmi Atluri and Heechang Shin and Jaideep
Vaidya",
title = "Efficient security policy enforcement for the mobile
environment",
journal = j-J-COMP-SECUR,
volume = "16",
number = "4",
pages = "439--475",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0329",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Biskup:2008:PCQ,
author = "Joachim Biskup and Lena Wiese",
title = "Preprocessing for controlled query evaluation with
availability policy",
journal = j-J-COMP-SECUR,
volume = "16",
number = "4",
pages = "477--494",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0325",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:23:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sabelfeld:2008:P,
author = "Andrei Sabelfeld",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "16",
number = "5",
pages = "495--495",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0331",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:03 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Backes:2008:KDM,
author = "Michael Backes and Birgit Pfitzmann and Andre
Scedrov",
title = "Key-dependent message security under active attacks
--- {BRSIM\slash UC}-soundness of {Dolev--Yao}-style
encryption with key cycles",
journal = j-J-COMP-SECUR,
volume = "16",
number = "5",
pages = "497--530",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0332",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:03 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chatzikokolakis:2008:BRI,
author = "Konstantinos Chatzikokolakis and Catuscia Palamidessi
and Prakash Panangaden",
title = "On the {Bayes} risk in information-hiding protocols",
journal = j-J-COMP-SECUR,
volume = "16",
number = "5",
pages = "531--571",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0333",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:03 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Corin:2008:SCS,
author = "Ricardo Corin and Pierre-Malo Deni{\'e}lou and
C{\'e}dric Fournet and Karthikeyan Bhargavan and James
Leifer",
title = "A secure compiler for session abstractions",
journal = j-J-COMP-SECUR,
volume = "16",
number = "5",
pages = "573--636",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0334",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:03 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Shroff:2008:SIF,
author = "Paritosh Shroff and Scott F. Smith and Mark Thober",
title = "Securing information flow via dynamic capture of
dependencies",
journal = j-J-COMP-SECUR,
volume = "16",
number = "5",
pages = "637--688",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0335",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:03 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Tiplea:2008:SBS,
author = "Ferucio L. {\c{T}}iplea and C{\u{a}}t{\u{a}}lin V.
B{\^\i}rjoveanu and Constantin Enea and Ioana
Boureanu",
title = "Secrecy for bounded security protocols with freshness
check is {NEXPTIME}-complete",
journal = j-J-COMP-SECUR,
volume = "16",
number = "6",
pages = "689--712",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-0306",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:06 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Traynor:2008:EOF,
author = "Patrick Traynor and William Enck and Patrick McDaniel
and Thomas {La Porta}",
title = "Exploiting open functionality in {SMS}-capable
cellular networks",
journal = j-J-COMP-SECUR,
volume = "16",
number = "6",
pages = "713--742",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2007-0308",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:06 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Murray:2008:NDA,
author = "Toby Murray and Duncan Grove",
title = "Non-delegatable authorities in capability systems",
journal = j-J-COMP-SECUR,
volume = "16",
number = "6",
pages = "743--759",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0314",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:06 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Belsis:2008:AEF,
author = "Petros Belsis and Kostas Fragos and Stefanos Gritzalis
and Christos Skourlas",
title = "Applying effective feature selection techniques with
hierarchical mixtures of experts for spam
classification",
journal = j-J-COMP-SECUR,
volume = "16",
number = "6",
pages = "761--790",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0319",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:06 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2008:AIV,
author = "Anonymous",
title = "Author Index Volume 16 (2008)",
journal = j-J-COMP-SECUR,
volume = "16",
number = "6",
pages = "791--793",
month = "????",
year = "2008",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-16605",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:06 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Petkovic:2009:P,
author = "Milan Petkovi{\'c} and Willem Jonker",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "17",
number = "1",
pages = "1--3",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0326",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Yao:2009:EPT,
author = "Chao Yao and Lingyu Wang and X. Sean Wang and Claudio
Bettini and Sushil Jajodia",
title = "Evaluating privacy threats in released database views
by symmetric indistinguishability",
journal = j-J-COMP-SECUR,
volume = "17",
number = "1",
pages = "5--42",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0317",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Byun:2009:PPI,
author = "Ji-Won Byun and Tiancheng Li and Elisa Bertino and
Ninghui Li and Yonglak Sohn",
title = "Privacy-preserving incremental data dissemination",
journal = j-J-COMP-SECUR,
volume = "17",
number = "1",
pages = "43--68",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0316",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bottcher:2009:IDA,
author = "Stefan B{\"o}ttcher and Rita Hartel",
title = "Information disclosure by answers to {XPath} queries",
journal = j-J-COMP-SECUR,
volume = "17",
number = "1",
pages = "69--99",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0318",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cheng:2009:QAV,
author = "Weiwei Cheng and Kian-Lee Tan",
title = "Query assurance verification for outsourced
multi-dimensional databases",
journal = j-J-COMP-SECUR,
volume = "17",
number = "1",
pages = "101--126",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0315",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:10 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hu:2009:CRR,
author = "Nan Hu and Giri K. Tayi and Chengyu Ma and Yingjiu
Li",
title = "Certificate revocation release policies",
journal = j-J-COMP-SECUR,
volume = "17",
number = "2",
pages = "127--157",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0330",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:14 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Herzberg:2009:FPT,
author = "Amir Herzberg",
title = "Folklore, practice and theory of robust combiners",
journal = j-J-COMP-SECUR,
volume = "17",
number = "2",
pages = "159--189",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0336",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:14 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Aziz:2009:CSA,
author = "Benjamin Aziz and Simon N. Foley and John Herbert and
Garret Swart",
title = "Configuring storage-area networks using mandatory
security",
journal = j-J-COMP-SECUR,
volume = "17",
number = "2",
pages = "191--210",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0337",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:14 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Vaidya:2009:ERM,
author = "Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo and
Haibing Lu",
title = "Edge-{RMP}: Minimizing administrative assignments for
role-based access control",
journal = j-J-COMP-SECUR,
volume = "17",
number = "2",
pages = "211--235",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0341",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:14 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bella:2009:JCS,
author = "Giampaolo Bella and Peter Y. A. Ryan",
title = "{{\booktitle{Journal of Computer Security}}}",
journal = j-J-COMP-SECUR,
volume = "17",
number = "3",
pages = "237--237",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0346",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:18 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Belsis:2009:AEF,
author = "Petros Belsis and Kostas Fragos and Stefanos Gritzalis
and Christos Skourlas",
title = "Applying effective feature selection techniques with
hierarchical mixtures of experts for spam
classification",
journal = j-J-COMP-SECUR,
volume = "17",
number = "3",
pages = "239--268",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0377",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:18 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Grothoff:2009:TBS,
author = "Christian Grothoff and Krista Grothoff and Ryan
Stutsman and Ludmila Alkhutova and Mikhail Atallah",
title = "Translation-based steganography",
journal = j-J-COMP-SECUR,
volume = "17",
number = "3",
pages = "269--303",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0320",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:18 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Vigna:2009:REA,
author = "Giovanni Vigna and Fredrik Valeur and Davide
Balzarotti and William Robertson and Christopher
Kruegel and Engin Kirda",
title = "Reducing errors in the anomaly-based detection of
web-based attacks through the combined analysis of web
requests and {SQL} queries",
journal = j-J-COMP-SECUR,
volume = "17",
number = "3",
pages = "305--329",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0321",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:18 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Xu:2009:ASL,
author = "Haizhi Xu and Steve J. Chapin",
title = "Address-space layout randomization using code
islands",
journal = j-J-COMP-SECUR,
volume = "17",
number = "3",
pages = "331--362",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0322",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:18 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Blanchet:2009:AVC,
author = "Bruno Blanchet",
title = "Automatic verification of correspondences for security
protocols",
journal = j-J-COMP-SECUR,
volume = "17",
number = "4",
pages = "363--434",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0339",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:22 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Delaune:2009:VPT,
author = "St{\'e}phanie Delaune and Steve Kremer and Mark Ryan",
title = "Verifying privacy-type properties of electronic voting
protocols",
journal = j-J-COMP-SECUR,
volume = "17",
number = "4",
pages = "435--487",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0340",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:22 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ding:2009:LFM,
author = "Xuhua Ding and Gene Tsudik and Shouhuai Xu",
title = "Leak-free mediated group signatures",
journal = j-J-COMP-SECUR,
volume = "17",
number = "4",
pages = "489--514",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0342",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:22 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Guttman:2009:I,
author = "Joshua D. Guttman",
title = "Introduction",
journal = j-J-COMP-SECUR,
volume = "17",
number = "5",
pages = "515--515",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0396",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sabelfeld:2009:DDP,
author = "Andrei Sabelfeld and David Sands",
title = "Declassification: Dimensions and principles",
journal = j-J-COMP-SECUR,
volume = "17",
number = "5",
pages = "517--548",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0352",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Matos:2009:DND,
author = "Ana Almeida Matos and G{\'e}rard Boudol",
title = "On declassification and the non-disclosure policy",
journal = j-J-COMP-SECUR,
volume = "17",
number = "5",
pages = "549--597",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0355",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Harrison:2009:AIF,
author = "William L. Harrison and James Hook",
title = "Achieving information flow security through monadic
control of effects",
journal = j-J-COMP-SECUR,
volume = "17",
number = "5",
pages = "599--653",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0356",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Clarkson:2009:QIF,
author = "Michael R. Clarkson and Andrew C. Myers and Fred B.
Schneider",
title = "Quantifying information flow with beliefs",
journal = j-J-COMP-SECUR,
volume = "17",
number = "5",
pages = "655--701",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0353",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hofheinz:2009:PRS,
author = "Dennis Hofheinz and J{\"o}rn M{\"u}ller-Quade and
Dominique Unruh",
title = "Polynomial runtime in simulatability definitions",
journal = j-J-COMP-SECUR,
volume = "17",
number = "5",
pages = "703--735",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0354",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Adao:2009:SCF,
author = "Pedro Ad{\~a}o and Gergei Bana and Jonathan Herzog and
Andre Scedrov",
title = "Soundness and completeness of formal encryption: The
cases of key cycles and partial information leakage",
journal = j-J-COMP-SECUR,
volume = "17",
number = "5",
pages = "737--797",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0358",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bartoletti:2009:PVS,
author = "Massimo Bartoletti and Pierpaolo Degano and Gian Luigi
Ferrari",
title = "Planning and verifying service composition",
journal = j-J-COMP-SECUR,
volume = "17",
number = "5",
pages = "799--837",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0357",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:26 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Guette:2009:ATK,
author = "Gilles Guette",
title = "Automating trusted key rollover in {DNSSEC}",
journal = j-J-COMP-SECUR,
volume = "17",
number = "6",
pages = "839--854",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0343",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Preda:2009:SBC,
author = "Mila Dalla Preda and Roberto Giacobazzi",
title = "Semantics-based code obfuscation by abstract
interpretation",
journal = j-J-COMP-SECUR,
volume = "17",
number = "6",
pages = "855--908",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0345",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jacobs:2009:SLS,
author = "Bart Jacobs and Ichiro Hasuo",
title = "Semantics and logic for security protocols",
journal = j-J-COMP-SECUR,
volume = "17",
number = "6",
pages = "909--944",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0348",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Dainotti:2009:CAA,
author = "Alberto Dainotti and Antonio Pescap{\'e} and Giorgio
Ventre",
title = "A cascade architecture for {DoS} attacks detection
based on the wavelet transform",
journal = j-J-COMP-SECUR,
volume = "17",
number = "6",
pages = "945--968",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0350",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2009:AIV,
author = "Anonymous",
title = "Author Index Volume 17 (2009)",
journal = j-J-COMP-SECUR,
volume = "17",
number = "6",
pages = "969--971",
month = "????",
year = "2009",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-17605",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Campolargo:2010:JSI,
author = "M{\'a}rio Campolargo",
title = "{JCS} special issue on {EU}-funded {ICT} research on
Trust and Security: Foreword",
journal = j-J-COMP-SECUR,
volume = "18",
number = "1",
pages = "??--??",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0368",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:34 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Camenisch:2010:JSI,
author = "Jan Camenisch and Javier Lopez and Fabio Massacci and
Massimo Ciscato and Thomas Skordas",
title = "{JCS} special issue on {EU}-funded {ICT} research on
Trust and Security",
journal = j-J-COMP-SECUR,
volume = "18",
number = "1",
pages = "1--5",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0375",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:34 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bergholz:2010:NFA,
author = "Andr{\'e} Bergholz and Jan {De Beer} and Sebastian
Glahn and Marie-Francine Moens and Gerhard Paa{\ss} and
Siehyun Strobel",
title = "New filtering approaches for phishing email",
journal = j-J-COMP-SECUR,
volume = "18",
number = "1",
pages = "7--35",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0371",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:34 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Dam:2010:PCI,
author = "Mads Dam and Bart Jacobs and Andreas Lundblad and
Frank Piessens",
title = "Provably correct inline monitoring for multithreaded
{Java}-like programs",
journal = j-J-COMP-SECUR,
volume = "18",
number = "1",
pages = "37--59",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0365",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:34 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/java2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
https://www.math.utah.edu/pub/tex/bib/multithreading.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Salvail:2010:STR,
author = "Louis Salvail and Momtchil Peev and Eleni Diamanti and
Romain All{\'e}aume and Norbert L{\"u}tkenhaus and
Thomas L{\"a}nger",
title = "Security of trusted repeater quantum key distribution
networks",
journal = j-J-COMP-SECUR,
volume = "18",
number = "1",
pages = "61--87",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0373",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:34 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cabuk:2010:TAS,
author = "Serdar Cabuk and Chris I. Dalton and Konrad Eriksson
and Dirk Kuhlmann and HariGovind V. Ramasamy and
Gianluca Ramunno and Ahmad-Reza Sadeghi and Matthias
Schunter and Christian St{\"u}ble",
title = "Towards automated security policy enforcement in
multi-tenant virtual data centers",
journal = j-J-COMP-SECUR,
volume = "18",
number = "1",
pages = "89--121",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0376",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:34 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ardagna:2010:ECP,
author = "Claudio A. Ardagna and Jan Camenisch and Markulf
Kohlweiss and Ronald Leenes and Gregory Neven and Bart
Priem and Pierangela Samarati and Dieter Sommer and
Mario Verdicchio",
title = "Exploiting cryptography for privacy-enhanced access
control: A result of the {PRIME Project}",
journal = j-J-COMP-SECUR,
volume = "18",
number = "1",
pages = "123--160",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0367",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:34 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Argyropoulos:2010:BTP,
author = "Savvas Argyropoulos and Dimitrios Tzovaras and
Dimosthenis Ioannidis and Yannis Damousis and Michael
G. Strintzis and Martin Braun and Serge Boverie",
title = "Biometric template protection in multimodal
authentication systems based on error correcting
codes",
journal = j-J-COMP-SECUR,
volume = "18",
number = "1",
pages = "161--185",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0369",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:34 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jajodia:2010:E,
author = "Sushil Jajodia and Jon Millen",
title = "Editorial",
journal = j-J-COMP-SECUR,
volume = "18",
number = "2",
pages = "187--187",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0402",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:38 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gorla:2010:P,
author = "Daniele Gorla and Catuscia Palamidessi",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "18",
number = "2",
pages = "189--189",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0359",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:38 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Malacaria:2010:RAS,
author = "Pasquale Malacaria",
title = "Risk assessment of security threats for looping
constructs",
journal = j-J-COMP-SECUR,
volume = "18",
number = "2",
pages = "191--228",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0360",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:38 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bodei:2010:DPT,
author = "Chiara Bodei and Linda Brodo and Pierpaolo Degano and
Han Gao",
title = "Detecting and preventing type flaws at static time",
journal = j-J-COMP-SECUR,
volume = "18",
number = "2",
pages = "229--264",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0361",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:38 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hamadou:2010:CPS,
author = "Sardaouna Hamadou and John Mullins",
title = "Calibrating the power of schedulers for probabilistic
polynomial-time calculus",
journal = j-J-COMP-SECUR,
volume = "18",
number = "2",
pages = "265--316",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0362",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:38 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Delaune:2010:SBA,
author = "St{\'e}phanie Delaune and Steve Kremer and Mark D.
Ryan",
title = "Symbolic bisimulation for the applied pi calculus",
journal = j-J-COMP-SECUR,
volume = "18",
number = "2",
pages = "317--377",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0363",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:38 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lekkas:2010:PMT,
author = "Dimitrios Lekkas and Dimitris Gritzalis",
title = "{e-Passports} as a means towards a {Globally
Interoperable Public Key Infrastructure}",
journal = j-J-COMP-SECUR,
volume = "18",
number = "3",
pages = "379--396",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0370",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:43 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Pala:2010:FPN,
author = "Massimiliano Pala and Sean W. Smith",
title = "Finding the {PKI} needles in the {Internet} haystack",
journal = j-J-COMP-SECUR,
volume = "18",
number = "3",
pages = "397--420",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0401",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:43 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Li:2010:CCB,
author = "Jiguo Li and Xinyi Huang and Yi Mu and Willy Susilo
and Qianhong Wu",
title = "Constructions of certificate-based signature secure
against key replacement attacks",
journal = j-J-COMP-SECUR,
volume = "18",
number = "3",
pages = "421--449",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0366",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:43 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Li:2010:ESS,
author = "Chung Ki Li and Guomin Yang and Duncan S. Wong and
Xiaotie Deng and Sherman S. M. Chow",
title = "An efficient signcryption scheme with key privacy and
its extension to ring signcryption",
journal = j-J-COMP-SECUR,
volume = "18",
number = "3",
pages = "451--473",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0374",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:43 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chadwick:2010:ICR,
author = "David W. Chadwick and Sean Antony and Rune Bjerk",
title = "Instant certificate revocation and publication using
{WebDAV}",
journal = j-J-COMP-SECUR,
volume = "18",
number = "3",
pages = "475--496",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0372",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:43 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Goto:2010:P,
author = "Atsuhiro Goto",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "18",
number = "4",
pages = "497--497",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0381",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:47 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Saklikar:2010:IFV,
author = "Samir Saklikar and Subir Saha",
title = "Identity Federation for {VoIP} systems",
journal = j-J-COMP-SECUR,
volume = "18",
number = "4",
pages = "499--540",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2008-0349",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:47 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Baldwin:2010:AFI,
author = "Adrian Baldwin and Marco Casassa Mont and Yolanta
Beres and Simon Shiu",
title = "Assurance for federated identity management",
journal = j-J-COMP-SECUR,
volume = "18",
number = "4",
pages = "541--572",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0380",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:47 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Modersheim:2010:CDS,
author = "Sebastian M{\"o}dersheim and Luca Vigan{\`o} and David
Basin",
title = "Constraint differentiation: Search-space reduction for
the constraint-based analysis of security protocols",
journal = j-J-COMP-SECUR,
volume = "18",
number = "4",
pages = "575--618",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0351",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:47 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Becker:2010:SDS,
author = "Moritz Y. Becker and C{\'e}dric Fournet and Andrew D.
Gordon",
title = "{SecPAL}: Design and semantics of a decentralized
authorization language",
journal = j-J-COMP-SECUR,
volume = "18",
number = "4",
pages = "619--665",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0364",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:47 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Conrad:2010:AUT,
author = "James R. Conrad and Jim Alves-Foss and Sauchi Stephen
Lee",
title = "Analyzing uncertainty in {TG} protection graphs with
{TG\slash MC}",
journal = j-J-COMP-SECUR,
volume = "18",
number = "5",
pages = "667--699",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0378",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:50 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Pucella:2010:IOS,
author = "Riccardo Pucella and Fred B. Schneider",
title = "Independence from obfuscation: A semantic framework
for diversity",
journal = j-J-COMP-SECUR,
volume = "18",
number = "5",
pages = "701--749",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0379",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:50 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Giacobazzi:2010:ACU,
author = "Roberto Giacobazzi and Isabella Mastroeni",
title = "Adjoining classified and unclassified information by
abstract interpretation",
journal = j-J-COMP-SECUR,
volume = "18",
number = "5",
pages = "751--797",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0382",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:50 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Pirretti:2010:SAB,
author = "Matthew Pirretti and Patrick Traynor and Patrick
McDaniel and Brent Waters",
title = "Secure attribute-based systems",
journal = j-J-COMP-SECUR,
volume = "18",
number = "5",
pages = "799--837",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0383",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:50 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DiPietro:2010:HKS,
author = "Roberto {Di Pietro} and Luigi V. Mancini and
Alessandro Mei",
title = "Hierarchies of keys in secure multicast
communications",
journal = j-J-COMP-SECUR,
volume = "18",
number = "5",
pages = "839--860",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0384",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:50 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jovanovic:2010:SAD,
author = "Nenad Jovanovic and Christopher Kruegel and Engin
Kirda",
title = "Static analysis for detecting taint-style
vulnerabilities in web applications",
journal = j-J-COMP-SECUR,
volume = "18",
number = "5",
pages = "861--907",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0385",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:50 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Baudet:2010:GAC,
author = "Mathieu Baudet and Bogdan Warinschi and Mart{\'\i}n
Abadi",
title = "Guessing attacks and the computational soundness of
static equivalence",
journal = j-J-COMP-SECUR,
volume = "18",
number = "5",
pages = "909--968",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0386",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:50 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Focardi:2010:E,
author = "Riccardo Focardi",
title = "Editorial",
journal = j-J-COMP-SECUR,
volume = "18",
number = "6",
pages = "969--969",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0390",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Besson:2010:VRA,
author = "Fr{\'e}d{\'e}ric Besson and Guillaume Dufay and Thomas
Jensen and David Pichardie",
title = "Verifying resource access control on mobile
interactive devices",
journal = j-J-COMP-SECUR,
volume = "18",
number = "6",
pages = "971--998",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0387",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kremer:2010:CSA,
author = "Steve Kremer and Laurent Mazar{\'e}",
title = "Computationally sound analysis of protocols using
bilinear pairings",
journal = j-J-COMP-SECUR,
volume = "18",
number = "6",
pages = "999--1033",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0388",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Roy:2010:ITP,
author = "Arnab Roy and Anupam Datta and Ante Derek and John C.
Mitchell",
title = "Inductive trace properties for computational
security",
journal = j-J-COMP-SECUR,
volume = "18",
number = "6",
pages = "1035--1073",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-389",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sabelfeld:2010:P,
author = "Andrei Sabelfeld",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "18",
number = "6",
pages = "1075--1075",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0391",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Backes:2010:CSS,
author = "Michael Backes and Dominique Unruh",
title = "Computational soundness of symbolic zero-knowledge
proofs",
journal = j-J-COMP-SECUR,
volume = "18",
number = "6",
pages = "1077--1155",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0392",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Clarkson:2010:H,
author = "Michael R. Clarkson and Fred B. Schneider",
title = "Hyperproperties",
journal = j-J-COMP-SECUR,
volume = "18",
number = "6",
pages = "1157--1210",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0393",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Delaune:2010:FSA,
author = "St{\'e}phanie Delaune and Steve Kremer and Graham
Steel",
title = "Formal security analysis of {PKCS\#11} and proprietary
extensions",
journal = j-J-COMP-SECUR,
volume = "18",
number = "6",
pages = "1211--1245",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0394",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Goubault-Larrecq:2010:FMF,
author = "Jean Goubault-Larrecq",
title = "Finite models for formal security proofs",
journal = j-J-COMP-SECUR,
volume = "18",
number = "6",
pages = "1247--1299",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0395",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2010:AIV,
author = "Anonymous",
title = "Author Index Volume 18 (2010)",
journal = j-J-COMP-SECUR,
volume = "18",
number = "6",
pages = "1301--1305",
month = "????",
year = "2010",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-18610",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:54 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kopf:2011:ADI,
author = "Boris K{\"o}pf and David Basin",
title = "Automatically deriving information-theoretic bounds
for adaptive side-channel attacks",
journal = j-J-COMP-SECUR,
volume = "19",
number = "1",
pages = "1--31",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0397",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:58 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gordon:2011:IIS,
author = "Lawrence A. Gordon and Martin P. Loeb and Lei Zhou",
title = "The impact of information security breaches: Has there
been a downward shift in costs?",
journal = j-J-COMP-SECUR,
volume = "19",
number = "1",
pages = "33--56",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2009-0398",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:58 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DeAngelis:2011:SAT,
author = "David DeAngelis and K. Suzanne Barber",
title = "Security applications of trust in multi-agent
systems",
journal = j-J-COMP-SECUR,
volume = "19",
number = "1",
pages = "57--99",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0399",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:58 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DSouza:2011:MCT,
author = "Deepak D'Souza and Raveendra Holla and K. R.
Raghavendra and Barbara Sprick",
title = "Model-checking trace-based information flow
properties",
journal = j-J-COMP-SECUR,
volume = "19",
number = "1",
pages = "101--138",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0400",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:58 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Nguyen:2011:APB,
author = "L. H. Nguyen and A. W. Roscoe",
title = "Authentication protocols based on low-bandwidth
unspoofable channels: A comparative survey",
journal = j-J-COMP-SECUR,
volume = "19",
number = "1",
pages = "139--201",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0403",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:58 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sinha:2011:SSS,
author = "Anshuman Sinha",
title = "A survey of system security in contactless electronic
passports",
journal = j-J-COMP-SECUR,
volume = "19",
number = "1",
pages = "203--226",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0414",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:24:58 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Li:2011:GEP,
author = "Yingjiu Li and Jianying Zhou",
title = "{Guest Editor}s' preface",
journal = j-J-COMP-SECUR,
volume = "19",
number = "2",
pages = "227--228",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0405",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:03 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Alomair:2011:SLC,
author = "Basel Alomair and Loukas Lazos and Radha Poovendran",
title = "Securing low-cost {RFID} systems: An unconditionally
secure approach",
journal = j-J-COMP-SECUR,
volume = "19",
number = "2",
pages = "229--257",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0406",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:03 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hancke:2011:PES,
author = "Gerhard P. Hancke",
title = "Practical eavesdropping and skimming attacks on
high-frequency {RFID} tokens",
journal = j-J-COMP-SECUR,
volume = "19",
number = "2",
pages = "259--288",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0407",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:03 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Avoine:2011:FAR,
author = "Gildas Avoine and Muhammed Ali Bing{\"o}l and
S{\"u}leyman Karda{\c{s}} and C{\'e}dric Lauradoux and
Benjamin Martin",
title = "A framework for analyzing {RFID} distance bounding
protocols",
journal = j-J-COMP-SECUR,
volume = "19",
number = "2",
pages = "289--317",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0408",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:03 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ng:2011:PRO,
author = "Ching Yu Ng and Willy Susilo and Yi Mu and Rei
Safavi-Naini",
title = "Practical {RFID} ownership transfer scheme",
journal = j-J-COMP-SECUR,
volume = "19",
number = "2",
pages = "319--341",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0409",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:03 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Halevi:2011:TBH,
author = "Tzipora Halevi and Nitesh Saxena and Shai Halevi",
title = "Tree-based {HB} protocols for privacy-preserving
authentication of {RFID} tags",
journal = j-J-COMP-SECUR,
volume = "19",
number = "2",
pages = "343--363",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0404",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:03 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Atluri:2011:P,
author = "Vijay Atluri",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "19",
number = "3",
pages = "365--365",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0425",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:07 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Dong:2011:SSE,
author = "Changyu Dong and Giovanni Russello and Naranker
Dulay",
title = "Shared and searchable encrypted data for untrusted
servers",
journal = j-J-COMP-SECUR,
volume = "19",
number = "3",
pages = "367--397",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0415",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:07 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Toahchoodee:2011:FAS,
author = "Manachai Toahchoodee and Indrakshi Ray",
title = "On the formalization and analysis of a spatio-temporal
role-based access control model",
journal = j-J-COMP-SECUR,
volume = "19",
number = "3",
pages = "399--452",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0418",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:07 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{He:2011:SCP,
author = "Xiaoyun He and Haibing Lu and Jaideep Vaidya and Nabil
Adam",
title = "Secure construction and publication of contingency
tables from distributed data",
journal = j-J-COMP-SECUR,
volume = "19",
number = "3",
pages = "453--484",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0417",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:07 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Vaidya:2011:I,
author = "Jaideep Vaidya and Ehud Gudes",
title = "Introduction",
journal = j-J-COMP-SECUR,
volume = "19",
number = "3",
pages = "485--486",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0427",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:07 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Biskup:2011:IPV,
author = "Joachim Biskup and Christian Gogolin and Jens Seiler
and Torben Weibert",
title = "Inference-proof view update transactions with
forwarded refreshments",
journal = j-J-COMP-SECUR,
volume = "19",
number = "3",
pages = "487--529",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0420",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:07 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ciriani:2011:SDO,
author = "Valentina Ciriani and Sabrina {De Capitani di
Vimercati} and Sara Foresti and Sushil Jajodia and
Stefano Paraboschi and Pierangela Samarati",
title = "Selective data outsourcing for enforcing privacy",
journal = j-J-COMP-SECUR,
volume = "19",
number = "3",
pages = "531--566",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0422",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:07 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Foley:2011:MSP,
author = "Simon N. Foley and William M. Fitzgerald",
title = "Management of security policy configuration using a
{Semantic Threat Graph} approach",
journal = j-J-COMP-SECUR,
volume = "19",
number = "3",
pages = "567--605",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0421",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:07 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Shin:2011:EES,
author = "Heechang Shin and Vijayalakshmi Atluri and June-suh
Cho",
title = "Efficiently enforcing spatiotemporal access control
under uncertain location information",
journal = j-J-COMP-SECUR,
volume = "19",
number = "3",
pages = "607--637",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0423",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:07 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Rieck:2011:AAM,
author = "Konrad Rieck and Philipp Trinius and Carsten Willems
and Thorsten Holz",
title = "Automatic analysis of malware behavior using machine
learning",
journal = j-J-COMP-SECUR,
volume = "19",
number = "4",
pages = "639--668",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0410",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:11 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{vanOorschot:2011:EPC,
author = "P. C. van Oorschot and Julie Thorpe",
title = "Exploiting predictability in click-based graphical
passwords",
journal = j-J-COMP-SECUR,
volume = "19",
number = "4",
pages = "669--702",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0411",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:11 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Mannan:2011:LPD,
author = "Mohammad Mannan and P. C. van Oorschot",
title = "Leveraging personal devices for stronger password
authentication from untrusted computers",
journal = j-J-COMP-SECUR,
volume = "19",
number = "4",
pages = "703--750",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0412",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:11 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DeCapitanidiVimercati:2011:AED,
author = "Sabrina {De Capitani di Vimercati} and Sara Foresti
and Sushil Jajodia and Stefano Paraboschi and
Pierangela Samarati",
title = "Authorization enforcement in distributed query
evaluation",
journal = j-J-COMP-SECUR,
volume = "19",
number = "4",
pages = "751--794",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0413",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:11 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Shin:2011:PAM,
author = "Heechang Shin and Jaideep Vaidya and Vijayalakshmi
Atluri",
title = "A profile anonymization model for location-based
services",
journal = j-J-COMP-SECUR,
volume = "19",
number = "5",
pages = "795--833",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0416",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gritzalis:2011:SPM,
author = "Dimitris Gritzalis and Giannis Marias and Yacine
Rebahi and Yannis Soupionis and Sven Ehlert",
title = "{SPIDER}: A platform for managing {SIP}-based {Spam
over Internet Telephony (SPIT)}",
journal = j-J-COMP-SECUR,
volume = "19",
number = "5",
pages = "835--867",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2010-0419",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hsu:2011:WLC,
author = "Francis Hsu and Hao Chen and Sridhar Machiraju",
title = "{WebCallerID}: Leveraging cellular networks for {Web}
authentication",
journal = j-J-COMP-SECUR,
volume = "19",
number = "5",
pages = "869--893",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0424",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Curtmola:2011:SSE,
author = "Reza Curtmola and Juan Garay and Seny Kamara and
Rafail Ostrovsky",
title = "Searchable symmetric encryption: Improved definitions
and efficient constructions",
journal = j-J-COMP-SECUR,
volume = "19",
number = "5",
pages = "895--934",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0426",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Dewri:2011:EPV,
author = "Rinku Dewri and Indrajit Ray and Indrakshi Ray and
Darrell Whitley",
title = "Exploring privacy versus data quality trade-offs in
anonymization techniques using multi-objective
optimization",
journal = j-J-COMP-SECUR,
volume = "19",
number = "5",
pages = "935--974",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0428",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kamil:2011:ATS,
author = "Allaa Kamil and Gavin Lowe",
title = "Analysing {TLS} in the strand spaces model",
journal = j-J-COMP-SECUR,
volume = "19",
number = "5",
pages = "975--1025",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0429",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:15 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gritzalis:2011:GEP,
author = "Dimitris Gritzalis",
title = "{Guest Editor}'s Preface",
journal = j-J-COMP-SECUR,
volume = "19",
number = "6",
pages = "1027--1028",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0441",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Yasuoka:2011:BPQ,
author = "Hirotoshi Yasuoka and Tachio Terauchi",
title = "On bounding problems of quantitative information
flow",
journal = j-J-COMP-SECUR,
volume = "19",
number = "6",
pages = "1029--1082",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0437",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zhang:2011:UTA,
author = "Chao Zhang and Wei Zou and Tielei Wang and Yu Chen and
Tao Wei",
title = "Using type analysis in compiler to mitigate
integer-overflow-to-buffer-overflow threat",
journal = j-J-COMP-SECUR,
volume = "19",
number = "6",
pages = "1083--1107",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0434",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Deng:2011:ZKB,
author = "Robert H. Deng and Yingjiu Li and Moti Yung and Yunlei
Zhao",
title = "A zero-knowledge based framework for {RFID} privacy",
journal = j-J-COMP-SECUR,
volume = "19",
number = "6",
pages = "1109--1146",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0440",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Nithyanand:2011:UAR,
author = "Rishab Nithyanand and Gene Tsudik and Ersin Uzun",
title = "User-aided reader revocation in {PKI}-based {RFID}
systems",
journal = j-J-COMP-SECUR,
volume = "19",
number = "6",
pages = "1147--1172",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0435",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2011:AIV,
author = "Anonymous",
title = "Author Index Volume 19 (2011)",
journal = j-J-COMP-SECUR,
volume = "19",
number = "6",
pages = "1173--1176",
month = "????",
year = "2011",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-19606",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Armando:2012:P,
author = "Alessandro Armando and Gavin Lowe",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "20",
number = "1",
pages = "1--1",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0438",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Alvim:2012:QIF,
author = "M{\'a}rio S. Alvim and Miguel E. Andr{\'e}s and
Catuscia Palamidessi",
title = "Quantitative information flow in interactive systems",
journal = j-J-COMP-SECUR,
volume = "20",
number = "1",
pages = "3--50",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0433",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bielova:2012:IES,
author = "Nataliia Bielova and Fabio Massacci",
title = "Iterative enforcement by suppression: Towards
practical enforcement theories",
journal = j-J-COMP-SECUR,
volume = "20",
number = "1",
pages = "51--79",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0431",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Costa:2012:MPS,
author = "Gabriele Costa and Pierpaolo Degano and Fabio
Martinelli",
title = "Modular plans for secure service composition",
journal = j-J-COMP-SECUR,
volume = "20",
number = "1",
pages = "81--117",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0430",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zhou:2012:FAS,
author = "Hongbin Zhou and Simon N. Foley",
title = "Fast automatic security protocol generation",
journal = j-J-COMP-SECUR,
volume = "20",
number = "2--3",
pages = "119--167",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0432",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Stakhanova:2012:TCS,
author = "Natalia Stakhanova and Chris Strasburg and Samik Basu
and Johnny S. Wong",
title = "Towards cost-sensitive assessment of intrusion
response selection",
journal = j-J-COMP-SECUR,
volume = "20",
number = "2--3",
pages = "169--198",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0436",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bowen:2012:SGI,
author = "Brian M. Bowen and Vasileios P. Kemerlis and Pratap
Prabhu and Angelos D. Keromytis and Salvatore J.
Stolfo",
title = "A system for generating and injecting
indistinguishable network decoys",
journal = j-J-COMP-SECUR,
volume = "20",
number = "2--3",
pages = "199--221",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2011-0439",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ahn:2012:PDR,
author = "Gail-Joon Ahn and Jing Jin and Mohamed Shehab",
title = "Policy-driven role-based access management for ad-hoc
collaboration",
journal = j-J-COMP-SECUR,
volume = "20",
number = "2--3",
pages = "223--257",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0446",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Blanton:2012:SOC,
author = "Marina Blanton and Mehrdad Aliasgari",
title = "Secure outsourced computation of iris matching",
journal = j-J-COMP-SECUR,
volume = "20",
number = "2--3",
pages = "259--305",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0447",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Barthe:2012:P,
author = "Gilles Barthe and Jorge Cuellar and Javier Lopez and
Alexander Pretschner",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "20",
number = "4",
pages = "307--308",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0462",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Armando:2012:SAS,
author = "Alessandro Armando and Silvio Ranise",
title = "Scalable automated symbolic analysis of administrative
role-based access control policies by {SMT} solving",
journal = j-J-COMP-SECUR,
volume = "20",
number = "4",
pages = "309--352",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0461",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Garg:2012:SAL,
author = "Deepak Garg and Frank Pfenning",
title = "Stateful authorization logic --- Proof theory and a
case study",
journal = j-J-COMP-SECUR,
volume = "20",
number = "4",
pages = "353--391",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0456",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bezzi:2012:MPI,
author = "Michele Bezzi and Sabrina {De Capitani di Vimercati}
and Sara Foresti and Giovanni Livraga and Pierangela
Samarati and Roberto Sassi",
title = "Modeling and preventing inferences from sensitive
value distributions in data release",
journal = j-J-COMP-SECUR,
volume = "20",
number = "4",
pages = "393--436",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0457",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sun:2012:TAV,
author = "Yanjie Sun and Chenyi Zhang and Jun Pang and Baptiste
Alcalde and Sjouke Mauw",
title = "A trust-augmented voting scheme for collaborative
privacy management",
journal = j-J-COMP-SECUR,
volume = "20",
number = "4",
pages = "437--459",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0453",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Li:2012:GEP,
author = "Yingjiu Li",
title = "{Guest Editor}'s Preface",
journal = j-J-COMP-SECUR,
volume = "20",
number = "5",
pages = "461--462",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0448",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ciriani:2012:OAE,
author = "Valentina Ciriani and Sabrina {De Capitani di
Vimercati} and Sara Foresti and Giovanni Livraga and
Pierangela Samarati",
title = "An {OBDD} approach to enforce confidentiality and
visibility constraints in data publishing",
journal = j-J-COMP-SECUR,
volume = "20",
number = "5",
pages = "463--508",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0449",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Biskup:2012:DPA,
author = "Joachim Biskup",
title = "Dynamic policy adaptation for inference control of
queries to a propositional information system",
journal = j-J-COMP-SECUR,
volume = "20",
number = "5",
pages = "509--546",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0450",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Adaikkalavan:2012:MSD,
author = "Raman Adaikkalavan and Xing Xie and Indrakshi Ray",
title = "Multilevel secure data stream processing: Architecture
and implementation",
journal = j-J-COMP-SECUR,
volume = "20",
number = "5",
pages = "547--581",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0451",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hong:2012:SED,
author = "Yuan Hong and Jaideep Vaidya and Haibing Lu",
title = "Secure and efficient distributed linear programming",
journal = j-J-COMP-SECUR,
volume = "20",
number = "5",
pages = "583--634",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0452",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Myers:2012:P,
author = "Andrew Myers and Michael Backes",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "20",
number = "6",
pages = "635--636",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0445",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chong:2012:RIR,
author = "Stephen Chong",
title = "Required information release",
journal = j-J-COMP-SECUR,
volume = "20",
number = "6",
pages = "637--676",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0442",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Becker:2012:IFT,
author = "Moritz Y. Becker",
title = "Information flow in trust management systems",
journal = j-J-COMP-SECUR,
volume = "20",
number = "6",
pages = "677--708",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0443",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kusters:2012:GBD,
author = "Ralf K{\"u}sters and Tomasz Truderung and Andreas
Vogt",
title = "A game-based definition of coercion resistance and its
applications",
journal = j-J-COMP-SECUR,
volume = "20",
number = "6",
pages = "709--764",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0444",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2012:AIV,
author = "Anonymous",
title = "Author Index Volume 20 (2012)",
journal = j-J-COMP-SECUR,
volume = "20",
number = "6",
pages = "765--767",
month = "????",
year = "2012",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-20605",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Yarmand:2013:BBA,
author = "Mohammad H. Yarmand and Kamran Sartipi and Douglas G.
Down",
title = "Behavior-based access control for distributed
healthcare systems",
journal = j-J-COMP-SECUR,
volume = "21",
number = "1",
pages = "1--39",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0454",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:44 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Meier:2013:ECM,
author = "Simon Meier and Cas Cremers and David Basin",
title = "Efficient construction of machine-checked symbolic
protocol security proofs",
journal = j-J-COMP-SECUR,
volume = "21",
number = "1",
pages = "41--87",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0455",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:44 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cortier:2013:AFH,
author = "V{\'e}ronique Cortier and Ben Smyth",
title = "Attacking and fixing {Helios}: An analysis of ballot
secrecy",
journal = j-J-COMP-SECUR,
volume = "21",
number = "1",
pages = "89--148",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0458",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:44 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cuppens:2013:FSM,
author = "Fr{\'e}d{\'e}ric Cuppens and Nora Cuppens-Boulahia and
Yehia Elrakaiby",
title = "Formal specification and management of security
policies with collective group obligations",
journal = j-J-COMP-SECUR,
volume = "21",
number = "1",
pages = "149--190",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0459",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:44 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Geigel:2013:NNT,
author = "Arturo Geigel",
title = "Neural network {Trojan}",
journal = j-J-COMP-SECUR,
volume = "21",
number = "2",
pages = "191--232",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0460",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:48 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Phatak:2013:SIN,
author = "Dhananjay Phatak and Alan T. Sherman and Nikhil Joshi
and Bhushan Sonawane and Vivek G. Relan and Amol
Dawalbhakta",
title = "Spread Identity: A new dynamic address remapping
mechanism for anonymity and {DDoS} defense",
journal = j-J-COMP-SECUR,
volume = "21",
number = "2",
pages = "233--281",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2012-0463",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:48 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kolesnikov:2013:SAP,
author = "Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas
Schneider",
title = "A systematic approach to practically efficient general
two-party secure function evaluation protocols and
their modular design",
journal = j-J-COMP-SECUR,
volume = "21",
number = "2",
pages = "283--315",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130464",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:48 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jadliwala:2013:OMZ,
author = "Murtuza Jadliwala and Igor Bilogrevic and Jean-Pierre
Hubaux",
title = "Optimizing mix-zone coverage in pervasive wireless
networks",
journal = j-J-COMP-SECUR,
volume = "21",
number = "3",
pages = "317--346",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130465",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kobsa:2013:CJV,
author = "Alfred Kobsa and Rishab Nithyanand and Gene Tsudik and
Ersin Uzun",
title = "Can {Jannie} verify? {Usability} of display-equipped
{RFID} tags for security purposes",
journal = j-J-COMP-SECUR,
volume = "21",
number = "3",
pages = "347--370",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130470",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kreitz:2013:FSW,
author = "Gunnar Kreitz",
title = "Flow stealing: A well-timed redirection attack",
journal = j-J-COMP-SECUR,
volume = "21",
number = "3",
pages = "371--391",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130466",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Herzberg:2013:FJL,
author = "Amir Herzberg and Ronen Margulies",
title = "Forcing {Johnny} to login safely",
journal = j-J-COMP-SECUR,
volume = "21",
number = "3",
pages = "393--424",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130467",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DeCapitanidiVimercati:2013:SCM,
author = "Sabrina {De Capitani di Vimercati} and Sara Foresti
and Stefano Paraboschi and Gerardo Pelosi and
Pierangela Samarati",
title = "Supporting concurrency and multiple indexes in private
access to outsourced data",
journal = j-J-COMP-SECUR,
volume = "21",
number = "3",
pages = "425--461",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130468",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:52 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Mardziel:2013:DEK,
author = "Piotr Mardziel and Stephen Magill and Michael Hicks
and Mudhakar Srivatsa",
title = "Dynamic enforcement of knowledge-based security
policies using probabilistic abstract interpretation",
journal = j-J-COMP-SECUR,
volume = "21",
number = "4",
pages = "463--532",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130469",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:55 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zhou:2013:SVC,
author = "Fangfei Zhou and Manish Goel and Peter Desnoyers and
Ravi Sundaram",
title = "Scheduler vulnerabilities and coordinated attacks in
cloud computing",
journal = j-J-COMP-SECUR,
volume = "21",
number = "4",
pages = "533--559",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130474",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:55 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Homer:2013:AVM,
author = "John Homer and Su Zhang and Xinming Ou and David
Schmidt and Yanhui Du and S. Raj Rajagopalan and Anoop
Singhal",
title = "Aggregating vulnerability metrics in enterprise
networks using attack graphs",
journal = j-J-COMP-SECUR,
volume = "21",
number = "4",
pages = "561--597",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130475",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:55 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Visconti:2013:SIA,
author = "Ivan Visconti",
title = "Special Issue: Advances in Security for Communication
Networks",
journal = j-J-COMP-SECUR,
volume = "21",
number = "5",
pages = "599--600",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130483",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Baron:2013:SPM,
author = "Joshua Baron and Karim {El Defrawy} and Kirill
Minkovich and Rafail Ostrovsky and Eric Tressler",
title = "{5PM}: Secure pattern matching",
journal = j-J-COMP-SECUR,
volume = "21",
number = "5",
pages = "601--625",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130481",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Blazy:2013:SBS,
author = "Olivier Blazy and Georg Fuchsbauer and David
Pointcheval and Damien Vergnaud",
title = "Short blind signatures",
journal = j-J-COMP-SECUR,
volume = "21",
number = "5",
pages = "627--661",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130477",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gentry:2013:FSB,
author = "Craig Gentry and Shai Halevi and Chris Peikert and
Nigel P. Smart",
title = "Field switching in {BGV}-style homomorphic
encryption",
journal = j-J-COMP-SECUR,
volume = "21",
number = "5",
pages = "663--684",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130480",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lipmaa:2013:MEC,
author = "Helger Lipmaa and Bingsheng Zhang",
title = "A more efficient computationally sound non-interactive
zero-knowledge shuffle argument",
journal = j-J-COMP-SECUR,
volume = "21",
number = "5",
pages = "685--719",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130478",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Myers:2013:BBC,
author = "Steven Myers and Mona Sergi and abhi shelat",
title = "Black-box construction of a more than non-malleable
{CCA1} encryption scheme from plaintext awareness",
journal = j-J-COMP-SECUR,
volume = "21",
number = "5",
pages = "721--748",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130485",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Nieto:2013:PVC,
author = "Juan Gonz{\'a}lez Nieto and Mark Manulis and Bertram
Poettering and Jothi Rangasamy and Douglas Stebila",
title = "Publicly verifiable ciphertexts",
journal = j-J-COMP-SECUR,
volume = "21",
number = "5",
pages = "749--778",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130473",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:25:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Degano:2013:P,
author = "Pierpaolo Degano and Joshua D. Guttman",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "21",
number = "6",
pages = "779--780",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130488",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:04 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Paiola:2013:VSP,
author = "Miriam Paiola and Bruno Blanchet",
title = "Verification of security protocols with lists: From
length one to unbounded length",
journal = j-J-COMP-SECUR,
volume = "21",
number = "6",
pages = "781--816",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130471",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:04 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Basin:2013:PRI,
author = "David Basin and Cas Cremers and Simon Meier",
title = "Provably repairing the {ISO\slash IEC 9798} standard
for entity authentication",
journal = j-J-COMP-SECUR,
volume = "21",
number = "6",
pages = "817--846",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130472",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:04 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Arapinis:2013:PSC,
author = "Myrto Arapinis and Sergiu Bursuc and Mark Ryan",
title = "Privacy-supporting cloud computing by in-browser key
translation",
journal = j-J-COMP-SECUR,
volume = "21",
number = "6",
pages = "847--880",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130489",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:04 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Barthe:2013:VIH,
author = "Gilles Barthe and Benjamin Gr{\'e}goire and Sylvain
Heraud and Federico Olmedo and Santiago
Zanella-B{\'e}guelin",
title = "Verified indifferentiable hashing into elliptic
curves",
journal = j-J-COMP-SECUR,
volume = "21",
number = "6",
pages = "881--917",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130476",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:04 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Acar:2013:CCP,
author = "Umut A. Acar and Amal Ahmed and James Cheney and Roly
Perera",
title = "A core calculus for provenance",
journal = j-J-COMP-SECUR,
volume = "21",
number = "6",
pages = "919--969",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130487",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:04 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Centenaro:2013:TBA,
author = "Matteo Centenaro and Riccardo Focardi and Flaminia L.
Luccio",
title = "Type-based analysis of key management in {PKCS\#11}
cryptographic devices",
journal = j-J-COMP-SECUR,
volume = "21",
number = "6",
pages = "971--1007",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130479",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:04 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2013:AIV,
author = "Anonymous",
title = "Author Index Volume 21 (2013)",
journal = j-J-COMP-SECUR,
volume = "21",
number = "6",
pages = "1009--1012",
month = "????",
year = "2013",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2013-21608",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:04 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lu:2014:OFR,
author = "Haibing Lu and Jaideep Vaidya and Vijayalakshmi
Atluri",
title = "An optimization framework for role mining",
journal = j-J-COMP-SECUR,
volume = "22",
number = "1",
pages = "1--31",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130484",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:08 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Yuen:2014:TCT,
author = "Tsz Hon Yuen and Willy Susilo and Yi Mu",
title = "Towards a cryptographic treatment of publish\slash
subscribe systems",
journal = j-J-COMP-SECUR,
volume = "22",
number = "1",
pages = "33--67",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130486",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:08 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Niu:2014:FVS,
author = "Jianwei Niu and Mark Reith and William H.
Winsborough",
title = "Formal verification of security properties in trust
management policy",
journal = j-J-COMP-SECUR,
volume = "22",
number = "1",
pages = "69--153",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130490",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:08 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Peddinti:2014:WSQ,
author = "Sai Teja Peddinti and Nitesh Saxena",
title = "{Web} search query privacy: Evaluating query
obfuscation and anonymizing networks",
journal = j-J-COMP-SECUR,
volume = "22",
number = "1",
pages = "155--199",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130491",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:08 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chatzikokolakis:2014:FAS,
author = "Konstantinos Chatzikokolakis and Sebastian Alexander
M{\"o}dersheim and Catuscia Palamidessi and Jun Pang",
title = "Foundational aspects of security",
journal = j-J-COMP-SECUR,
volume = "22",
number = "2",
pages = "201--202",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140497",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Guttman:2014:EPP,
author = "Joshua D. Guttman",
title = "Establishing and preserving protocol security goals",
journal = j-J-COMP-SECUR,
volume = "22",
number = "2",
pages = "203--267",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140499",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ngo:2014:EVC,
author = "Tri Minh Ngo and Mari{\"e}lle Stoelinga and Marieke
Huisman",
title = "Effective verification of confidentiality for
multi-threaded programs",
journal = j-J-COMP-SECUR,
volume = "22",
number = "2",
pages = "269--300",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130492",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
https://www.math.utah.edu/pub/tex/bib/multithreading.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Backes:2014:UIR,
author = "Michael Backes and C{\u{a}}t{\u{a}}lin Hri{\c{t}}cu
and Matteo Maffei",
title = "Union, intersection and refinement types and reasoning
about type disjointness for secure protocol
implementations",
journal = j-J-COMP-SECUR,
volume = "22",
number = "2",
pages = "301--353",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130493",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Blundo:2014:EEP,
author = "Carlo Blundo and Emiliano {De Cristofaro} and Paolo
Gasti",
title = "{EsPRESSO}: Efficient privacy-preserving evaluation of
sample set similarity",
journal = j-J-COMP-SECUR,
volume = "22",
number = "3",
pages = "355--381",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130482",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:16 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Soupionis:2014:GTA,
author = "Yannis Soupionis and Remous-Aris Koutsiamanis and
Pavlos Efraimidis and Dimitris Gritzalis",
title = "A game-theoretic analysis of preventing spam over
{Internet Telephony} via audio {CAPTCHA}-based
authentication",
journal = j-J-COMP-SECUR,
volume = "22",
number = "3",
pages = "383--413",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140496",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:16 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bisht:2014:ADP,
author = "Prithvi Bisht and Timothy Hinrichs and Nazari Skrupsky
and V. N. Venkatakrishnan",
title = "Automated detection of parameter tampering
opportunities and vulnerabilities in web applications",
journal = j-J-COMP-SECUR,
volume = "22",
number = "3",
pages = "415--465",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140498",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:16 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Desmet:2014:P,
author = "Lieven Desmet and Martin Johns and Benjamin Livshits
and Andrei Sabelfeld",
title = "Preface",
journal = j-J-COMP-SECUR,
volume = "22",
number = "4",
pages = "467--468",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140506",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DeGroef:2014:SME,
author = "Willem {De Groef} and Dominique Devriese and Nick
Nikiforakis and Frank Piessens",
title = "Secure multi-execution of web scripts: Theory and
practice",
journal = j-J-COMP-SECUR,
volume = "22",
number = "4",
pages = "469--509",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130495",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Politz:2014:TBV,
author = "Joe Gibbs Politz and Arjun Guha and Shriram
Krishnamurthi",
title = "Typed-based verification of {Web} sandboxes",
journal = j-J-COMP-SECUR,
volume = "22",
number = "4",
pages = "511--565",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140504",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Heiderich:2014:SAS,
author = "M. Heiderich and M. Niemietz and F. Schuster and T.
Holz and J. Schwenk",
title = "Scriptless attacks: Stealing more pie without touching
the sill",
journal = j-J-COMP-SECUR,
volume = "22",
number = "4",
pages = "567--599",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-130494",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bansal:2014:DCA,
author = "Chetan Bansal and Karthikeyan Bhargavan and Antoine
Delignat-Lavaud and Sergio Maffeis",
title = "Discovering concrete attacks on website authorization
by formal analysis",
journal = j-J-COMP-SECUR,
volume = "22",
number = "4",
pages = "601--657",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140503",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:20 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Backes:2014:MGE,
author = "Michael Backes and Steve Zdancewic",
title = "Message from the {Guest Editors}",
journal = j-J-COMP-SECUR,
volume = "22",
number = "5",
pages = "659--660",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140505",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Basin:2014:OFA,
author = "David Basin and Samuel J. Burri and G{\"u}nter
Karjoth",
title = "Obstruction-free authorization enforcement: Aligning
security and business objectives",
journal = j-J-COMP-SECUR,
volume = "22",
number = "5",
pages = "661--698",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140500",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Schlesinger:2014:MPA,
author = "Cole Schlesinger and Karthik Pattabiraman and Nikhil
Swamy and David Walker and Benjamin Zorn",
title = "Modular protections against non-control data attacks",
journal = j-J-COMP-SECUR,
volume = "22",
number = "5",
pages = "699--742",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140502",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Arapinis:2014:SVS,
author = "Myrto Arapinis and Joshua Phillips and Eike Ritter and
Mark D. Ryan",
title = "{StatVerif}: Verification of stateful processes",
journal = j-J-COMP-SECUR,
volume = "22",
number = "5",
pages = "743--821",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140501",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Dupressoir:2014:GGP,
author = "Fran{\c{c}}ois Dupressoir and Andrew D. Gordon and Jan
J{\"u}rjens and David A. Naumann",
title = "Guiding a general-purpose {C} verifier to prove
cryptographic protocols",
journal = j-J-COMP-SECUR,
volume = "22",
number = "5",
pages = "823--866",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140508",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:24 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Akinyele:2014:MGA,
author = "Joseph A. Akinyele and Matthew Green and Susan
Hohenberger and Matthew Pagano",
title = "Machine-generated algorithms, proofs and software for
the batch verification of digital signature schemes",
journal = j-J-COMP-SECUR,
volume = "22",
number = "6",
pages = "867--912",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140507",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Braun:2014:CTM,
author = "Johannes Braun and Florian Volk and Jiska Classen and
Johannes Buchmann and Max M{\"u}hlh{\"a}user",
title = "{CA} trust management for the {Web PKI}",
journal = j-J-COMP-SECUR,
volume = "22",
number = "6",
pages = "913--959",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140509",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Uzun:2014:SAT,
author = "Emre Uzun and Vijayalakshmi Atluri and Jaideep Vaidya
and Shamik Sural and Anna Lisa Ferrara and Gennaro
Parlato and P. Madhusudan",
title = "Security analysis for temporal role based access
control",
journal = j-J-COMP-SECUR,
volume = "22",
number = "6",
pages = "961--996",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140510",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chen:2014:PUQ,
author = "Yen-Chung Chen and Yu-Sung Wu and Wen-Guey Tzeng",
title = "Preserving user query privacy in cloud-based security
services",
journal = j-J-COMP-SECUR,
volume = "22",
number = "6",
pages = "997--1024",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140520",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Buchmann:2014:TMS,
author = "Nicolas Buchmann and Harald Baier",
title = "Towards a more secure and scalable verifying {PKI} of
{eMRTD}",
journal = j-J-COMP-SECUR,
volume = "22",
number = "6",
pages = "1025--1049",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140522",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2014:AIV,
author = "Anonymous",
title = "Author Index Volume 22 (2014)",
journal = j-J-COMP-SECUR,
volume = "22",
number = "6",
pages = "1051--1054",
month = "????",
year = "2014",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-2014-22606",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:28 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Yang:2015:PAA,
author = "Ping Yang and Mikhail I. Gofman and Scott D. Stoller
and Zijiang Yang",
title = "Policy analysis for administrative role based access
control without separate administration",
journal = j-J-COMP-SECUR,
volume = "23",
number = "1",
pages = "1--29",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140511",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Mitra:2015:GTR,
author = "Barsha Mitra and Shamik Sural and Vijayalakshmi Atluri
and Jaideep Vaidya",
title = "The generalized temporal role mining problem",
journal = j-J-COMP-SECUR,
volume = "23",
number = "1",
pages = "31--58",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140512",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DeCapitanidiVimercati:2015:LAI,
author = "Sabrina {De Capitani di Vimercati} and Sara Foresti
and Sushil Jajodia and Giovanni Livraga and Stefano
Paraboschi and Pierangela Samarati",
title = "Loose associations to increase utility in data
publishing",
journal = j-J-COMP-SECUR,
volume = "23",
number = "1",
pages = "59--88",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140513",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{AlBouna:2015:ATD,
author = "Bechara {Al Bouna} and Chris Clifton and Qutaibah
Malluhi",
title = "Anonymizing transactional datasets",
journal = j-J-COMP-SECUR,
volume = "23",
number = "1",
pages = "89--106",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140517",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lu:2015:TUO,
author = "Haibing Lu and Yuan Hong and Yanjiang Yang and Lian
Duan and Nazia Badar",
title = "Towards user-oriented {RBAC} model",
journal = j-J-COMP-SECUR,
volume = "23",
number = "1",
pages = "107--129",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140519",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Liu:2015:JSD,
author = "Wen Ming Liu and Lingyu Wang and Lei Zhang and Shunzhi
Zhu",
title = "$k$-jump: A strategy to design publicly-known
algorithms for privacy preserving micro-data
disclosure",
journal = j-J-COMP-SECUR,
volume = "23",
number = "2",
pages = "131--165",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140514",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bates:2015:AWK,
author = "Adam Bates and Kevin R. B. Butler and Micah Sherr and
Clay Shields and Patrick Traynor and Dan Wallach",
title = "Accountable wiretapping --- or --- {I} know they can
hear you now",
journal = j-J-COMP-SECUR,
volume = "23",
number = "2",
pages = "167--195",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140515",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{vanderMeyden:2015:WII,
author = "Ron van der Meyden",
title = "What, indeed, is intransitive noninterference?",
journal = j-J-COMP-SECUR,
volume = "23",
number = "2",
pages = "197--228",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140516",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Boureanu:2015:PPS,
author = "Ioana Boureanu and Aikaterini Mitrokotsa and Serge
Vaudenay",
title = "Practical and provably secure distance-bounding",
journal = j-J-COMP-SECUR,
volume = "23",
number = "2",
pages = "229--257",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140518",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:36 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gibson-Robinson:2015:VLS,
author = "Thomas Gibson-Robinson and Allaa Kamil and Gavin
Lowe",
title = "Verifying layered security protocols",
journal = j-J-COMP-SECUR,
volume = "23",
number = "3",
pages = "259--307",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150526",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Dimitrakakis:2015:ELA,
author = "Christos Dimitrakakis and Aikaterini Mitrokotsa and
Serge Vaudenay",
title = "Expected loss analysis for authentication in
constrained channels",
journal = j-J-COMP-SECUR,
volume = "23",
number = "3",
pages = "309--329",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140521",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cade:2015:PGI,
author = "David Cad{\'e} and Bruno Blanchet",
title = "Proved generation of implementations from
computationally secure protocol specifications",
journal = j-J-COMP-SECUR,
volume = "23",
number = "3",
pages = "331--402",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150524",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Yuan:2015:PPC,
author = "Jiawei Yuan and Shucheng Yu",
title = "{PCPOR}: Public and constant-cost proofs of
retrievability in {cloud1}",
journal = j-J-COMP-SECUR,
volume = "23",
number = "3",
pages = "403--425",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150525",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Alvim:2015:ILD,
author = "M{\'a}rio S. Alvim and Miguel E. Andr{\'e}s and
Konstantinos Chatzikokolakis and Pierpaolo Degano and
Catuscia Palamidessi",
title = "On the information leakage of differentially-private
mechanisms",
journal = j-J-COMP-SECUR,
volume = "23",
number = "4",
pages = "427--469",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150528",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:43 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Shen:2015:DIC,
author = "Shiuan-Tzuo Shen and Wen-Guey Tzeng",
title = "Delegated integrity check for hierarchical cloud
data",
journal = j-J-COMP-SECUR,
volume = "23",
number = "4",
pages = "471--508",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150527",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:43 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bugliesi:2015:CPB,
author = "Michele Bugliesi and Stefano Calzavara and Riccardo
Focardi and Wilayat Khan",
title = "{CookiExt}: Patching the browser against session
hijacking attacks",
journal = j-J-COMP-SECUR,
volume = "23",
number = "4",
pages = "509--537",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150529",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:43 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Spalazzi:2015:SIS,
author = "Luca Spalazzi and Luca Vigan{\`o}",
title = "Special issue on security and high performance
computing systems",
journal = j-J-COMP-SECUR,
volume = "23",
number = "5",
pages = "539--540",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150537",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:46 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lowden:2015:DPA,
author = "Jason Lowden and Marcin {\L}ukowiak and Sonia Lopez
Alarcon",
title = "Design and performance analysis of efficient {Keccak}
tree hashing on {GPU} architectures",
journal = j-J-COMP-SECUR,
volume = "23",
number = "5",
pages = "541--562",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150534",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:46 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bella:2015:SSP,
author = "Giampaolo Bella and Paul Curzon and Gabriele Lenzini",
title = "Service security and privacy as a socio-technical
problem",
journal = j-J-COMP-SECUR,
volume = "23",
number = "5",
pages = "563--585",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150536",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:46 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Dreier:2015:BFP,
author = "Jannik Dreier and Jean-Guillaume Dumas and Pascal
Lafourcade",
title = "{Brandt}'s fully private auction protocol revisited",
journal = j-J-COMP-SECUR,
volume = "23",
number = "5",
pages = "587--610",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150535",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:46 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Merlo:2015:MEP,
author = "Alessio Merlo and Mauro Migliardi and Paolo
Fontanelli",
title = "Measuring and estimating power consumption in
{Android} to support energy-based intrusion detection",
journal = j-J-COMP-SECUR,
volume = "23",
number = "5",
pages = "611--637",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150530",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:46 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2015:RPS,
author = "Anonymous",
title = "Regular Paper Section",
journal = j-J-COMP-SECUR,
volume = "23",
number = "5",
pages = "639--639",
month = "????",
year = "2015",
CODEN = "JCSIET",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:46 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Belim:2015:AGR,
author = "Sergey Belim and Nadezda Bogachenko and Evgeniy
Ilushechkin",
title = "An analysis of graphs that represent a role-based
security policy hierarchy",
journal = j-J-COMP-SECUR,
volume = "23",
number = "5",
pages = "641--657",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150532",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:46 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Li:2015:NAC,
author = "Jin Li and Xiaofeng Chen and Jingwei Li and Chunfu Jia
and Jianfeng Ma and Wenjing Lou",
title = "New access control systems based on outsourced
attribute-based encryption",
journal = j-J-COMP-SECUR,
volume = "23",
number = "6",
pages = "659--683",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150533",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:51 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Alshehri:2015:FFS,
author = "Ali Alshehri and Steve Schneider",
title = "A formal framework for security analysis of {NFC}
mobile coupon protocols",
journal = j-J-COMP-SECUR,
volume = "23",
number = "6",
pages = "685--707",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150531",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:51 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bonatti:2015:EDR,
author = "Piero Bonatti and Clemente Galdi and Davide Torres",
title = "Event-driven {RBAC}",
journal = j-J-COMP-SECUR,
volume = "23",
number = "6",
pages = "709--757",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150539",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:51 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Mallios:2015:PCE,
author = "Yannis Mallios and Lujo Bauer and Dilsun Kaynar and
Fabio Martinelli and Charles Morisset",
title = "Probabilistic cost enforcement of security policies",
journal = j-J-COMP-SECUR,
volume = "23",
number = "6",
pages = "759--787",
month = "????",
year = "2015",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150538",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:51 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2015:AIV,
author = "Anonymous",
title = "Author Index Volume 23 (2015)",
journal = j-J-COMP-SECUR,
volume = "23",
number = "6",
pages = "789--791",
month = "????",
year = "2015",
CODEN = "JCSIET",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:51 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bohl:2016:SUC,
author = "Florian B{\"o}hl and Dominique Unruh",
title = "Symbolic universal composability",
journal = j-J-COMP-SECUR,
volume = "24",
number = "1",
pages = "1--38",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-140523",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:55 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Rafnsson:2016:SME,
author = "Willard Rafnsson and Andrei Sabelfeld",
title = "Secure multi-execution: Fine-grained,
declassification-aware, and transparent",
journal = j-J-COMP-SECUR,
volume = "24",
number = "1",
pages = "39--90",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150541",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:55 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Luo:2016:MCM,
author = "Zhengqin Luo and Jos{\'e} Fragoso Santos and Ana
Almeida Matos and Tamara Rezk",
title = "{Mashic} compiler: Mashup sandboxing based on
inter-frame communication",
journal = j-J-COMP-SECUR,
volume = "24",
number = "1",
pages = "91--136",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160542",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:55 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Carter:2016:SOG,
author = "Henry Carter and Benjamin Mood and Patrick Traynor and
Kevin Butler",
title = "Secure outsourced garbled circuit evaluation for
mobile devices",
journal = j-J-COMP-SECUR,
volume = "24",
number = "2",
pages = "137--180",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-150540",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hedin:2016:IFS,
author = "Daniel Hedin and Luciano Bello and Andrei Sabelfeld",
title = "Information-flow security for {JavaScript} and its
{APIs}",
journal = j-J-COMP-SECUR,
volume = "24",
number = "2",
pages = "181--234",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160544",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/java2010.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Taglienti:2016:UAP,
author = "Claudio Taglienti and James Cannady",
title = "The user attribution problem and the challenge of
persistent surveillance of user activity in complex
networks",
journal = j-J-COMP-SECUR,
volume = "24",
number = "2",
pages = "235--288",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160546",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chen:2016:PEP,
author = "Yu Chen and Zongyang Zhang",
title = "Publicly evaluable pseudorandom functions and their
applications",
journal = j-J-COMP-SECUR,
volume = "24",
number = "2",
pages = "289--320",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160547",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Tue May 24 06:26:59 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer Security",
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Vavilis:2016:SBQ,
author = "Sokratis Vavilis and Milan Petkovi{\'c} and Nicola
Zannone",
title = "A severity-based quantification of data leakages in
database systems",
journal = j-J-COMP-SECUR,
volume = "24",
number = "3",
pages = "321--345",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160543",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 12 16:13:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DeCapitanidiVimercati:2016:EIC,
author = "Sabrina {De Capitani di Vimercati} and Sara Foresti
and Sushil Jajodia and Stefano Paraboschi and
Pierangela Samarati",
title = "Efficient integrity checks for join queries in the
cloud",
journal = j-J-COMP-SECUR,
volume = "24",
number = "3",
pages = "347--378",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160545",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 12 16:13:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Le:2016:MCR,
author = "Meixing Le and Krishna Kant and Malek Athamnah and
Sushil Jajodia",
title = "Minimum cost rule enforcement for cooperative database
access",
journal = j-J-COMP-SECUR,
volume = "24",
number = "3",
pages = "379--403",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160548",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 12 16:13:31 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jing:2016:TML,
author = "Yiming Jing and Gail-Joon Ahn and Hongxin Hu and
Haehyun Cho and Ziming Zhao",
title = "{TripleMon}: A multi-layer security framework for
mediating inter-process communication on {Android}",
journal = j-J-COMP-SECUR,
volume = "24",
number = "4",
pages = "405--426",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160552",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 12 16:13:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bodei:2016:CAS,
author = "Chiara Bodei and Pierpaolo Degano and Letterio
Galletta and Francesco Salvatori",
title = "Context-aware security: Linguistic mechanisms and
static analysis",
journal = j-J-COMP-SECUR,
volume = "24",
number = "4",
pages = "427--477",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160551",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 12 16:13:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DiCrescenzo:2016:PPP,
author = "Giovanni {Di Crescenzo} and Debra L. Cook and Allen
McIntosh and Euthimios Panagos",
title = "Practical and privacy-preserving information retrieval
from a database table",
journal = j-J-COMP-SECUR,
volume = "24",
number = "4",
pages = "479--506",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160550",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 12 16:13:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kar:2016:SSI,
author = "Debabrata Kar and Suvasini Panigrahi and Srikanth
Sundararajan",
title = "{SQLiDDS}: {SQL} injection detection using document
similarity measure",
journal = j-J-COMP-SECUR,
volume = "24",
number = "4",
pages = "507--539",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160554",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 12 16:13:32 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lester:2016:IFA,
author = "Martin Lester and Luke Ong and Max Sch{\"a}fer",
title = "Information flow analysis for a dynamically typed
language with staged metaprogramming",
journal = j-J-COMP-SECUR,
volume = "24",
number = "5",
pages = "541--582",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160557",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:06 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kremer:2016:AAS,
author = "Steve Kremer and Robert K{\"u}nnemann",
title = "Automated analysis of security protocols with global
state",
journal = j-J-COMP-SECUR,
volume = "24",
number = "5",
pages = "583--616",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160556",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:06 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DSouza:2016:MCT,
author = "Deepak D'Souza and K. R. Raghavendra",
title = "Model-checking trace-based information flow properties
for infinite-state systems",
journal = j-J-COMP-SECUR,
volume = "24",
number = "5",
pages = "617--643",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160549",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:06 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sonchack:2016:ELS,
author = "John Sonchack and Adam J. Aviv",
title = "Exploring large scale security system reproducibility
with the {LESS} simulator",
journal = j-J-COMP-SECUR,
volume = "24",
number = "5",
pages = "645--665",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160553",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:06 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Davidson:2016:CSS,
author = "Michal Davidson and Tamir Tassa and Ehud Gudes",
title = "Content sharing schemes in {DRM} systems with enhanced
performance and privacy preservation",
journal = j-J-COMP-SECUR,
volume = "24",
number = "6",
pages = "667--688",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-15746",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:07 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{deAmorim:2016:VIF,
author = "Arthur Azevedo de Amorim and Nathan Collins and
Andr{\'e} DeHon and Delphine Demange and
C{\u{a}}t{\u{a}}lin Hri{\c{t}}cu and David Pichardie
and Benjamin C. Pierce and Randy Pollack and Andrew
Tolmach",
title = "A verified information-flow architecture",
journal = j-J-COMP-SECUR,
volume = "24",
number = "6",
pages = "689--734",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-15784",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:07 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Jajodia:2016:UTP,
author = "Sushil Jajodia and Noseong Park and Edoardo Serra and
V. S. Subrahmanian",
title = "Using temporal probabilistic logic for optimal
monitoring of security events with limited resources",
journal = j-J-COMP-SECUR,
volume = "24",
number = "6",
pages = "735--791",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160555",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:07 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Guanciale:2016:PSM,
author = "Roberto Guanciale and Hamed Nemati and Mads Dam and
Christoph Baumann",
title = "Provably secure memory isolation for {Linux} on
{ARM}",
journal = j-J-COMP-SECUR,
volume = "24",
number = "6",
pages = "793--837",
month = "????",
year = "2016",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-160558",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:07 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
https://www.math.utah.edu/pub/tex/bib/linux.bib;
https://www.math.utah.edu/pub/tex/bib/unix.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2016:AIV,
author = "Anonymous",
title = "Author Index Volume 24 (2016)",
journal = j-J-COMP-SECUR,
volume = "24",
number = "6",
pages = "839--841",
month = "????",
year = "2016",
CODEN = "JCSIET",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:07 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Halpern:2017:QQP,
author = "Joseph Y. Halpern",
title = "From qualitative to quantitative proofs of security
properties using first-order conditional logic",
journal = j-J-COMP-SECUR,
volume = "25",
number = "1",
pages = "1--19",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-15774",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:08 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cortier:2017:FAN,
author = "V{\'e}ronique Cortier and Cyrille Wiedling",
title = "A formal analysis of the {Norwegian} {E}-voting
protocol",
journal = j-J-COMP-SECUR,
volume = "25",
number = "1",
pages = "21--57",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-15777",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:08 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Wuller:2017:DPP,
author = "Stefan W{\"u}ller and Daniel Mayer and Fabian F{\"o}rg
and Samuel Sch{\"u}ppen and Benjamin Assadsolimani and
Ulrike Meyer and Susanne Wetzel",
title = "Designing privacy-preserving interval operations based
on homomorphic encryption and secret sharing
techniques",
journal = j-J-COMP-SECUR,
volume = "25",
number = "1",
pages = "59--81",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16830",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:08 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Crampton:2017:BOW,
author = "Jason Crampton and Gregory Gutin and Daniel Karapetyan
and R{\'e}mi Watrigant",
title = "The bi-objective workflow satisfiability problem and
workflow resiliency",
journal = j-J-COMP-SECUR,
volume = "25",
number = "1",
pages = "83--115",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16849",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:08 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Continella:2017:PAW,
author = "Andrea Continella and Michele Carminati and Mario
Polino and Andrea Lanzi and Stefano Zanero and Federico
Maggi",
title = "{Prometheus}: Analyzing {WebInject}-based information
stealers",
journal = j-J-COMP-SECUR,
volume = "25",
number = "2",
pages = "117--137",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-15773",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:09 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Guan:2017:SKE,
author = "Albert Guan and Wen-Guey Tzeng",
title = "A secret key establishment protocol for wireless
networks using noisy channels",
journal = j-J-COMP-SECUR,
volume = "25",
number = "2",
pages = "139--151",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-15807",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:09 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lin:2017:SAC,
author = "Chung-Yi Lin and Wen-Guey Tzeng",
title = "Strategy analysis for cloud storage reliability
management based on game theory",
journal = j-J-COMP-SECUR,
volume = "25",
number = "2",
pages = "153--171",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16813",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:09 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Migault:2017:DEI,
author = "Daniel Migault and Tobias Guggemos and Sylvain Killian
and Maryline Laurent and Guy Pujolle and Jean Philippe
Wary",
title = "{Diet-ESP}: {IP} layer security for {IoT}",
journal = j-J-COMP-SECUR,
volume = "25",
number = "2",
pages = "173--203",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16857",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:09 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Mohamed:2017:SUD,
author = "Manar Mohamed and Song Gao and Niharika Sachdeva and
Nitesh Saxena and Chengcui Zhang and Ponnurangam
Kumaraguru and Paul C. {Van Oorschot}",
title = "On the security and usability of dynamic cognitive
game {CAPTCHAs}",
journal = j-J-COMP-SECUR,
volume = "25",
number = "3",
pages = "205--230",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16847",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:10 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cheng:2017:SFN,
author = "Yao Cheng and Yingjiu Li and Robert Deng and Lingyun
Ying and Wei He",
title = "A study on a feasible no-root approach on {Android}",
journal = j-J-COMP-SECUR,
volume = "25",
number = "3",
pages = "231--253",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16866",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:10 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{dosSantos:2017:AFE,
author = "Daniel Ricardo dos Santos and Silvio Ranise and Luca
Compagna and Serena Elisa Ponta",
title = "Automatically finding execution scenarios to deploy
security-sensitive workflows",
journal = j-J-COMP-SECUR,
volume = "25",
number = "3",
pages = "255--282",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16894",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:10 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Choo:2017:DOS,
author = "Euijin Choo and Ting Yu and Min Chi",
title = "Detecting opinion spammer groups and spam targets
through community discovery and sentiment analysis",
journal = j-J-COMP-SECUR,
volume = "25",
number = "3",
pages = "283--318",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16941",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Jun 5 17:50:10 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Murray:2017:SIV,
author = "Toby Murray and Andrei Sabelfeld and Lujo Bauer",
title = "Special issue on verified information flow security",
journal = j-J-COMP-SECUR,
volume = "25",
number = "4--5",
pages = "319--321",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-0559",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:12 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Broberg:2017:PPP,
author = "Niklas Broberg and Bart van Delft and David Sands",
title = "{Paragon} --- Practical programming with information
flow control",
journal = j-J-COMP-SECUR,
volume = "25",
number = "4--5",
pages = "323--365",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-15791",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:12 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Liu:2017:FBO,
author = "Jed Liu and Owen Arden and Michael D. George and
Andrew C. Myers",
title = "{Fabric}: Building open distributed systems securely
by construction",
journal = j-J-COMP-SECUR,
volume = "25",
number = "4--5",
pages = "367--426",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-15805",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:12 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Giffin:2017:HPD,
author = "Daniel Giffin and Amit Levy and Deian Stefan and David
Terei and David Mazi{\`e}res and John Mitchell and
Alejandro Russo",
title = "{Hails}: Protecting data privacy in untrusted web
applications",
journal = j-J-COMP-SECUR,
volume = "25",
number = "4--5",
pages = "427--461",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-15801",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:12 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Rocchetto:2017:IBM,
author = "Marco Rocchetto and Luca Vigan{\`o} and Marco Volpe",
title = "An interpolation-based method for the verification of
security protocols",
journal = j-J-COMP-SECUR,
volume = "25",
number = "6",
pages = "463--510",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16832",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:13 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Crampton:2017:CEI,
author = "Jason Crampton and Naomi Farley and Gregory Gutin and
Mark Jones and Bertram Poettering",
title = "Cryptographic enforcement of information flow policies
without public information via tree partitions",
journal = j-J-COMP-SECUR,
volume = "25",
number = "6",
pages = "511--535",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16863",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:13 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chen:2017:RDI,
author = "Bo Chen and Reza Curtmola",
title = "Remote data integrity checking with server-side
repair",
journal = j-J-COMP-SECUR,
volume = "25",
number = "6",
pages = "537--584",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16868",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:13 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Kanovich:2017:TCC,
author = "Max Kanovich and Tajana Ban Kirigin and Vivek Nigam
and Andre Scedrov and Carolyn Talcott",
title = "Time, computational complexity, and probability in the
analysis of distance-bounding protocols",
journal = j-J-COMP-SECUR,
volume = "25",
number = "6",
pages = "585--630",
month = "????",
year = "2017",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-0560",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:13 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Anonymous:2017:AIV,
author = "Anonymous",
title = "Author Index Volume 25 (2017)",
journal = j-J-COMP-SECUR,
volume = "25",
number = "6",
pages = "631--633",
month = "????",
year = "2017",
CODEN = "JCSIET",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:13 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Moataz:2018:SSE,
author = "Tarik Moataz and Indrajit Ray and Indrakshi Ray and
Abdullatif Shikfa and Fr{\'e}d{\'e}ric Cuppens and Nora
Cuppens",
title = "Substring search over encrypted data",
journal = j-J-COMP-SECUR,
volume = "26",
number = "1",
pages = "1--30",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-14652",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:14 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Preda:2018:CPD,
author = "Mila Dalla Preda and Isabella Mastroeni",
title = "Characterizing a property-driven obfuscation
strategy",
journal = j-J-COMP-SECUR,
volume = "26",
number = "1",
pages = "31--69",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-14672",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:14 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Sprenger:2018:RSP,
author = "Christoph Sprenger and David Basin",
title = "Refining security protocols",
journal = j-J-COMP-SECUR,
volume = "26",
number = "1",
pages = "71--120",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16814",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:14 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Stoller:2018:MHT,
author = "Scott D. Stoller and Thang Bui",
title = "Mining hierarchical temporal roles with multiple
metrics",
journal = j-J-COMP-SECUR,
volume = "26",
number = "1",
pages = "121--142",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-17989",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:14 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{DeCapitanidiVimercati:2018:EAW,
author = "Sabrina {De Capitani di Vimercati} and Sara Foresti
and Stefano Paraboschi and Gerardo Pelosi and
Pierangela Samarati",
title = "Enforcing authorizations while protecting access
confidentiality",
journal = j-J-COMP-SECUR,
volume = "26",
number = "2",
pages = "143--175",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171004",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:15 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Levy:2018:SHB,
author = "Silvie Levy and Ehud Gudes and Nurit Gal-Oz",
title = "Sharing-habits based privacy control in social
networks",
journal = j-J-COMP-SECUR,
volume = "26",
number = "2",
pages = "177--205",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171012",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:15 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Neville:2018:RAF,
author = "Ultan Neville and Simon N. Foley",
title = "Reasoning about firewall policies through refinement
and composition",
journal = j-J-COMP-SECUR,
volume = "26",
number = "2",
pages = "207--254",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-17971",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:15 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Gupta:2018:SCA,
author = "Haritabh Gupta and Shamik Sural and Vijayalakshmi
Atluri and Jaideep Vaidya",
title = "A side-channel attack on smartphones: Deciphering key
taps using built-in microphones",
journal = j-J-COMP-SECUR,
volume = "26",
number = "2",
pages = "255--281",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-17975",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:15 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Diao:2018:AMU,
author = "Wenrui Diao and Rui Liu and Xiangyu Liu and Zhe Zhou
and Zhou Li and Kehuan Zhang",
title = "Accessing mobile user's privacy based on {IME}
personalization: Understanding and practical attacks",
journal = j-J-COMP-SECUR,
volume = "26",
number = "3",
pages = "283--309",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16909",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:16 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Shirvanian:2018:SVI,
author = "Maliheh Shirvanian and Nitesh Saxena and Dibya
Mukhopadhyay",
title = "Short voice imitation man-in-the-middle attacks on
{Crypto Phones}: Defeating humans and machines",
journal = j-J-COMP-SECUR,
volume = "26",
number = "3",
pages = "311--333",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-17970",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:16 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Bischof:2018:LDS,
author = "Simon Bischof and Joachim Breitner and J{\"u}rgen Graf
and Martin Hecker and Martin Mohr and Gregor Snelting",
title = "Low-deterministic security for low-nondeterministic
programs",
journal = j-J-COMP-SECUR,
volume = "26",
number = "3",
pages = "335--366",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-17984",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:16 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Blanchet:2018:ARE,
author = "Bruno Blanchet and Ben Smyth",
title = "Automated reasoning for equivalences in the applied pi
calculus with barriers",
journal = j-J-COMP-SECUR,
volume = "26",
number = "3",
pages = "367--422",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171013",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:16 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ranise:2018:AEA,
author = "Silvio Ranise and Anh Truong and Luca Vigan{\`o}",
title = "Automated and efficient analysis of administrative
temporal {RBAC} policies with role hierarchies",
journal = j-J-COMP-SECUR,
volume = "26",
number = "4",
pages = "423--458",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-15756",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Nguyen:2018:ASP,
author = "Binh Thanh Nguyen and Christoph Sprenger and Cas
Cremers",
title = "Abstractions for security protocol verification",
journal = j-J-COMP-SECUR,
volume = "26",
number = "4",
pages = "459--508",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-15769",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Giustolisi:2018:ICM,
author = "Rosario Giustolisi and Giampaolo Bella and Gabriele
Lenzini",
title = "Invalid certificates in modern browsers: a
socio-technical analysis",
journal = j-J-COMP-SECUR,
volume = "26",
number = "4",
pages = "509--541",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-16891",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Balagani:2018:IAC,
author = "Kiran S. Balagani and Paolo Gasti and Aaron Elliott
and Azriel Richardson and Mike O'Neal",
title = "The impact of application context on privacy and
performance of keystroke authentication systems",
journal = j-J-COMP-SECUR,
volume = "26",
number = "4",
pages = "543--556",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171017",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hallgren:2018:AB,
author = "Per Hallgren and Ravi Kishore and Mart{\'\i}n Ochoa
and Andrei Sabelfeld",
title = "Assuring {BetterTimes}",
journal = j-J-COMP-SECUR,
volume = "26",
number = "4",
pages = "557--587",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171085",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Luckett:2018:ISM,
author = "Patrick Luckett and J. Todd McDonald and William B.
Glisson and Ryan Benton and Joel Dawson and Blair A.
Doyle",
title = "Identifying stealth malware using {CPU} power
consumption and learning algorithms",
journal = j-J-COMP-SECUR,
volume = "26",
number = "5",
pages = "589--613",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171060",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:18 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chakraborty:2018:HAD,
author = "Tanmoy Chakraborty and Sushil Jajodia and Noseong Park
and Andrea Pugliese and Edoardo Serra and V. S.
Subrahmanian",
title = "Hybrid adversarial defense: Merging honeypots and
traditional security methods",
journal = j-J-COMP-SECUR,
volume = "26",
number = "5",
pages = "615--645",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171094",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:18 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Chen:2018:KSQ,
author = "Ling Chen and Ting Yu and Rada Chirkova",
title = "{$k$-Skyband} query answering with differential
privacy",
journal = j-J-COMP-SECUR,
volume = "26",
number = "5",
pages = "647--676",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171101",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:18 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Fuhry:2018:HPS,
author = "Benny Fuhry and Raad Bahmani and Ferdinand Brasser and
Florian Hahn and Florian Kerschbaum and Ahmad-Reza
Sadeghi",
title = "{HardIDX}: Practical and secure index with {SGX} in a
malicious environment",
journal = j-J-COMP-SECUR,
volume = "26",
number = "5",
pages = "677--706",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171103",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:18 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Han:2018:RAM,
author = "Jin Han and Wangyu Zang and Li Liu and Songqing Chen
and Meng Yu",
title = "Risk-aware multi-objective optimized virtual machine
placement in the cloud",
journal = j-J-COMP-SECUR,
volume = "26",
number = "5",
pages = "707--730",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171104",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:18 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Lorenzi:2018:TDR,
author = "David Lorenzi and Emre Uzun and Jaideep Vaidya and
Shamik Sural and Vijayalakshmi Atluri",
title = "Towards designing robust {CAPTCHAs}",
journal = j-J-COMP-SECUR,
volume = "26",
number = "6",
pages = "731--760",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-17947",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:19 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Borbor:2018:SUV,
author = "Daniel Borbor and Lingyu Wang and Sushil Jajodia and
Anoop Singhal",
title = "Surviving unpatchable vulnerabilities through
heterogeneous network hardening options",
journal = j-J-COMP-SECUR,
volume = "26",
number = "6",
pages = "761--789",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171106",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:19 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zhang:2018:PPV,
author = "Jun Zhang and Meiqi He and Gongxian Zeng and Siu-Ming
Yiu",
title = "Privacy-preserving verifiable elastic net among
multiple institutions in the cloud",
journal = j-J-COMP-SECUR,
volume = "26",
number = "6",
pages = "791--815",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171107",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:19 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Barenghi:2018:SPX,
author = "Alessandro Barenghi and Nicholas Mainardi and Gerardo
Pelosi",
title = "Systematic parsing of {X.509}: Eradicating security
issues with a parse tree",
journal = j-J-COMP-SECUR,
volume = "26",
number = "6",
pages = "817--849",
month = "????",
year = "2018",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171110",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:19 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Maffei:2019:GOP,
author = "Matteo Maffei and Giulio Malavolta and Manuel Reinert
and Dominique Schr{\"o}der",
title = "Group {ORAM} for privacy and access control in
outsourced personal records",
journal = j-J-COMP-SECUR,
volume = "27",
number = "1",
pages = "1--47",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171030",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:20 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Salva:2019:CAS,
author = "S{\'e}bastien Salva and Loukmen Regainia",
title = "A catalogue associating security patterns and attack
steps to design secure applications",
journal = j-J-COMP-SECUR,
volume = "27",
number = "1",
pages = "49--74",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171063",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:20 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Demay:2019:PSS,
author = "Gr{\'e}gory Demay and Peter Ga{\v{z}}i and Ueli Maurer
and Bj{\"o}rn Tackmann",
title = "Per-session security: Password-based cryptography
revisited",
journal = j-J-COMP-SECUR,
volume = "27",
number = "1",
pages = "75--111",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-181131",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:20 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Armknecht:2019:PIR,
author = "Frederik Armknecht and Zinaida Benenson and Philipp
Morgner and Christian M{\"u}ller and Christian Riess",
title = "Privacy implications of room climate data",
journal = j-J-COMP-SECUR,
volume = "27",
number = "1",
pages = "113--136",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-181133",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:20 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Blazy:2019:VCT,
author = "Sandrine Blazy and David Pichardie and Alix Trieu",
title = "Verifying constant-time implementations by abstract
interpretation",
journal = j-J-COMP-SECUR,
volume = "27",
number = "1",
pages = "137--163",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-181136",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:20 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Majumdar:2019:LPD,
author = "Suryadipta Majumdar and Azadeh Tabiban and Yosr
Jarraya and Momen Oqaily and Amir Alimohammadifar and
Makan Pourzandi and Lingyu Wang and Mourad Debbabi",
title = "Learning probabilistic dependencies among events for
proactive security auditing in clouds",
journal = j-J-COMP-SECUR,
volume = "27",
number = "2",
pages = "165--202",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-181137",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:21 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Cremers:2019:SAG,
author = "Cas Cremers and Martin Dehnel-Wild and Kevin Milner",
title = "Secure authentication in the grid: a formal analysis
of {DNP3 SAv5}",
journal = j-J-COMP-SECUR,
volume = "27",
number = "2",
pages = "203--232",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-181139",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:21 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Calzavara:2019:SSH,
author = "Stefano Calzavara and Alvise Rabitti and Michele
Bugliesi",
title = "Sub-session hijacking on the web: Root causes and
prevention",
journal = j-J-COMP-SECUR,
volume = "27",
number = "2",
pages = "233--257",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-181149",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:21 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Tian:2019:DSD,
author = "Yangguang Tian and Yingjiu Li and Guomin Yang and
Willy Susilo and Yi Mu and Hui Cui and Yinghui Zhang",
title = "{DABKE}: Secure deniable attribute-based key exchange
framework",
journal = j-J-COMP-SECUR,
volume = "27",
number = "2",
pages = "259--275",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-181201",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:21 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Hirschi:2019:MUV,
author = "Lucca Hirschi and David Baelde and St{\'e}phanie
Delaune",
title = "A method for unbounded verification of privacy-type
properties",
journal = j-J-COMP-SECUR,
volume = "27",
number = "3",
pages = "277--342",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-171070",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:22 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Zavatteri:2019:LMS,
author = "Matteo Zavatteri and Luca Vigan{\`o}",
title = "Last man standing: Static, decremental and dynamic
resiliency via controller synthesis",
journal = j-J-COMP-SECUR,
volume = "27",
number = "3",
pages = "343--373",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-181244",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:22 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Yu:2019:CAF,
author = "Xingjie Yu and Michael Shiwen Thang and Yingjiu Li and
Robert Huijie Deng",
title = "Collusion attacks and fair time-locked deposits for
fast-payment transactions in {Bitcoin}",
journal = j-J-COMP-SECUR,
volume = "27",
number = "3",
pages = "375--403",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-191274",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:22 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Balagani:2019:PPP,
author = "Kiran Balagani and Matteo Cardaioli and Mauro Conti
and Paolo Gasti and Martin Georgiev and Tristan Gurtler
and Daniele Lain and Charissa Miller and Kendall Molas
and Nikita Samarin and Eugen Saraci and Gene Tsudik and
Lynn Wu",
title = "{PILOT}: Password and {PIN} information leakage from
obfuscated typing videos",
journal = j-J-COMP-SECUR,
volume = "27",
number = "4",
pages = "405--425",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-191289",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:23 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Alhebaishi:2019:MIT,
author = "Nawaf Alhebaishi and Lingyu Wang and Sushil Jajodia
and Anoop Singhal",
title = "Mitigating the insider threat of remote administrators
in clouds through maintenance task assignments",
journal = j-J-COMP-SECUR,
volume = "27",
number = "4",
pages = "427--458",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-191306",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:23 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Urban:2019:ALP,
author = "Tobias Urban and Dennis Tatang and Thorsten Holz and
Norbert Pohlmann",
title = "Analyzing leakage of personal information by malware",
journal = j-J-COMP-SECUR,
volume = "27",
number = "4",
pages = "459--481",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-191287",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:23 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Batra:2019:DAP,
author = "Gunjan Batra and Vijayalakshmi Atluri and Jaideep
Vaidya and Shamik Sural",
title = "Deploying {ABAC} policies using {RBAC} systems",
journal = j-J-COMP-SECUR,
volume = "27",
number = "4",
pages = "483--506",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-191315",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:23 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Stergiopoulos:2019:USC,
author = "George Stergiopoulos and Georgia Chronopoulou and
Evangelos Bitsikas and Nikolaos Tsalis and Dimitris
Gritzalis",
title = "Using side channel {TCP} features for real-time
detection of malware connections",
journal = j-J-COMP-SECUR,
volume = "27",
number = "5",
pages = "507--520",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-191286",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Rubio:2019:TAI,
author = "Juan E. Rubio and Rodrigo Roman and Cristina Alcaraz
and Yan Zhang",
title = "Tracking {APTs} in industrial ecosystems: a proof of
concept",
journal = j-J-COMP-SECUR,
volume = "27",
number = "5",
pages = "521--546",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-191293",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}
@Article{Ma:2019:TOP,
author = "Ziqiang Ma and Quanwei Cai and Jingqiang Lin and Bo
Luo and Jiwu Jing",
title = "Towards the optimal performance of integrating {Warm
and Delay} against remote cache timing side channels on
block ciphers",
journal = j-J-COMP-SECUR,
volume = "27",
number = "5",
pages = "547--580",
month = "????",
year = "2019",
CODEN = "JCSIET",
DOI = "https://doi.org/10.3233/JCS-191296",
ISSN = "0926-227X (print), 1875-8924 (electronic)",
ISSN-L = "0926-227X",
bibdate = "Mon Sep 23 05:47:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://content.iospress.com/journals/journal-of-computer-security",
}