Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.04",
%%%     date            = "14 October 2017",
%%%     time            = "08:49:54 MDT",
%%%     filename        = "jcompsecur.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "31603 12452 45273 485320",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "BibTeX; bibliography; Journal of Computer
%%%                        Security",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        Journal of Computer Security (CODEN JCSIET,
%%%                        ISSN 0926-227X (print), 1875-8924
%%%                        (electronic)), published by IOS Press.
%%%                        Publication began with volume 1, number 1, in
%%%                        1992, and there are 4 to 6 issues per annual
%%%                        volume, and issues are often combined.
%%%
%%%                        At version 1.04, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             1992 (  20)    2001 (  13)    2010 (  41)
%%%                             1993 (  14)    2002 (  20)    2011 (  37)
%%%                             1994 (   0)    2003 (  24)    2012 (  24)
%%%                             1995 (  20)    2004 (  30)    2013 (  30)
%%%                             1996 (  20)    2005 (  31)    2014 (  27)
%%%                             1997 (  22)    2006 (  24)    2015 (  28)
%%%                             1998 (  12)    2007 (  24)    2016 (  23)
%%%                             1999 (  13)    2008 (  29)    2017 (  12)
%%%                             2000 (  15)    2009 (  30)
%%%
%%%                             Article:        583
%%%
%%%                             Total entries:  583
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{"\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-J-COMP-SECUR          = "Journal of Computer Security"}

%%% ====================================================================
%%% Bibliography entries, sorted in publication order, with
%%% `bibsort -byvolume':
@Article{Jajodia:1992:EPa,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "1--3",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:05 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Meadows:1992:AFM,
  author =       "Catherine Meadows",
  title =        "Applying Formal Methods to the Analysis of a Key
                 Management Protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "5--35",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:05 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{McLean:1992:PNF,
  author =       "John McLean",
  title =        "Proving Noninterference and Functional Correctness
                 Using Traces",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "37--57",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:05 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sandhu:1992:EPS,
  author =       "Ravi S. Sandhu",
  title =        "Expressive Power of the Schematic Protection Model",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "59--98",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:05 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bieber:1992:LVS,
  author =       "Pierre Bieber and Fr{\'e}d{\'e}ric Cuppens",
  title =        "A Logical View of Secure Dependencies",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "99--129",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:05 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1992:CPE,
  author =       "Anonymous",
  title =        "Call for Papers: {European Symposium on Research in
                 Computer Security}",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "131--131",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:05 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sandhu:1992:GEP,
  author =       "Ravi Sandhu",
  title =        "{Guest Editor}'s Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "131--132",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:09 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gupta:1992:TTP,
  author =       "Sarbari Gupta and Virgil D. Gligor",
  title =        "Towards a Theory of Penetration-Resistant Systems and
                 Its Applications",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "133--158",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:09 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Foley:1992:ASN,
  author =       "Simon N. Foley",
  title =        "Aggregation and Separation as Noninterference
                 Properties",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "159--188",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:09 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Motro:1992:UMS,
  author =       "Amihai Motro",
  title =        "A Unified Model for Security and Integrity in
                 Relational Databases",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "189--213",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:09 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1992:EPb,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "215--215",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lunt:1992:GEP,
  author =       "Teresa F. Lunt and John McLean",
  title =        "{Guest Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "217--218",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wray:1992:ACT,
  author =       "John C. Wray",
  title =        "An Analysis of Covert Timing Channels",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "219--232",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hu:1992:RTC,
  author =       "Wei-Ming Hu",
  title =        "Reducing Timing Channels with Fuzzy Time",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "233--254",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gray:1992:TMF,
  author =       "James W. {Gray III}",
  title =        "Toward a Mathematical Foundation for Information Flow
                 Security",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "255--294",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Tardo:1992:SGA,
  author =       "Joseph J. Tardo and Kannan Alagappan",
  title =        "{SPX}: Global Authentication Using Public Key
                 Certificates",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "295--316",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Syverson:1992:KBS,
  author =       "Paul F. Syverson",
  title =        "Knowledge, Belief, and Semantics in the Analysis of
                 Cryptographic Protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "317--334",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-407",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ammann:1992:ESP,
  author =       "Paul E. Ammann and Ravi S. Sandhu",
  title =        "The Extended Schematic Protection Model",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "335--383",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-408",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jacob:1992:BTA,
  author =       "Jeremy Jacob",
  title =        "Basic Theorems about Security",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "385--411",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-409",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1992:AI,
  author =       "Anonymous",
  title =        "Author Index",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "413--413",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-410",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1993:EPa,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "85--85",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{McLean:1993:GEP,
  author =       "John McLean and Richard Kemmerer",
  title =        "{Guest Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "87--88",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:1993:RAM,
  author =       "Jonathan K. Millen",
  title =        "A Resource Allocation Model for Denial of Service
                 Protection",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "89--106",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Woo:1993:ADS,
  author =       "Thomas Y. C. Woo and Simon S. Lam",
  title =        "Authorization in Distributed Systems: A New Approach",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "107--136",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gligor:1993:IRA,
  author =       "Virgil D. Gligor and Shyh-Wei Luan and Joseph N.
                 Pato",
  title =        "On Inter-Realm Authentication in Large Distributed
                 Systems",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "137--157",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Epstein:1993:HAW,
  author =       "Jeremy Epstein and John McHugh and Hilarie Orman and
                 Rita Pascale and Ann Marmor-Squires and Bonnie Danner
                 and Charles R. Martin and Martha Branstad and Glenn
                 Benson and Doug Rothnie",
  title =        "A High Assurance Window System Prototype",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "159--190",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yahalom:1993:OAT,
  author =       "Raphael Yahalom",
  title =        "Optimality of Asynchronous Two-Party Secure
                 Data-Exchange Protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "191--209",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-307",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Littlewood:1993:TOM,
  author =       "Bev Littlewood and Sarah Brocklehurst and Norman
                 Fenton and Peter Mellor and Stella Page and David
                 Wright and John Dobson and John McDermid and Dieter
                 Gollmann",
  title =        "Towards Operational Measures of Computer Security",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "211--229",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-308",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Thomas:1993:KAM,
  author =       "Roshan K. Thomas and Ravi S. Sandhu",
  title =        "A Kernelized Architecture for Multilevel Secure
                 Object-Oriented Databases Supporting Write-Up",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "231--275",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-309",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:1993:EPb,
  author =       "Jonathan Millen",
  title =        "{Editor}'s Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "4",
  pages =        "277--277",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-2401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Horton:1993:CVP,
  author =       "J. D. Horton and R. H. Cooper and W. F. Hyslop and B.
                 G. Nickerson and O. K. Ward and Robert Harland and
                 Elton Ashby and W. M. Stewart",
  title =        "The Cascade Vulnerability Problem",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "4",
  pages =        "279--290",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-2402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Trostle:1993:MFT,
  author =       "Jonathan T. Trostle",
  title =        "Modelling a Fuzzy Time System",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "4",
  pages =        "291--309",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-2403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:1993:ASC,
  author =       "Vijayalakshmi Atluri and Sushil Jajodia and Elisa
                 Bertino",
  title =        "Achieving Stricter Correctness Requirements in
                 Multilevel Secure Database Management Systems",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "4",
  pages =        "311--351",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-2404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1993:AI,
  author =       "Anonymous",
  title =        "Author Index",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "4",
  pages =        "353--354",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-2405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1995:EPa,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "1--1",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gong:1995:GEP,
  author =       "Li Gong",
  title =        "{Guest Editor}'s Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "3--3",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Focardi:1995:CSP,
  author =       "Riccardo Focardi and Roberto Gorrieri",
  title =        "A Classification of Security Properties for Process
                 Algebras",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "5--33",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:1995:UFC,
  author =       "Jonathan K. Millen",
  title =        "Unwinding Forward Correctability",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "35--54",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bevier:1995:SBA,
  author =       "William R. Bevier and William D. Young",
  title =        "A State-based Approach to Noninterference",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "55--70",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Simmons:1995:RTI,
  author =       "G. J. Simmons and Catherine Meadows",
  title =        "The Role of Trust in Information Integrity Protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "71--84",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:1995:EPb,
  author =       "Jonathan K. Millen",
  title =        "{Editor}'s Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "2--3",
  pages =        "85--85",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-32-301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ammann:1995:CCS,
  author =       "Paul Ammann and Frank Jaeckle and Sushil Jajodia",
  title =        "Concurrency Control in a Secure Multilevel Database
                 via a Two-Snapshot Algorithm",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "2--3",
  pages =        "87--113",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-32-302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kang:1995:TMM,
  author =       "I. E. Kang and T. F. Keefe",
  title =        "Transaction Management for Multilevel Secure
                 Replicated Databases",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "2--3",
  pages =        "115--145",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-32-303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hinke:1995:FAD,
  author =       "Thomas H. Hinke and Harry S. Delugach and Asha
                 Chandrasekhar",
  title =        "A Fast Algorithm for Detecting Second Paths in
                 Database Inference Analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "2--3",
  pages =        "147--168",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-32-304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:1995:EAM,
  author =       "Elisa Bertino and Fabio Origgi and Pierangela
                 Samarati",
  title =        "An Extended Authorization Model for Object Databases",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "2--3",
  pages =        "169--206",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-32-305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Notargiacomo:1995:MMI,
  author =       "LouAnna Notargiacomo and Barbara T. Blaustein and
                 Catherine D. McCollum",
  title =        "Merging Models: Integrity, Dynamic Separation of Duty
                 and Trusted Data Management",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "2--3",
  pages =        "207--230",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-32-306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1995:EPc,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "231--231",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Foley:1995:SSC,
  author =       "Simon N. Foley and Jeremy L. Jacob",
  title =        "Specifying Security for Computer Supported
                 Collaborative Working",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "233--253",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chen:1995:DTA,
  author =       "Liqun Chen and Dieter Gollmann and Christopher J.
                 Mitchell",
  title =        "Distributing Trust Amongst Multiple Authentication
                 Servers",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "255--267",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zakinthinos:1995:CNI,
  author =       "A. Zakinthinos and E. S. Lee",
  title =        "The Composability of Non-Interference",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "269--281",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bishop:1995:TIT,
  author =       "Matt Bishop",
  title =        "Theft of Information in the Take-{Grant} Protection
                 Model",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "283--308",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blundo:1995:MKD,
  author =       "C. Blundo and Luiz A. Frota Mattos and D. R. Stinson",
  title =        "Multiple Key Distribution Maintaining User Anonymity
                 via Broadcast Channels",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "309--322",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1995:CP,
  author =       "Anonymous",
  title =        "Call for Papers",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "323--324",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3407",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1995:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 3",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "325--326",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3408",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:1996:GEP,
  author =       "Elisa Bertino and G{\'e}rard Eizenberg and Roger M.
                 Needham",
  title =        "Guest-editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "1--2",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{dAusbourg:1996:CCD,
  author =       "Bruno d'Ausbourg and Christel Calas",
  title =        "Controlling causal dependencies over a secure
                 network",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "3--25",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Roscoe:1996:NIT,
  author =       "A. W. Roscoe and J. C. P. Woodcock and L. Wulf",
  title =        "Non-interference through determinism",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "27--53",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Maurer:1996:CSB,
  author =       "Ueli M. Maurer and Pierre E. Schmid",
  title =        "A calculus for security boots trapping in distributed
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "55--80",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jiwa:1996:BAD,
  author =       "Azad Jiwa and Thomas Hardjono and Jennifer Seberry",
  title =        "Beacons for authentication in distributed systems",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "81--96",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hauser:1996:RSP,
  author =       "Ralf Hauser and Philippe Janson and Gene Tsudik and
                 Els {Van Herreweghen} and Refik Molva",
  title =        "Robust and secure password and key change method",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "97--111",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1996:IA,
  author =       "Anonymous",
  title =        "Information for authors",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "113--119",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4107",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1996:EPa,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "121--121",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shieh:1996:DIL,
  author =       "Shiuh-Pyng Shieh and Virgil D. Gligor",
  title =        "Detecting illicit leakage of information in operating
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "123--148",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/061242.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
  keywords =     "information hiding; steganography",
}

@Article{Ammann:1996:EPM,
  author =       "Paul Ammann and Ravi S. Sandhu and Richard Lipton",
  title =        "The expressive power of multi-parent creation in
                 monotonic access control models",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "149--165",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Volpano:1996:STS,
  author =       "Dennis Volpano and Cynthia Irvine and Geoffrey Smith",
  title =        "A sound type system for secure flow analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "167--187",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{McDermott:1996:APC,
  author =       "John McDermott and Ravi Mukkamala",
  title =        "Analytic performance comparison of transaction
                 processing algorithms for the {SINTRA}
                 replicated-architecture database system",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "189--228",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:1996:EPB,
  author =       "Jonathan Millen",
  title =        "{Editor}'s preface to the {Bell--LaPadula} model",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "229--231",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{LaPadula:1996:F,
  author =       "Leonard J. LaPadula",
  title =        "Foreword",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "233--238",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-307",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{LaPadula:1996:MTR,
  author =       "Leonard J. LaPadula and D. Elliott Bell",
  title =        "{MITRE} Technical Report 2547, Volume {II}",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "239--263",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-308",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1996:EPb,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "265--265",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:45 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Reiter:1996:KMS,
  author =       "Michael K. Reiter and Matthew K. Franklin and John B.
                 Lacy and Rebecca N. Wright",
  title =        "The {$ \Omega $} key management service",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "267--287",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:45 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chuang:1996:SAN,
  author =       "Shaw-Cheng Chuang",
  title =        "Securing {ATM} networks",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "289--329",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:45 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bishop:1996:CIF,
  author =       "Matt Bishop",
  title =        "Conspiracy and information flow in the {Take-Grant
                 Protection Model}",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "331--359",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:45 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1996:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 4 (1996)",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "361--362",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:45 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:1997:GEP,
  author =       "Elisa Bertino and Emilio Montolivo and Helmut Kurth",
  title =        "Guest editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "1--2",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bonatti:1997:MHS,
  author =       "P. A. Bonatti and M. L. Sapino and V. S.
                 Subrahmanian",
  title =        "Merging heterogeneous security orderings",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "3--29",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lotz:1997:TSM,
  author =       "Volkmar Lotz",
  title =        "Threat scenarios as a means to formally develop secure
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "31--67",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Camenisch:1997:DPS,
  author =       "Jan Camenisch and Ueli Maurer and Markus Stadler",
  title =        "Digital payment systems with passive
                 anonymity-revoking trustees",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "69--89",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Asokan:1997:SSS,
  author =       "N. Asokan and G. Tsudik and M. Waidner",
  title =        "Server-supported signatures",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "91--108",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1997:EP,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "109--109",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:53 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Merritt:1997:GEP,
  author =       "Michael Merritt",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "111--112",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:53 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Malkhi:1997:HTS,
  author =       "Dahlia Malkhi and Michael Reiter",
  title =        "A high-throughput secure reliable multicast protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "113--127",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:53 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sinclair:1997:ASS,
  author =       "Jane Sinclair",
  title =        "Action systems for security specification",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "129--154",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:53 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:1997:ASE,
  author =       "Sabrina {De Capitani di Vimercati} and Pierangela
                 Samarati",
  title =        "Authorization specification and enforcement in
                 federated database systems",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "155--188",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5205",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:53 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:1997:SIS,
  author =       "Elisa Bertino and Pierangela Samarati and Gian Paolo
                 Rossi",
  title =        "Special issue on Security in the {World Wide Web
                 (WWW)}",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "189--190",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bergadano:1997:SAP,
  author =       "F. Bergadano and B. Crispo and M. Lomas",
  title =        "Strong authentication and privacy with standard
                 browsers",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "191--212",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Quisquater:1997:ASS,
  author =       "Jean-Jacques Quisquater and Marc Joye",
  title =        "Authentication of sequences with the {SL$_2$} hash
                 function: application to video sequences",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "213--223",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bryce:1997:CEI,
  author =       "Ciar{\'a}n Bryce and Winfried K{\"u}hnhauser and
                 R{\'e}my Amouroux and Mauricio L{\'o}pez and Harry
                 Rudnik",
  title =        "{CWASAR}: a {European} infrastructure for secure
                 electronic commerce",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "225--235",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Syverson:1997:PWB,
  author =       "Paul F. Syverson and Michael G. Reed and David M.
                 Goldschlag",
  title =        "Private {Web} browsing",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "237--248",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Roscheisen:1997:NCD,
  author =       "Martin R{\"o}scheisen and Terry Winograd",
  title =        "A network-centric design for relationship-based
                 security and access control",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "249--254",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Winslett:1997:UDC,
  author =       "M. Winslett and N. Ching and V. Jones and I.
                 Slepchin",
  title =        "Using digital credentials on the {World Wide Web}",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "255--267",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5307",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Samarati:1997:GEP,
  author =       "Pierangela Samarati and Ravi Sandhu",
  title =        "Guest editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "269--270",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:01 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Castano:1997:ADG,
  author =       "S. Castano and S. {De Capitani di Vimercati} and M. G.
                 Fugini",
  title =        "Automated derivation of global authorizations for
                 database federations",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "271--301",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:01 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:1997:EMD,
  author =       "Vijayalakshmi Atluri and Wei-Kuang Huang",
  title =        "Enforcing mandatory and discretionary security in
                 workflow management systems",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "303--339",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:01 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Demurjian:1997:TDP,
  author =       "S. A. {Demurjian Sr.} and T. C. Ting",
  title =        "Towards a definitive paradigm for security in
                 object-oriented systems and applications",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "341--382",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:01 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1997:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 5 (1997)",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "383--384",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:01 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Foley:1998:GEP,
  author =       "Simon N. Foley",
  title =        "Guest editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "1--2",
  pages =        "1--1",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-61-201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:05 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Abadi:1998:SLL,
  author =       "Mart{\'\i}n Abadi",
  title =        "On {SDSI}'s linked local name spaces",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "1--2",
  pages =        "3--21",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-61-202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:05 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gray:1998:PSC,
  author =       "James W. {Gray III} and Kin Fai {Epsilon Ip} and
                 King-Shan Lui",
  title =        "Provable security for cryptographic protocols ---
                 exact analysis and engineering applications",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "1--2",
  pages =        "23--52",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-61-203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:05 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lowe:1998:CCA,
  author =       "Gavin Lowe",
  title =        "{Casper}: A compiler for the analysis of security
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "1--2",
  pages =        "53--84",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-61-204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:05 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Paulson:1998:IAV,
  author =       "Lawrence C. Paulson",
  title =        "The inductive approach to verifying cryptographic
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "1--2",
  pages =        "85--128",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-61-205",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:05 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Matsumoto:1998:HCC,
  author =       "Tsutomu Matsumoto",
  title =        "Human--computer cryptography: An attempt",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "129--149",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-980076",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:08 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hofmeyr:1998:IDU,
  author =       "Steven A. Hofmeyr and Stephanie Forrest and Anil
                 Somayaji",
  title =        "Intrusion detection using sequences of system calls",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "151--180",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-980109",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:08 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ray:1998:SBT,
  author =       "Indrakshi Ray and Paul Ammann and Sushil Jajodia",
  title =        "A semantic-based transaction processing model for
                 multilevel transactions",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "181--217",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-980108",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:08 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Knudsen:1998:SMD,
  author =       "Lars R. Knudsen and Keith M. Martin",
  title =        "In search of multiple domain key recovery",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "219--235",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-6401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Franklin:1998:AML,
  author =       "Matthew K. Franklin and Dahlia Malkhi",
  title =        "Auditable metering with lightweight security",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "237--255",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-6402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Casati:1998:EWA,
  author =       "Fabio Casati and Silvana Castano and Maria Grazia
                 Fugini",
  title =        "Enforcing workflow authorization constraints using
                 triggers",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "257--285",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-6403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1998:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 6 (1998)",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "287--287",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-6404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:1999:SSI,
  author =       "Jonathan Millen",
  title =        "Special section on Intrusion Detection",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "1--1",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Daniels:1999:IHA,
  author =       "Thomas E. Daniels and Eugene H. Spafford",
  title =        "Identification of host audit data to detect attacks on
                 low-level {IP} vulnerabilities",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "3--35",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Vigna:1999:NNB,
  author =       "Giovanni Vigna and Richard A. Kemmerer",
  title =        "{NetSTAT}: A network-based intrusion detection
                 system",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "37--71",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blundo:1999:NRD,
  author =       "Carlo Blundo and Barbara Masucci",
  title =        "A note on the randomness in dynamic threshold
                 schemes",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "73--85",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Foley:1999:GEP,
  author =       "Simon N. Foley",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "2--3",
  pages =        "87--87",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-72-301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:19 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lowe:1999:TCR,
  author =       "Gavin Lowe",
  title =        "Towards a completeness result for model checking of
                 security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "2--3",
  pages =        "89--146",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-72-302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:19 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Roscoe:1999:PSP,
  author =       "A. W. Roscoe and P. J. Broadfoot",
  title =        "Proving security protocols with model checkers by data
                 independence techniques",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "2--3",
  pages =        "147--190",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-72-303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:19 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Fabrega:1999:SSP,
  author =       "F. Javier Thayer F{\'a}brega and Jonathan C. Herzog
                 and Joshua D. Guttman",
  title =        "Strand spaces: proving security protocols correct",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "2--3",
  pages =        "191--230",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-72-304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:19 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Volpano:1999:PNC,
  author =       "Dennis Volpano and Geoffrey Smith",
  title =        "Probabilistic noninterference in a concurrent
                 language",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "2--3",
  pages =        "231--253",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-72-305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:19 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lin:1999:GEP,
  author =       "T. Y. Lin",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "255--255",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:1999:SOD,
  author =       "Elisa Bertino and Elena Ferrari",
  title =        "Secure object deletion and garbage collection in
                 multilevel object bases",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "257--285",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gudes:1999:MSI,
  author =       "Ehud Gudes and Martin S. Olivier and Reind P. van de
                 Riet",
  title =        "Modelling, specifying and implementing workflow
                 security in {Cyberspace}",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "287--315",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sandhu:1999:RBA,
  author =       "Ravi Sandhu and Venkata Bhamidipati",
  title =        "Role-based administration of user-role assignment: The
                 {URA97} model and its {Oracle} implementation",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "317--342",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lin:2000:GEP,
  author =       "T. Y. Lin",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "1--1",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:27 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:2000:SBE,
  author =       "Vijayalakshmi Atluri and Wei-Kuang Huang and Elisa
                 Bertino",
  title =        "A semantic-based execution model for multilevel secure
                 workflows",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "3--41",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:27 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hale:2000:TBA,
  author =       "John Hale and Jody Threet and Sujeet Shenoi",
  title =        "A ticket-based access control architecture for object
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "43--65",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:27 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Spalka:2000:SNS,
  author =       "Adrian Spalka and Armin B. Cremers",
  title =        "Structured name-spaces in secure databases",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "67--86",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:27 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Deswarte:2000:GEP,
  author =       "Yves Deswarte and Catherine Meadows",
  title =        "Guest editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "87--87",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Karjoth:2000:ACS,
  author =       "G{\"u}nter Karjoth",
  title =        "Authorization in {CORBA} Security",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "89--108",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:2000:LBA,
  author =       "Elisa Bertino and Francesco Buccafurri and Elena
                 Ferrari and Pasquale Rullo",
  title =        "A logic-based approach for enforcing access control",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "109--139",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kelsey:2000:SCC,
  author =       "John Kelsey and Bruce Schneier and David Wagner and
                 Chris Hall",
  title =        "Side channel cryptanalysis of product ciphers",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "141--158",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wespi:2000:FVV,
  author =       "Andreas Wespi and Herv{\'e} Debar and Marc Dacier and
                 Mehdi Nassehi",
  title =        "Fixed- vs. variable-length patterns for detecting
                 suspicious process behavior",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "159--181",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Horn:2000:APF,
  author =       "G{\"u}nther Horn and Bart Preneel",
  title =        "Authentication and payment in future mobile systems",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "183--207",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:2000:PNB,
  author =       "Vijayalakshmi Atluri and Wei-Kuang Huang",
  title =        "A {Petri} net based safety analysis of workflow
                 authorization models",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "209--240",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-307",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:2000:GEP,
  author =       "Vijay Atluri and John Hale",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "241--242",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Liu:2000:ICI,
  author =       "Peng Liu and Sushil Jajodia and Catherine D.
                 McCollum",
  title =        "Intrusion confinement by isolation in information
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "243--279",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Clifton:2000:USS,
  author =       "Chris Clifton",
  title =        "Using sample size to limit exposure to data mining",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "281--307",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:2000:TAB,
  author =       "Elisa Bertino and Piero Andrea Bonatti and Elena
                 Ferrari and Maria Luisa Sapino",
  title =        "Temporal authorization bases: From specification to
                 integration",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "309--353",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Syverson:2001:GEP,
  author =       "Paul F. Syverson",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "1--2",
  pages =        "1--2",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-91-201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hui:2001:FPS,
  author =       "Mei Lin Hui and Gavin Lowe",
  title =        "Fault-preserving simplifying transformations for
                 security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "1--2",
  pages =        "3--46",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-91-202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Song:2001:ANA,
  author =       "Dawn Xiaodong Song and Sergey Berezin and Adrian
                 Perrig",
  title =        "{Athena}: a novel approach to efficient automatic
                 security protocol analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "1--2",
  pages =        "47--74",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-91-203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ryan:2001:PAN,
  author =       "P. Y. A. Ryan and S. A. Schneider",
  title =        "Process algebra and non-interference",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "1--2",
  pages =        "75--103",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-91-204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Halpern:2001:LSL,
  author =       "Joseph Y. Halpern and Ron van der Meyden",
  title =        "A logic for {SDSI}'s linked local name spaces",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "1--2",
  pages =        "105--142",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-91-205",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Meadows:2001:CBF,
  author =       "Catherine Meadows",
  title =        "A cost-based framework for analysis of denial of
                 service in networks",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "1--2",
  pages =        "143--164",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-91-206",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:2001:MST,
  author =       "Sushil Jajodia and Vijayalakshmi Atluri and Thomas F.
                 Keefe and Catherine D. McCollum and Ravi Mukkamala",
  title =        "Multilevel secure transaction processing",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "165--195",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:43 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Paulson:2001:RBS,
  author =       "Lawrence C. Paulson",
  title =        "Relations between secrets: two formal analyses of the
                 {Yahalom} protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "197--216",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:43 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Besson:2001:MCS,
  author =       "Fr{\'e}d{\'e}ric Besson and Thomas Jensen and Daniel
                 {Le M{\'e}tayer} and Tommy Thorn",
  title =        "Model checking security properties of control flow
                 graphs",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "217--250",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:43 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:2001:GIP,
  author =       "Sabrina {De Capitani di Vimercati} and Patrick Lincoln
                 and Livio Ricciulli and Pierangela Samarati",
  title =        "Global infrastructure protection system",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "251--283",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:46 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Clarke:2001:CCD,
  author =       "Dwaine Clarke and Jean-Emile Elien and Carl Ellison
                 and Matt Fredette and Alexander Morcos and Ronald L.
                 Rivest",
  title =        "Certificate chain discovery in {SPKI\slash SDSI}",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "285--322",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:46 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wright:2001:DGM,
  author =       "Rebecca N. Wright and Patrick D. Lincoln and Jonathan
                 K. Millen",
  title =        "Depender graphs: A method of fault-tolerant
                 certificate distribution",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "323--338",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:46 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2001:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 9 (2001)",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "339--340",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:46 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Frincke:2002:GEP,
  author =       "Deborah Frincke",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "1--3",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lee:2002:TCS,
  author =       "Wenke Lee and Wei Fan and Matthew Miller and Salvatore
                 J. Stolfo and Erez Zadok",
  title =        "Toward cost-sensitive modeling for intrusion detection
                 and response",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "5--22",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kerschbaum:2002:UIS,
  author =       "Florian Kerschbaum and Eugene H. Spafford and Diego
                 Zamboni",
  title =        "Using internal sensors and embedded detectors for
                 intrusion detection",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "23--70",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Eckmann:2002:SAL,
  author =       "Steven T. Eckmann and Giovanni Vigna and Richard A.
                 Kemmerer",
  title =        "{STATL}: An attack language for state-based intrusion
                 detection",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "71--103",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Staniford:2002:PAD,
  author =       "Stuart Staniford and James A. Hoagland and Joseph M.
                 McAlerney",
  title =        "Practical automated detection of stealthy portscans",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "105--136",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-205",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2002:EPA,
  author =       "Yingjiu Li and Ningning Wu and X. Sean Wang and Sushil
                 Jajodia",
  title =        "Enhancing profiles for anomaly detection using time
                 granularities",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "137--157",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-206",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Spinellis:2002:PID,
  author =       "Diomidis Spinellis and Dimitris Gritzalis",
  title =        "Panoptis: Intrusion detection using a domain-specific
                 language",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "159--176",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-207",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yasinsac:2002:ESP,
  author =       "Alec Yasinsac",
  title =        "An environment for security protocol intrusion
                 detection",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "177--188",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-208",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ramakrishnan:2002:MBA,
  author =       "C. R. Ramakrishnan and R. Sekar",
  title =        "Model-based analysis of configuration
                 vulnerabilities",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "189--209",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-209",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:2002:GEP,
  author =       "Sushil Jajodia and Dimitris Gritzalis",
  title =        "Guest editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "211--211",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Levine:2002:HMB,
  author =       "Brian Neil Levine and Clay Shields",
  title =        "Hordes: a multicast based protocol for anonymity",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "213--240",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bonatti:2002:UFR,
  author =       "Piero A. Bonatti and Pierangela Samarati",
  title =        "A uniform framework for regulating service access and
                 information release on the {Web}",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "241--271",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Buldas:2002:ECA,
  author =       "Ahto Buldas and Peeter Laud and Helger Lipmaa",
  title =        "Eliminating counterevidence with applications to
                 accountable certificate management",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "273--296",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wright:2002:DGM,
  author =       "Rebecca N. Wright and Patrick D. Lincoln and Jonathan
                 K. Millen",
  title =        "Depender graphs: A method of fault-tolerant
                 certificate distribution",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "297--297",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cuppens:2002:GEP,
  author =       "Fr{\'e}d{\'e}ric Cuppens",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "299--300",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:58 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Brose:2002:MAC,
  author =       "Gerald Brose",
  title =        "Manageable access control for {CORBA}",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "301--337",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:58 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Schellhorn:2002:VFS,
  author =       "Gerhard Schellhorn and Wolfgang Reif and Axel Schairer
                 and Paul Karger and Vernon Austel and David Toll",
  title =        "Verified formal security models for multiapplicative
                 smart cards",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "339--367",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:58 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bieber:2002:CSI,
  author =       "P. Bieber and J. Cazin and P. Girard and J.-L. Lanet
                 and V. Wiels and G. Zanon",
  title =        "Checking secure interactions of smart card applets:
                 extended version",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "369--398",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:58 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Welch:2002:URM,
  author =       "Ian Welch and Robert J. Stroud",
  title =        "Using reflection as a mechanism for enforcing security
                 policies on compiled code",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "399--432",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:58 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2002:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 10 (2002)",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "433--434",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:58 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Iheagwara:2003:CEE,
  author =       "Charles Iheagwara and Andrew Blyth and Mukesh
                 Singhal",
  title =        "A comparative experimental evaluation study of
                 intrusion detection system performance in a gigabit
                 environment",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "1--33",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:02 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2003:DCC,
  author =       "Ninghui Li and William H. Winsborough and John C.
                 Mitchell",
  title =        "Distributed credential chain discovery in trust
                 management",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "35--86",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:02 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bella:2003:IVS,
  author =       "Giampaolo Bella",
  title =        "Inductive verification of smart card protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "87--132",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:02 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Syverson:2003:GEP,
  author =       "Paul F. Syverson",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "133--133",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:06 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sewell:2003:SCU,
  author =       "Peter Sewell and Jan Vitek",
  title =        "Secure composition of untrusted code: box $ \pi $,
                 wrappers, and causality types",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "135--187",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:06 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cohen:2003:FOV,
  author =       "Ernie Cohen",
  title =        "First-order verification of cryptographic protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "189--216",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:06 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Heather:2003:HPT,
  author =       "James Heather and Gavin Lowe and Steve Schneider",
  title =        "How to prevent type flaw attacks on security
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "217--244",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:06 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kakkar:2003:RAS,
  author =       "Pankaj Kakkar and Carl A. Gunter and Mart{\'\i}n
                 Abadi",
  title =        "Reasoning about secrecy for active networks",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "245--287",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11205",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:06 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Thuraisingham:2003:GEP,
  author =       "Bhavani Thuraisingham and Reind van de Riet",
  title =        "Guest editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "289--289",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Devanbu:2003:ADP,
  author =       "Premkumar Devanbu and Michael Gertz and Charles Martel
                 and Stuart G. Stubblebine",
  title =        "Authentic data publication over the {Internet}",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "291--314",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Barbara:2003:CBC,
  author =       "Daniel Barbar{\'a} and Rajni Goel and Sushil Jajodia",
  title =        "A checksum-based corruption detection technique",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "315--329",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hale:2003:PAC,
  author =       "John Hale and Mauricio Papa and Sujeet Shenoi",
  title =        "Programmable access control",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "331--351",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Teepe:2003:WAS,
  author =       "Wouter Teepe and Reind van de Riet and Martin
                 Olivier",
  title =        "{WorkFlow} analyzed for security and privacy in using
                 databases",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "353--363",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Altenschmidt:2003:SMR,
  author =       "C. Altenschmidt and J. Biskup and U. Flegel and Y.
                 Karabulut",
  title =        "Secure mediation: requirements, design, and
                 architecture",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "365--398",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kremer:2003:GBV,
  author =       "Steve Kremer and Jean-Fran{\c{c}}ois Raskin",
  title =        "A game-based verification of non-repudiation and fair
                 exchange protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "399--429",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11307",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Campbell:2003:ECP,
  author =       "Katherine Campbell and Lawrence A. Gordon and Martin
                 P. Loeb and Lei Zhou",
  title =        "The economic cost of publicly announced information
                 security breaches: empirical evidence from the stock
                 market",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "431--448",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11308",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Schneider:2003:GEP,
  author =       "Steve Schneider",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "449--450",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gordon:2003:ATS,
  author =       "Andrew D. Gordon and Alan Jeffrey",
  title =        "Authenticity by typing for security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "451--519",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sumii:2003:LRE,
  author =       "Eijiro Sumii and Benjamin C. Pierce",
  title =        "Logical relations for encryption",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "521--554",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pereira:2003:SAU,
  author =       "Olivier Pereira and Jean-Jacques Quisquater",
  title =        "Some attacks upon authenticated group key agreement
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "555--580",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Halpern:2003:LRS,
  author =       "Joseph Y. Halpern and Ron van der Meyden",
  title =        "A logical reconstruction of {SPKI}",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "581--613",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mantel:2003:UAS,
  author =       "Heiko Mantel and Andrei Sabelfeld",
  title =        "A unifying approach to the security of distributed and
                 multi-threaded programs",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "615--676",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 http://www.math.utah.edu/pub/tex/bib/multithreading.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Durgin:2003:CLP,
  author =       "Nancy Durgin and John Mitchell and Dusko Pavlovic",
  title =        "A compositional logic for proving security properties
                 of protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "677--721",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11407",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2003:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 11 (2003)",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "723--725",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11408",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2004:GEP,
  author =       "Joshua Guttman",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "1--1",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hughes:2004:IHA,
  author =       "Dominic Hughes and Vitaly Shmatikov",
  title =        "Information hiding, anonymity and privacy: a modular
                 approach",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "3--36",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DiPierro:2004:ANI,
  author =       "Alessandra {Di Pierro} and Chris Hankin and Herbert
                 Wiklicky",
  title =        "Approximate non-interference",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "37--81",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lowe:2004:APS,
  author =       "Gavin Lowe",
  title =        "Analysing protocols subject to guessing attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "83--97",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Micciancio:2004:CTA,
  author =       "Daniele Micciancio and Bogdan Warinschi",
  title =        "Completeness theorems for the {Abadi--Rogaway}
                 language of encrypted expressions",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "99--129",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 http://www.math.utah.edu/pub/tex/bib/sgml2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chander:2004:RTM,
  author =       "Ajay Chander and Drew Dean and John C. Mitchell",
  title =        "Reconstructing trust management",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "131--164",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ourston:2004:CIA,
  author =       "Dirk Ourston and Sara Matzner and William Stump and
                 Bryan Hopkins",
  title =        "Coordinated {Internet} attacks: responding to attack
                 complexity",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "165--190",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Aldini:2004:PAA,
  author =       "Alessandro Aldini and Mario Bravetti and Roberto
                 Gorrieri",
  title =        "A process-algebraic approach for the analysis of
                 probabilistic noninterference",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "191--245",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Durgin:2004:MRC,
  author =       "Nancy Durgin and Patrick Lincoln and John Mitchell and
                 Andre Scedrov",
  title =        "Multiset rewriting and the complexity of bounded
                 security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "247--311",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Schneider:2004:GEP,
  author =       "Steve Schneider",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "313--315",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jha:2004:MCS,
  author =       "S. Jha and T. Reps",
  title =        "Model checking {SPKI\slash SDSI}",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "317--353",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shmatikov:2004:PAA,
  author =       "Vitaly Shmatikov",
  title =        "Probabilistic analysis of an anonymity system",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "355--377",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Broadfoot:2004:EAW,
  author =       "P. J. Broadfoot and A. W. Roscoe",
  title =        "Embedding agents within the intruder to detect
                 parallel attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "379--408",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2004:ATD,
  author =       "Joshua D. Guttman",
  title =        "Authentication tests and disjoint encryption: A design
                 method for security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "409--433",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gordon:2004:TEA,
  author =       "Andrew D. Gordon and Alan Jeffrey",
  title =        "Types and effects for asymmetric cryptographic
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "435--483",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Duggan:2004:TBC,
  author =       "Dominic Duggan",
  title =        "Type-based cryptographic operations",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "485--550",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-407",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Buttyan:2004:FMR,
  author =       "Levente Butty{\'a}n and Jean-Pierre Hubaux and Srdjan
                 {\v{C}}apkun",
  title =        "A formal model of rational exchange and its
                 application to the analysis of {Syverson}'s protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "551--587",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-408",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Backes:2004:PL,
  author =       "Michael Backes and Birgit Pfitzmann and Michael
                 Waidner and Michael Steiner",
  title =        "Polynomial liveness",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "589--617",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-409",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lowe:2004:DIF,
  author =       "Gavin Lowe",
  title =        "Defining information flow quantity",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "619--653",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-410",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wang:2004:CBI,
  author =       "Lingyu Wang and Duminda Wijesekera and Sushil
                 Jajodia",
  title =        "Cardinality-based inference control in data cubes",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "655--692",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12501",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DiPietro:2004:KMH,
  author =       "Roberto {Di Pietro} and Luigi V. Mancini and
                 Alessandro Mei",
  title =        "Key management for high bandwidth secure multicast",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "693--709",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12502",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cho:2004:GKR,
  author =       "Taenam Cho and Sang-Ho Lee and Won Kim",
  title =        "A group key recovery mechanism based on logical key
                 hierarchy",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "711--736",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhang:2004:RAR,
  author =       "Jian Zhang and Jian Gong and Yong Ding",
  title =        "Research on automated rollbackability of intrusion
                 response",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "737--751",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12504",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Buchholz:2004:PPO,
  author =       "Florian P. Buchholz and Clay Shields",
  title =        "Providing process origin information to aid in
                 computer forensic investigations",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "753--776",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12505",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Iheagwara:2004:CEM,
  author =       "Charles Iheagwara and Andrew Blyth and Mukesh
                 Singhal",
  title =        "Cost effective management frameworks for intrusion
                 detection systems",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "777--798",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12506",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:2004:CWS,
  author =       "Vijayalakshmi Atluri and Soon Ae Chun and Pietro
                 Mazzoleni",
  title =        "{Chinese} wall security for decentralized workflow
                 management systems",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "799--840",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12601",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Devanbu:2004:FAX,
  author =       "Premkumar Devanbu and Michael Gertz and April Kwong
                 and Charles Martel and Glen Nuckolls and Stuart G.
                 Stubblebine",
  title =        "Flexible authentication of {XML} documents",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "841--864",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12602",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2004:FAP,
  author =       "Joshua D. Guttman and F. Javier Thayer and Lenore D.
                 Zuck",
  title =        "The faithfulness of abstract protocol analysis:
                 Message authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "865--891",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12603",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Meadows:2004:FSA,
  author =       "Catherine Meadows and Paul Syverson and Iliano
                 Cervesato",
  title =        "Formal specification and analysis of the {Group Domain
                 of Interpretation Protocol} using {NPATRL} and the {NRL
                 Protocol Analyzer}",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "893--931",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12604",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2004:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 12 (2004)",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "933--935",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12605",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gorrieri:2005:GEP,
  author =       "Roberto Gorrieri",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "1--2",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bistarelli:2005:RMR,
  author =       "Stefano Bistarelli and Iliano Cervesato and Gabriele
                 Lenzini and Fabio Martinelli",
  title =        "Relating multiset rewriting and process algebras for
                 security protocol analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "3--47",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bodei:2005:CSP,
  author =       "Chiara Bodei and Pierpaolo Degano and Corrado Priami",
  title =        "Checking security policies through an enhanced
                 {Control Flow Analysis}",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "49--85",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bugliesi:2005:NIP,
  author =       "Michele Bugliesi and Sabina Rossi",
  title =        "Non-interference proof techniques for the analysis of
                 cryptographic protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "87--113",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2005:VIF,
  author =       "Joshua D. Guttman and Amy L. Herzog and John D.
                 Ramsdell and Clement W. Skorupka",
  title =        "Verifying information flow goals in {Security-Enhanced
                 Linux}",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "115--134",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ramanujam:2005:DCE,
  author =       "R. Ramanujam and S. P. Suresh",
  title =        "Decidability of context-explicit security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "135--165",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shmatikov:2005:RBT,
  author =       "Vitaly Shmatikov and Carolyn Talcott",
  title =        "Reputation-based trust management",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "167--190",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13107",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:2005:ACU,
  author =       "E. Bertino and E. Ferrari and G. Mella",
  title =        "An approach to cooperative updates of {XML} documents
                 in distributed systems",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "191--242",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:44 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zuquete:2005:EHQ,
  author =       "Andr{\'e} Z{\'u}quete",
  title =        "An efficient high quality random number generator for
                 multi-programmed systems",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "243--263",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:44 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://dl.acm.org/citation.cfm?id=1077819.1077821",
  acknowledgement = ack-nhfb,
  acmid =        "1077821",
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
  keywords =     "operating systems; Pentium processors; random number
                 generators; time samples",
  pagecount =    "21",
}

@Article{Cervesato:2005:CBS,
  author =       "Iliano Cervesato and Nancy A. Durgin and Patrick D.
                 Lincoln and John C. Mitchell and Andre Scedrov",
  title =        "A comparison between strand spaces and multiset
                 rewriting for security protocol analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "265--316",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:44 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Heather:2005:DPE,
  author =       "James Heather and Steve Schneider",
  title =        "A decision procedure for the existence of a rank
                 function",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "317--344",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:44 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Focardi:2005:GEP,
  author =       "Riccardo Focardi",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "345--345",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bodei:2005:SVS,
  author =       "Chiara Bodei and Mikael Buchholtz and Pierpaolo Degano
                 and Flemming Nielson and Hanne Riis Nielson",
  title =        "Static validation of security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "347--390",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bossi:2005:IFS,
  author =       "Annalisa Bossi and Damiano Macedonio and Carla Piazza
                 and Sabina Rossi",
  title =        "Information flow in secure contexts",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "391--422",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Datta:2005:DSC,
  author =       "Anupam Datta and Ante Derek and John C. Mitchell and
                 Dusko Pavlovic",
  title =        "A derivation system and compositional logic for
                 security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "423--482",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Halpern:2005:AIH,
  author =       "Joseph Y. Halpern and Kevin R. O'Neill",
  title =        "Anonymity and information hiding in multiagent
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "483--514",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:2005:SPAa,
  author =       "Jonathan Millen and Vitaly Shmatikov",
  title =        "Symbolic protocol analysis with an {Abelian} group
                 operator or {Diffie--Hellman} exponentiation",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "515--564",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Warinschi:2005:CAN,
  author =       "Bogdan Warinschi",
  title =        "A computational analysis of the
                 {Needham--Schroeder--(Lowe)} protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "565--591",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13307",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Vaidya:2005:SSI,
  author =       "Jaideep Vaidya and Chris Clifton",
  title =        "Secure set intersection cardinality with application
                 to association rule mining",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "593--622",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yu:2005:SUI,
  author =       "Meng Yu and Peng Liu and Wanyu Zang",
  title =        "Specifying and using intrusion masking models to
                 process distributed operations",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "623--658",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Stolfo:2005:CET,
  author =       "Salvatore J. Stolfo and Frank Apap and Eleazar Eskin
                 and Katherine Heller and Shlomo Hershkop and Andrew
                 Honig and Krysta Svore",
  title =        "A comparative evaluation of two algorithms for
                 {Windows Registry Anomaly Detection}",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "659--693",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:2005:SPAb,
  author =       "Jonathan Millen and Vitaly Shmatikov",
  title =        "Symbolic protocol analysis with an {Abelian} group
                 operator or {Diffie--Hellman} exponentiation",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "695--695",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bella:2005:GEP,
  author =       "Giampaolo Bella and Peter Ryan",
  title =        "{Guest Editors}' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "697--697",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13501",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:56 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bistarelli:2005:SCB,
  author =       "Stefano Bistarelli and Simon N. Foley and Barry
                 O'Sullivan",
  title =        "A soft constraint-based approach to the cascade
                 vulnerability problem",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "699--720",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13502",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:56 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Collberg:2005:SWF,
  author =       "Christian Collberg and Tapas Ranjan Sahoo",
  title =        "Software watermarking in the frequency domain:
                 Implementation, analysis, and attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "721--755",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:56 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nenadic:2005:RBV,
  author =       "Aleksandra Nenadi{\'c} and Ning Zhang and Qi Shi",
  title =        "{RSA-based Verifiable and Recoverable Encryption of
                 Signatures} and its application in certified e-mail
                 delivery",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "757--777",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13504",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:56 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Siaterlis:2005:OSA,
  author =       "Christos Siaterlis and Vasilis Maglaris",
  title =        "One step ahead to multisensor data fusion for {DDoS}
                 detection",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "779--806",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13505",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:56 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Molsa:2005:MDS,
  author =       "Jarmo M{\"o}ls{\"a}",
  title =        "Mitigating denial of service attacks: A tutorial",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "807--837",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13601",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:00 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sherwood:2005:PPS,
  author =       "Rob Sherwood and Bobby Bhattacharjee and Aravind
                 Srinivasan",
  title =        "{P5}: A protocol for scalable anonymous
                 communication",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "839--876",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13602",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:00 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pescape:2005:EAA,
  author =       "Antonio Pescap{\`e} and Giorgio Ventre",
  title =        "Experimental analysis of attacks against intradomain
                 routing protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "877--903",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13603",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:00 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2005:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 13 (2005)",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "905--907",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13604",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:00 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cortier:2006:SAP,
  author =       "V{\'e}ronique Cortier and St{\'e}phanie Delaune and
                 Pascal Lafourcade",
  title =        "A survey of algebraic properties used in cryptographic
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "1--43",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:04 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cimato:2006:UMU,
  author =       "Stelvio Cimato and Antonella Cresti and Paolo D'Arco",
  title =        "A unified model for unconditionally secure key
                 distribution",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "45--64",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:04 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Focardi:2006:IFS,
  author =       "Riccardo Focardi and Sabina Rossi",
  title =        "Information flow security in dynamic contexts",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "65--110",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:04 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Focardi:2006:P,
  author =       "Riccardo Focardi",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "111--111",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:08 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Braghin:2006:RBA,
  author =       "Chiara Braghin and Daniele Gorla and Vladimiro
                 Sassone",
  title =        "Role-based access control for a distributed calculus",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "113--155",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:08 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Myers:2006:ERD,
  author =       "Andrew C. Myers and Andrei Sabelfeld and Steve
                 Zdancewic",
  title =        "Enforcing Robust Declassification and Qualified
                 Robustness",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "157--196",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:08 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pereira:2006:IBS,
  author =       "Olivier Pereira and Jean-Jacques Quisquater",
  title =        "On the impossibility of building secure {Cliques}-type
                 authenticated group key agreement protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "197--246",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:08 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Goto:2006:P,
  author =       "Atsuhiro Goto",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "247--247",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:11 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Candebat:2006:SPM,
  author =       "Thibault Candebat and David Gray",
  title =        "Secure pseudonym management using mediated
                 identity-based encryption",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "249--267",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:11 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bhargav-Spantzel:2006:EPD,
  author =       "Abhilasha Bhargav-Spantzel and Anna C. Squicciarini
                 and Elisa Bertino",
  title =        "Establishing and protecting digital identity in
                 federation systems",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "269--300",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:11 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhu:2006:GEG,
  author =       "Sencun Zhu and Sanjeev Setia and Shouhuai Xu and
                 Sushil Jajodia",
  title =        "{GKMPAN}: An Efficient Group Rekeying Scheme for
                 Secure Multicast in Ad-Hoc Networks",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "301--325",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Eamani:2006:LBP,
  author =       "Arun K. Eamani and A. Prasad Sistla",
  title =        "Language based policy analysis in a {SPKI} Trust
                 Management System",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "327--357",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Xia:2006:EWD,
  author =       "Jianhong Xia and Sarma Vangala and Jiang Wu and Lixin
                 Gao and Kevin Kwiat",
  title =        "Effective worm detection for various scan techniques",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "359--387",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhou:2006:P,
  author =       "Jianying Zhou and Meng-Chow Kang",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "389--390",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14501",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:18 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Price:2006:PKI,
  author =       "Geraint Price",
  title =        "Public Key Infrastructures: A research agenda",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "391--417",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14502",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:18 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lippert:2006:LCM,
  author =       "M. Lippert and V. Karatsiolis and A. Wiesmaier and J.
                 Buchmann",
  title =        "Life-cycle management of {X.509} certificates based on
                 {LDAP} directories",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "419--439",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:18 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wang:2006:GNR,
  author =       "Guilin Wang",
  title =        "Generic non-repudiation protocols supporting
                 transparent off-line {TTP}",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "441--467",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14504",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:18 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lopez:2006:UPK,
  author =       "Javier Lopez",
  title =        "Unleashing public-key cryptography in wireless sensor
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "469--482",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14505",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:18 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{McDaniel:2006:EPA,
  author =       "Patrick McDaniel and Atul Prakash",
  title =        "Enforcing provisioning and authorization policy in the
                 {Antigone} system",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "483--511",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14601",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blyth:2006:PRT,
  author =       "Andrew Blyth and Paula Thomas",
  title =        "Performing real-time threat assessment of security
                 incidents using data fusion of {IDS} logs",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "513--534",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14602",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Aimeur:2006:BEC,
  author =       "Esma A{\"\i}meur and Gilles Brassard and Flavien Serge
                 Mani Onana",
  title =        "Blind Electronic Commerce",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "535--559",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14603",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Norman:2006:APC,
  author =       "Gethin Norman and Vitaly Shmatikov",
  title =        "Analysis of probabilistic contract signing",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "561--589",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14604",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Smith:2006:ITP,
  author =       "Geoffrey Smith",
  title =        "Improved typings for probabilistic noninterference in
                 a multi-threaded language",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "591--623",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14605",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 http://www.math.utah.edu/pub/tex/bib/multithreading.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2006:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 14 (2006)",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "625--626",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14606",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:23 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2007:MGE,
  author =       "Anonymous",
  title =        "Message from the {Guest Editors}",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "1--2",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zouridaki:2007:HQT,
  author =       "Charikleia Zouridaki and Brian L. Mark and Marek Hejmo
                 and Roshan K. Thomas",
  title =        "{Hermes}: A quantitative trust establishment framework
                 for reliable data packet delivery in {MANETs}",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "3--38",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Raya:2007:SVA,
  author =       "Maxim Raya and Jean-Pierre Hubaux",
  title =        "Securing vehicular ad hoc networks",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "39--68",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chan:2007:SSI,
  author =       "Haowen Chan and Adrian Perrig and Bartosz Przydatek
                 and Dawn Song",
  title =        "{SIA}: Secure information aggregation in sensor
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "69--102",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Radosavac:2007:DIM,
  author =       "S. Radosavac and Alvaro A. C{\'a}rdenas and John S.
                 Baras and George V. Moustakides",
  title =        "Detecting {IEEE 802.11 MAC} layer misbehavior in ad
                 hoc networks: Robust strategies against individual and
                 colluding attackers",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "103--128",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Xu:2007:SGC,
  author =       "Shouhuai Xu",
  title =        "On the security of group communication schemes",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "129--169",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zanin:2007:RRD,
  author =       "Giorgio Zanin and Roberto {Di Pietro} and Luigi V.
                 Mancini",
  title =        "Robust {RSA} distributed signatures for large-scale
                 long-lived ad hoc networks",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "171--196",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15107",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Casola:2007:PBM,
  author =       "Valentina Casola and Antonino Mazzeo and Nicola
                 Mazzocca and Valeria Vittorini",
  title =        "A policy-based methodology for security evaluation: A
                 Security Metric for Public Key Infrastructures",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "197--229",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:30 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Tripunitara:2007:TCE,
  author =       "Mahesh V. Tripunitara and Ninghui Li",
  title =        "A theory for comparing the expressive power of access
                 control models",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "231--272",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:30 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Skormin:2007:PIA,
  author =       "V. Skormin and A. Volynkin and D. Summerville and J.
                 Moronski",
  title =        "Prevention of information attacks by run-time
                 detection of self-replication in computer codes",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "273--302",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:30 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wehner:2007:AWN,
  author =       "Stephanie Wehner",
  title =        "Analyzing worms and network traffic using
                 compression",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "303--320",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:34 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Clark:2007:SAQ,
  author =       "David Clark and Sebastian Hunt and Pasquale
                 Malacaria",
  title =        "A static analysis for quantifying information flow in
                 a simple imperative language",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "321--371",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:34 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bossi:2007:CIF,
  author =       "Annalisa Bossi and Carla Piazza and Sabina Rossi",
  title =        "Compositional information flow security for concurrent
                 programs",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "373--416",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:34 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wang:2007:PBI,
  author =       "Lingyu Wang and Yingjiu Li and Sushil Jajodia and
                 Duminda Wijesekera",
  title =        "Parity-based inference control for multi-dimensional
                 range sum queries",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "417--445",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:38 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Skalka:2007:RMD,
  author =       "Christian Skalka and X. Sean Wang and Peter Chapin",
  title =        "Risk management for distributed authorization",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "447--489",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:38 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Goto:2007:P,
  author =       "Atsuhiro Goto",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "491--491",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15501",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:42 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bhargav-Spantzel:2007:UCT,
  author =       "Abhilasha Bhargav-Spantzel and Jan Camenisch and
                 Thomas Gross and Dieter Sommer",
  title =        "User centricity: A taxonomy and open issues",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "493--527",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15502",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:42 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bhargav-Spantzel:2007:PPM,
  author =       "Abhilasha Bhargav-Spantzel and Anna C. Squicciarini
                 and Shimon Modi and Matthew Young and Elisa Bertino and
                 Stephen J. Elliott",
  title =        "Privacy preserving multi-factor authentication with
                 biometrics",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "529--560",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:42 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Backes:2007:P,
  author =       "Michael Backes and David Basin and Michael Waidner",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "561--561",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15601",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bugliesi:2007:DTA,
  author =       "Michele Bugliesi and Riccardo Focardi and Matteo
                 Maffei",
  title =        "Dynamic types for authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "563--617",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15602",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Corin:2007:TAS,
  author =       "R. Corin and S. Etalle and P. H. Hartel and A. Mader",
  title =        "Timed analysis of security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "619--645",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15603",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Barthe:2007:SIF,
  author =       "Gilles Barthe and Leonor Prensa Nieto",
  title =        "Secure information flow for a concurrent language with
                 scheduling",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "647--689",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15604",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Uribe:2007:AAF,
  author =       "Tom{\'a}s E. Uribe and Steven Cheung",
  title =        "Automatic analysis of firewall and network intrusion
                 detection system configurations",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "691--715",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15605",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2007:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 15 (2007)",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "717--719",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15606",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhang:2008:SVA,
  author =       "Nan Zhang and Mark Ryan and Dimitar P. Guelev",
  title =        "Synthesising verified access control systems through
                 model checking",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "1--61",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:48 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Krukow:2008:LFH,
  author =       "Karl Krukow and Mogens Nielsen and Vladimiro Sassone",
  title =        "A logical framework for history-based access control
                 and reputation systems",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "63--101",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:48 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yee:2008:GEIa,
  author =       "George O. M. Yee and Ali A. Ghorbani and Patrick C. K.
                 Hung",
  title =        "{Guest Editors}' Introduction",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "103--106",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhou:2008:SPR,
  author =       "Jie Zhou and Jim Alves-Foss",
  title =        "Security policy refinement and enforcement for the
                 design of multi-level secure systems",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "107--131",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mont:2008:PPE,
  author =       "Marco Casassa Mont and Robert Thyne",
  title =        "Privacy policy enforcement in enterprises with
                 identity management solutions",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "133--163",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nayyar:2008:AAM,
  author =       "Harshit Nayyar and Ali A. Ghorbani",
  title =        "Approximate autoregressive modeling for network attack
                 detection",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "165--197",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Spindler:2008:PVS,
  author =       "Torsten Spindler and Christoph Wartmann and Ludger
                 Hovestadt and Daniel Roth and Luc {Van Gool} and
                 Andreas Steffen",
  title =        "Privacy in video surveilled spaces",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "199--222",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16205",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Alam:2008:CBR,
  author =       "Muhammad Alam and Michael Hafner and Ruth Breu",
  title =        "Constraint based role based access control in the
                 {SECTET}-framework",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "223--260",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16206",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yee:2008:GEIb,
  author =       "George O. M. Yee and Chunming Rong and Laurence T.
                 Yang",
  title =        "{Guest Editors}' Introduction",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "261--264",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:56 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Elbirt:2008:AAI,
  author =       "A. J. Elbirt",
  title =        "Accelerated {AES} implementations via generalized
                 instruction set extensions",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "265--288",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:56 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kayem:2008:RCK,
  author =       "Anne V. D. M. Kayem and Selim G. Akl and Patrick
                 Martin",
  title =        "On replacing cryptographic keys in hierarchical key
                 management systems",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "289--309",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:56 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wang:2008:CBH,
  author =       "Lifu Wang and Partha Dasgupta",
  title =        "Coprocessor-based hierarchical trust management for
                 software integrity and digital identity protection",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "311--339",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:56 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hagen:2008:PAU,
  author =       "Janne Merete Hagen and Tormod Kalberg Sivertsen and
                 Chunming Rong",
  title =        "Protection against unauthorized access and computer
                 crime in {Norwegian} enterprises",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "341--366",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:56 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Damiani:2008:GE,
  author =       "Ernesto Damiani",
  title =        "Guest Editorial",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "367--368",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0338",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ardagna:2008:PAA,
  author =       "C. A. Ardagna and M. Cremonini and S. {De Capitani di
                 Vimercati} and P. Samarati",
  title =        "A privacy-aware access control system",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "369--397",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0328",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Goodrich:2008:NFI,
  author =       "Michael T. Goodrich and Roberto Tamassia and Danfeng
                 (Daphne) Yao",
  title =        "Notarized federated {ID} management and
                 authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "399--418",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0324",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wang:2008:IIA,
  author =       "Lingyu Wang and Chao Yao and Anoop Singhal and Sushil
                 Jajodia",
  title =        "Implementing interactive analysis of attack graphs
                 using relational databases",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "419--437",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0327",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:2008:ESP,
  author =       "Vijayalakshmi Atluri and Heechang Shin and Jaideep
                 Vaidya",
  title =        "Efficient security policy enforcement for the mobile
                 environment",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "439--475",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0329",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Biskup:2008:PCQ,
  author =       "Joachim Biskup and Lena Wiese",
  title =        "Preprocessing for controlled query evaluation with
                 availability policy",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "477--494",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0325",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sabelfeld:2008:P,
  author =       "Andrei Sabelfeld",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "495--495",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0331",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:03 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Backes:2008:KDM,
  author =       "Michael Backes and Birgit Pfitzmann and Andre
                 Scedrov",
  title =        "Key-dependent message security under active attacks
                 --- {BRSIM\slash UC}-soundness of {Dolev--Yao}-style
                 encryption with key cycles",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "497--530",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0332",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:03 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chatzikokolakis:2008:BRI,
  author =       "Konstantinos Chatzikokolakis and Catuscia Palamidessi
                 and Prakash Panangaden",
  title =        "On the {Bayes} risk in information-hiding protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "531--571",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0333",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:03 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Corin:2008:SCS,
  author =       "Ricardo Corin and Pierre-Malo Deni{\'e}lou and
                 C{\'e}dric Fournet and Karthikeyan Bhargavan and James
                 Leifer",
  title =        "A secure compiler for session abstractions",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "573--636",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0334",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:03 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shroff:2008:SIF,
  author =       "Paritosh Shroff and Scott F. Smith and Mark Thober",
  title =        "Securing information flow via dynamic capture of
                 dependencies",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "637--688",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0335",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:03 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Tiplea:2008:SBS,
  author =       "Ferucio L. {\c{T}}iplea and C{\u{a}}t{\u{a}}lin V.
                 B{\^\i}rjoveanu and Constantin Enea and Ioana
                 Boureanu",
  title =        "Secrecy for bounded security protocols with freshness
                 check is {NEXPTIME}-complete",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "689--712",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-0306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:06 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Traynor:2008:EOF,
  author =       "Patrick Traynor and William Enck and Patrick McDaniel
                 and Thomas {La Porta}",
  title =        "Exploiting open functionality in {SMS}-capable
                 cellular networks",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "713--742",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-0308",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:06 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Murray:2008:NDA,
  author =       "Toby Murray and Duncan Grove",
  title =        "Non-delegatable authorities in capability systems",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "743--759",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0314",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:06 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Belsis:2008:AEF,
  author =       "Petros Belsis and Kostas Fragos and Stefanos Gritzalis
                 and Christos Skourlas",
  title =        "Applying effective feature selection techniques with
                 hierarchical mixtures of experts for spam
                 classification",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "761--790",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0319",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:06 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2008:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 16 (2008)",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "791--793",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16605",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:06 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Petkovic:2009:P,
  author =       "Milan Petkovi{\'c} and Willem Jonker",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "1--3",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0326",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yao:2009:EPT,
  author =       "Chao Yao and Lingyu Wang and X. Sean Wang and Claudio
                 Bettini and Sushil Jajodia",
  title =        "Evaluating privacy threats in released database views
                 by symmetric indistinguishability",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "5--42",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0317",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Byun:2009:PPI,
  author =       "Ji-Won Byun and Tiancheng Li and Elisa Bertino and
                 Ninghui Li and Yonglak Sohn",
  title =        "Privacy-preserving incremental data dissemination",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "43--68",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0316",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bottcher:2009:IDA,
  author =       "Stefan B{\"o}ttcher and Rita Hartel",
  title =        "Information disclosure by answers to {XPath} queries",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "69--99",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0318",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cheng:2009:QAV,
  author =       "Weiwei Cheng and Kian-Lee Tan",
  title =        "Query assurance verification for outsourced
                 multi-dimensional databases",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "101--126",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0315",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:10 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hu:2009:CRR,
  author =       "Nan Hu and Giri K. Tayi and Chengyu Ma and Yingjiu
                 Li",
  title =        "Certificate revocation release policies",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "127--157",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0330",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:14 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Herzberg:2009:FPT,
  author =       "Amir Herzberg",
  title =        "Folklore, practice and theory of robust combiners",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "159--189",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0336",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:14 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Aziz:2009:CSA,
  author =       "Benjamin Aziz and Simon N. Foley and John Herbert and
                 Garret Swart",
  title =        "Configuring storage-area networks using mandatory
                 security",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "191--210",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0337",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:14 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Vaidya:2009:ERM,
  author =       "Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo and
                 Haibing Lu",
  title =        "Edge-{RMP}: Minimizing administrative assignments for
                 role-based access control",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "211--235",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0341",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:14 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bella:2009:JCS,
  author =       "Giampaolo Bella and Peter Y. A. Ryan",
  title =        "{{\booktitle{Journal of Computer Security}}}",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "237--237",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0346",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:18 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Belsis:2009:AEF,
  author =       "Petros Belsis and Kostas Fragos and Stefanos Gritzalis
                 and Christos Skourlas",
  title =        "Applying effective feature selection techniques with
                 hierarchical mixtures of experts for spam
                 classification",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "239--268",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0377",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:18 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Grothoff:2009:TBS,
  author =       "Christian Grothoff and Krista Grothoff and Ryan
                 Stutsman and Ludmila Alkhutova and Mikhail Atallah",
  title =        "Translation-based steganography",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "269--303",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0320",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:18 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Vigna:2009:REA,
  author =       "Giovanni Vigna and Fredrik Valeur and Davide
                 Balzarotti and William Robertson and Christopher
                 Kruegel and Engin Kirda",
  title =        "Reducing errors in the anomaly-based detection of
                 web-based attacks through the combined analysis of web
                 requests and {SQL} queries",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "305--329",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0321",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:18 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Xu:2009:ASL,
  author =       "Haizhi Xu and Steve J. Chapin",
  title =        "Address-space layout randomization using code
                 islands",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "331--362",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0322",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:18 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blanchet:2009:AVC,
  author =       "Bruno Blanchet",
  title =        "Automatic verification of correspondences for security
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "363--434",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0339",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:22 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Delaune:2009:VPT,
  author =       "St{\'e}phanie Delaune and Steve Kremer and Mark Ryan",
  title =        "Verifying privacy-type properties of electronic voting
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "435--487",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0340",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:22 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ding:2009:LFM,
  author =       "Xuhua Ding and Gene Tsudik and Shouhuai Xu",
  title =        "Leak-free mediated group signatures",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "489--514",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0342",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:22 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2009:I,
  author =       "Joshua D. Guttman",
  title =        "Introduction",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "515--515",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0396",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sabelfeld:2009:DDP,
  author =       "Andrei Sabelfeld and David Sands",
  title =        "Declassification: Dimensions and principles",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "517--548",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0352",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Matos:2009:DND,
  author =       "Ana Almeida Matos and G{\'e}rard Boudol",
  title =        "On declassification and the non-disclosure policy",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "549--597",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0355",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Harrison:2009:AIF,
  author =       "William L. Harrison and James Hook",
  title =        "Achieving information flow security through monadic
                 control of effects",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "599--653",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0356",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Clarkson:2009:QIF,
  author =       "Michael R. Clarkson and Andrew C. Myers and Fred B.
                 Schneider",
  title =        "Quantifying information flow with beliefs",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "655--701",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0353",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hofheinz:2009:PRS,
  author =       "Dennis Hofheinz and J{\"o}rn M{\"u}ller-Quade and
                 Dominique Unruh",
  title =        "Polynomial runtime in simulatability definitions",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "703--735",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0354",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Adao:2009:SCF,
  author =       "Pedro Ad{\~a}o and Gergei Bana and Jonathan Herzog and
                 Andre Scedrov",
  title =        "Soundness and completeness of formal encryption: The
                 cases of key cycles and partial information leakage",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "737--797",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0358",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bartoletti:2009:PVS,
  author =       "Massimo Bartoletti and Pierpaolo Degano and Gian Luigi
                 Ferrari",
  title =        "Planning and verifying service composition",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "799--837",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0357",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guette:2009:ATK,
  author =       "Gilles Guette",
  title =        "Automating trusted key rollover in {DNSSEC}",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "839--854",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0343",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Preda:2009:SBC,
  author =       "Mila Dalla Preda and Roberto Giacobazzi",
  title =        "Semantics-based code obfuscation by abstract
                 interpretation",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "855--908",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0345",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jacobs:2009:SLS,
  author =       "Bart Jacobs and Ichiro Hasuo",
  title =        "Semantics and logic for security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "909--944",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0348",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dainotti:2009:CAA,
  author =       "Alberto Dainotti and Antonio Pescap{\'e} and Giorgio
                 Ventre",
  title =        "A cascade architecture for {DoS} attacks detection
                 based on the wavelet transform",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "945--968",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0350",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2009:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 17 (2009)",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "969--971",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-17605",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Campolargo:2010:JSI,
  author =       "M{\'a}rio Campolargo",
  title =        "{JCS} special issue on {EU}-funded {ICT} research on
                 Trust and Security: Foreword",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "??--??",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0368",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Camenisch:2010:JSI,
  author =       "Jan Camenisch and Javier Lopez and Fabio Massacci and
                 Massimo Ciscato and Thomas Skordas",
  title =        "{JCS} special issue on {EU}-funded {ICT} research on
                 Trust and Security",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "1--5",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0375",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bergholz:2010:NFA,
  author =       "Andr{\'e} Bergholz and Jan {De Beer} and Sebastian
                 Glahn and Marie-Francine Moens and Gerhard Paa{\ss} and
                 Siehyun Strobel",
  title =        "New filtering approaches for phishing email",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "7--35",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0371",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dam:2010:PCI,
  author =       "Mads Dam and Bart Jacobs and Andreas Lundblad and
                 Frank Piessens",
  title =        "Provably correct inline monitoring for multithreaded
                 {Java}-like programs",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "37--59",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0365",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 http://www.math.utah.edu/pub/tex/bib/multithreading.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Salvail:2010:STR,
  author =       "Louis Salvail and Momtchil Peev and Eleni Diamanti and
                 Romain All{\'e}aume and Norbert L{\"u}tkenhaus and
                 Thomas L{\"a}nger",
  title =        "Security of trusted repeater quantum key distribution
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "61--87",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0373",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cabuk:2010:TAS,
  author =       "Serdar Cabuk and Chris I. Dalton and Konrad Eriksson
                 and Dirk Kuhlmann and HariGovind V. Ramasamy and
                 Gianluca Ramunno and Ahmad-Reza Sadeghi and Matthias
                 Schunter and Christian St{\"u}ble",
  title =        "Towards automated security policy enforcement in
                 multi-tenant virtual data centers",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "89--121",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0376",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ardagna:2010:ECP,
  author =       "Claudio A. Ardagna and Jan Camenisch and Markulf
                 Kohlweiss and Ronald Leenes and Gregory Neven and Bart
                 Priem and Pierangela Samarati and Dieter Sommer and
                 Mario Verdicchio",
  title =        "Exploiting cryptography for privacy-enhanced access
                 control: A result of the {PRIME Project}",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "123--160",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0367",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Argyropoulos:2010:BTP,
  author =       "Savvas Argyropoulos and Dimitrios Tzovaras and
                 Dimosthenis Ioannidis and Yannis Damousis and Michael
                 G. Strintzis and Martin Braun and Serge Boverie",
  title =        "Biometric template protection in multimodal
                 authentication systems based on error correcting
                 codes",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "161--185",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0369",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:2010:E,
  author =       "Sushil Jajodia and Jon Millen",
  title =        "Editorial",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "187--187",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:38 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gorla:2010:P,
  author =       "Daniele Gorla and Catuscia Palamidessi",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "189--189",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0359",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:38 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Malacaria:2010:RAS,
  author =       "Pasquale Malacaria",
  title =        "Risk assessment of security threats for looping
                 constructs",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "191--228",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0360",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:38 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bodei:2010:DPT,
  author =       "Chiara Bodei and Linda Brodo and Pierpaolo Degano and
                 Han Gao",
  title =        "Detecting and preventing type flaws at static time",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "229--264",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0361",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:38 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hamadou:2010:CPS,
  author =       "Sardaouna Hamadou and John Mullins",
  title =        "Calibrating the power of schedulers for probabilistic
                 polynomial-time calculus",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "265--316",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0362",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:38 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Delaune:2010:SBA,
  author =       "St{\'e}phanie Delaune and Steve Kremer and Mark D.
                 Ryan",
  title =        "Symbolic bisimulation for the applied pi calculus",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "317--377",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0363",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:38 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lekkas:2010:PMT,
  author =       "Dimitrios Lekkas and Dimitris Gritzalis",
  title =        "{e-Passports} as a means towards a {Globally
                 Interoperable Public Key Infrastructure}",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "379--396",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0370",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pala:2010:FPN,
  author =       "Massimiliano Pala and Sean W. Smith",
  title =        "Finding the {PKI} needles in the {Internet} haystack",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "397--420",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2010:CCB,
  author =       "Jiguo Li and Xinyi Huang and Yi Mu and Willy Susilo
                 and Qianhong Wu",
  title =        "Constructions of certificate-based signature secure
                 against key replacement attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "421--449",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0366",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2010:ESS,
  author =       "Chung Ki Li and Guomin Yang and Duncan S. Wong and
                 Xiaotie Deng and Sherman S. M. Chow",
  title =        "An efficient signcryption scheme with key privacy and
                 its extension to ring signcryption",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "451--473",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0374",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chadwick:2010:ICR,
  author =       "David W. Chadwick and Sean Antony and Rune Bjerk",
  title =        "Instant certificate revocation and publication using
                 {WebDAV}",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "475--496",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0372",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Goto:2010:P,
  author =       "Atsuhiro Goto",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "497--497",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0381",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:47 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Saklikar:2010:IFV,
  author =       "Samir Saklikar and Subir Saha",
  title =        "Identity Federation for {VoIP} systems",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "499--540",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0349",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:47 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Baldwin:2010:AFI,
  author =       "Adrian Baldwin and Marco Casassa Mont and Yolanta
                 Beres and Simon Shiu",
  title =        "Assurance for federated identity management",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "541--572",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0380",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:47 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Modersheim:2010:CDS,
  author =       "Sebastian M{\"o}dersheim and Luca Vigan{\`o} and David
                 Basin",
  title =        "Constraint differentiation: Search-space reduction for
                 the constraint-based analysis of security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "575--618",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0351",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:47 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Becker:2010:SDS,
  author =       "Moritz Y. Becker and C{\'e}dric Fournet and Andrew D.
                 Gordon",
  title =        "{SecPAL}: Design and semantics of a decentralized
                 authorization language",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "619--665",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0364",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:47 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Conrad:2010:AUT,
  author =       "James R. Conrad and Jim Alves-Foss and Sauchi Stephen
                 Lee",
  title =        "Analyzing uncertainty in {TG} protection graphs with
                 {TG\slash MC}",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "667--699",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0378",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pucella:2010:IOS,
  author =       "Riccardo Pucella and Fred B. Schneider",
  title =        "Independence from obfuscation: A semantic framework
                 for diversity",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "701--749",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0379",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Giacobazzi:2010:ACU,
  author =       "Roberto Giacobazzi and Isabella Mastroeni",
  title =        "Adjoining classified and unclassified information by
                 abstract interpretation",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "751--797",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0382",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pirretti:2010:SAB,
  author =       "Matthew Pirretti and Patrick Traynor and Patrick
                 McDaniel and Brent Waters",
  title =        "Secure attribute-based systems",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "799--837",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0383",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DiPietro:2010:HKS,
  author =       "Roberto {Di Pietro} and Luigi V. Mancini and
                 Alessandro Mei",
  title =        "Hierarchies of keys in secure multicast
                 communications",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "839--860",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0384",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jovanovic:2010:SAD,
  author =       "Nenad Jovanovic and Christopher Kruegel and Engin
                 Kirda",
  title =        "Static analysis for detecting taint-style
                 vulnerabilities in web applications",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "861--907",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0385",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Baudet:2010:GAC,
  author =       "Mathieu Baudet and Bogdan Warinschi and Mart{\'\i}n
                 Abadi",
  title =        "Guessing attacks and the computational soundness of
                 static equivalence",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "909--968",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0386",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Focardi:2010:E,
  author =       "Riccardo Focardi",
  title =        "Editorial",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "969--969",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0390",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Besson:2010:VRA,
  author =       "Fr{\'e}d{\'e}ric Besson and Guillaume Dufay and Thomas
                 Jensen and David Pichardie",
  title =        "Verifying resource access control on mobile
                 interactive devices",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "971--998",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0387",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kremer:2010:CSA,
  author =       "Steve Kremer and Laurent Mazar{\'e}",
  title =        "Computationally sound analysis of protocols using
                 bilinear pairings",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "999--1033",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0388",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Roy:2010:ITP,
  author =       "Arnab Roy and Anupam Datta and Ante Derek and John C.
                 Mitchell",
  title =        "Inductive trace properties for computational
                 security",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1035--1073",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-389",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sabelfeld:2010:P,
  author =       "Andrei Sabelfeld",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1075--1075",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0391",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Backes:2010:CSS,
  author =       "Michael Backes and Dominique Unruh",
  title =        "Computational soundness of symbolic zero-knowledge
                 proofs",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1077--1155",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0392",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Clarkson:2010:H,
  author =       "Michael R. Clarkson and Fred B. Schneider",
  title =        "Hyperproperties",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1157--1210",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0393",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Delaune:2010:FSA,
  author =       "St{\'e}phanie Delaune and Steve Kremer and Graham
                 Steel",
  title =        "Formal security analysis of {PKCS\#11} and proprietary
                 extensions",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1211--1245",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0394",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Goubault-Larrecq:2010:FMF,
  author =       "Jean Goubault-Larrecq",
  title =        "Finite models for formal security proofs",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1247--1299",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0395",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2010:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 18 (2010)",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1301--1305",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-18610",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kopf:2011:ADI,
  author =       "Boris K{\"o}pf and David Basin",
  title =        "Automatically deriving information-theoretic bounds
                 for adaptive side-channel attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "1--31",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0397",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gordon:2011:IIS,
  author =       "Lawrence A. Gordon and Martin P. Loeb and Lei Zhou",
  title =        "The impact of information security breaches: Has there
                 been a downward shift in costs?",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "33--56",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0398",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeAngelis:2011:SAT,
  author =       "David DeAngelis and K. Suzanne Barber",
  title =        "Security applications of trust in multi-agent
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "57--99",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0399",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DSouza:2011:MCT,
  author =       "Deepak D'Souza and Raveendra Holla and K. R.
                 Raghavendra and Barbara Sprick",
  title =        "Model-checking trace-based information flow
                 properties",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "101--138",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0400",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nguyen:2011:APB,
  author =       "L. H. Nguyen and A. W. Roscoe",
  title =        "Authentication protocols based on low-bandwidth
                 unspoofable channels: A comparative survey",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "139--201",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sinha:2011:SSS,
  author =       "Anshuman Sinha",
  title =        "A survey of system security in contactless electronic
                 passports",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "203--226",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0414",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2011:GEP,
  author =       "Yingjiu Li and Jianying Zhou",
  title =        "Guest editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "227--228",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Alomair:2011:SLC,
  author =       "Basel Alomair and Loukas Lazos and Radha Poovendran",
  title =        "Securing low-cost {RFID} systems: An unconditionally
                 secure approach",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "229--257",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hancke:2011:PES,
  author =       "Gerhard P. Hancke",
  title =        "Practical eavesdropping and skimming attacks on
                 high-frequency {RFID} tokens",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "259--288",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0407",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Avoine:2011:FAR,
  author =       "Gildas Avoine and Muhammed Ali Bing{\"o}l and
                 S{\"u}leyman Karda{\c{s}} and C{\'e}dric Lauradoux and
                 Benjamin Martin",
  title =        "A framework for analyzing {RFID} distance bounding
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "289--317",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0408",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ng:2011:PRO,
  author =       "Ching Yu Ng and Willy Susilo and Yi Mu and Rei
                 Safavi-Naini",
  title =        "Practical {RFID} ownership transfer scheme",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "319--341",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0409",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Halevi:2011:TBH,
  author =       "Tzipora Halevi and Nitesh Saxena and Shai Halevi",
  title =        "Tree-based {HB} protocols for privacy-preserving
                 authentication of {RFID} tags",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "343--363",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:2011:P,
  author =       "Vijay Atluri",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "365--365",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0425",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dong:2011:SSE,
  author =       "Changyu Dong and Giovanni Russello and Naranker
                 Dulay",
  title =        "Shared and searchable encrypted data for untrusted
                 servers",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "367--397",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0415",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Toahchoodee:2011:FAS,
  author =       "Manachai Toahchoodee and Indrakshi Ray",
  title =        "On the formalization and analysis of a spatio-temporal
                 role-based access control model",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "399--452",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0418",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{He:2011:SCP,
  author =       "Xiaoyun He and Haibing Lu and Jaideep Vaidya and Nabil
                 Adam",
  title =        "Secure construction and publication of contingency
                 tables from distributed data",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "453--484",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0417",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Vaidya:2011:I,
  author =       "Jaideep Vaidya and Ehud Gudes",
  title =        "Introduction",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "485--486",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0427",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Biskup:2011:IPV,
  author =       "Joachim Biskup and Christian Gogolin and Jens Seiler
                 and Torben Weibert",
  title =        "Inference-proof view update transactions with
                 forwarded refreshments",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "487--529",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0420",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ciriani:2011:SDO,
  author =       "Valentina Ciriani and Sabrina {De Capitani di
                 Vimercati} and Sara Foresti and Sushil Jajodia and
                 Stefano Paraboschi and Pierangela Samarati",
  title =        "Selective data outsourcing for enforcing privacy",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "531--566",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0422",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Foley:2011:MSP,
  author =       "Simon N. Foley and William M. Fitzgerald",
  title =        "Management of security policy configuration using a
                 {Semantic Threat Graph} approach",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "567--605",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0421",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shin:2011:EES,
  author =       "Heechang Shin and Vijayalakshmi Atluri and June-suh
                 Cho",
  title =        "Efficiently enforcing spatiotemporal access control
                 under uncertain location information",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "607--637",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0423",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Rieck:2011:AAM,
  author =       "Konrad Rieck and Philipp Trinius and Carsten Willems
                 and Thorsten Holz",
  title =        "Automatic analysis of malware behavior using machine
                 learning",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "639--668",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0410",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:11 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{vanOorschot:2011:EPC,
  author =       "P. C. van Oorschot and Julie Thorpe",
  title =        "Exploiting predictability in click-based graphical
                 passwords",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "669--702",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0411",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:11 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mannan:2011:LPD,
  author =       "Mohammad Mannan and P. C. van Oorschot",
  title =        "Leveraging personal devices for stronger password
                 authentication from untrusted computers",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "703--750",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0412",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:11 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:2011:AED,
  author =       "Sabrina {De Capitani di Vimercati} and Sara Foresti
                 and Sushil Jajodia and Stefano Paraboschi and
                 Pierangela Samarati",
  title =        "Authorization enforcement in distributed query
                 evaluation",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "751--794",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0413",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:11 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shin:2011:PAM,
  author =       "Heechang Shin and Jaideep Vaidya and Vijayalakshmi
                 Atluri",
  title =        "A profile anonymization model for location-based
                 services",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "795--833",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0416",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gritzalis:2011:SPM,
  author =       "Dimitris Gritzalis and Giannis Marias and Yacine
                 Rebahi and Yannis Soupionis and Sven Ehlert",
  title =        "{SPIDER}: A platform for managing {SIP}-based {Spam
                 over Internet Telephony (SPIT)}",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "835--867",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0419",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hsu:2011:WLC,
  author =       "Francis Hsu and Hao Chen and Sridhar Machiraju",
  title =        "{WebCallerID}: Leveraging cellular networks for {Web}
                 authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "869--893",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0424",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Curtmola:2011:SSE,
  author =       "Reza Curtmola and Juan Garay and Seny Kamara and
                 Rafail Ostrovsky",
  title =        "Searchable symmetric encryption: Improved definitions
                 and efficient constructions",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "895--934",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0426",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dewri:2011:EPV,
  author =       "Rinku Dewri and Indrajit Ray and Indrakshi Ray and
                 Darrell Whitley",
  title =        "Exploring privacy versus data quality trade-offs in
                 anonymization techniques using multi-objective
                 optimization",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "935--974",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0428",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kamil:2011:ATS,
  author =       "Allaa Kamil and Gavin Lowe",
  title =        "Analysing {TLS} in the strand spaces model",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "975--1025",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0429",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gritzalis:2011:GEP,
  author =       "Dimitris Gritzalis",
  title =        "{Guest Editor}'s Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "1027--1028",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0441",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yasuoka:2011:BPQ,
  author =       "Hirotoshi Yasuoka and Tachio Terauchi",
  title =        "On bounding problems of quantitative information
                 flow",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "1029--1082",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0437",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhang:2011:UTA,
  author =       "Chao Zhang and Wei Zou and Tielei Wang and Yu Chen and
                 Tao Wei",
  title =        "Using type analysis in compiler to mitigate
                 integer-overflow-to-buffer-overflow threat",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "1083--1107",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0434",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Deng:2011:ZKB,
  author =       "Robert H. Deng and Yingjiu Li and Moti Yung and Yunlei
                 Zhao",
  title =        "A zero-knowledge based framework for {RFID} privacy",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "1109--1146",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0440",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nithyanand:2011:UAR,
  author =       "Rishab Nithyanand and Gene Tsudik and Ersin Uzun",
  title =        "User-aided reader revocation in {PKI}-based {RFID}
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "1147--1172",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0435",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2011:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 19 (2011)",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "1173--1176",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-19606",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Armando:2012:P,
  author =       "Alessandro Armando and Gavin Lowe",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "1--1",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0438",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Alvim:2012:QIF,
  author =       "M{\'a}rio S. Alvim and Miguel E. Andr{\'e}s and
                 Catuscia Palamidessi",
  title =        "Quantitative information flow in interactive systems",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "3--50",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0433",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bielova:2012:IES,
  author =       "Nataliia Bielova and Fabio Massacci",
  title =        "Iterative enforcement by suppression: Towards
                 practical enforcement theories",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "51--79",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0431",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Costa:2012:MPS,
  author =       "Gabriele Costa and Pierpaolo Degano and Fabio
                 Martinelli",
  title =        "Modular plans for secure service composition",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "81--117",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0430",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhou:2012:FAS,
  author =       "Hongbin Zhou and Simon N. Foley",
  title =        "Fast automatic security protocol generation",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "2--3",
  pages =        "119--167",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0432",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Stakhanova:2012:TCS,
  author =       "Natalia Stakhanova and Chris Strasburg and Samik Basu
                 and Johnny S. Wong",
  title =        "Towards cost-sensitive assessment of intrusion
                 response selection",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "2--3",
  pages =        "169--198",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0436",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bowen:2012:SGI,
  author =       "Brian M. Bowen and Vasileios P. Kemerlis and Pratap
                 Prabhu and Angelos D. Keromytis and Salvatore J.
                 Stolfo",
  title =        "A system for generating and injecting
                 indistinguishable network decoys",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "2--3",
  pages =        "199--221",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0439",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ahn:2012:PDR,
  author =       "Gail-Joon Ahn and Jing Jin and Mohamed Shehab",
  title =        "Policy-driven role-based access management for ad-hoc
                 collaboration",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "2--3",
  pages =        "223--257",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0446",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blanton:2012:SOC,
  author =       "Marina Blanton and Mehrdad Aliasgari",
  title =        "Secure outsourced computation of iris matching",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "2--3",
  pages =        "259--305",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0447",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Barthe:2012:P,
  author =       "Gilles Barthe and Jorge Cuellar and Javier Lopez and
                 Alexander Pretschner",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "307--308",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0462",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Armando:2012:SAS,
  author =       "Alessandro Armando and Silvio Ranise",
  title =        "Scalable automated symbolic analysis of administrative
                 role-based access control policies by {SMT} solving",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "309--352",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0461",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Garg:2012:SAL,
  author =       "Deepak Garg and Frank Pfenning",
  title =        "Stateful authorization logic --- Proof theory and a
                 case study",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "353--391",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0456",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bezzi:2012:MPI,
  author =       "Michele Bezzi and Sabrina {De Capitani di Vimercati}
                 and Sara Foresti and Giovanni Livraga and Pierangela
                 Samarati and Roberto Sassi",
  title =        "Modeling and preventing inferences from sensitive
                 value distributions in data release",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "393--436",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0457",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sun:2012:TAV,
  author =       "Yanjie Sun and Chenyi Zhang and Jun Pang and Baptiste
                 Alcalde and Sjouke Mauw",
  title =        "A trust-augmented voting scheme for collaborative
                 privacy management",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "437--459",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0453",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2012:GEP,
  author =       "Yingjiu Li",
  title =        "{Guest Editor}'s Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "461--462",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0448",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ciriani:2012:OAE,
  author =       "Valentina Ciriani and Sabrina {De Capitani di
                 Vimercati} and Sara Foresti and Giovanni Livraga and
                 Pierangela Samarati",
  title =        "An {OBDD} approach to enforce confidentiality and
                 visibility constraints in data publishing",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "463--508",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0449",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Biskup:2012:DPA,
  author =       "Joachim Biskup",
  title =        "Dynamic policy adaptation for inference control of
                 queries to a propositional information system",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "509--546",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0450",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Adaikkalavan:2012:MSD,
  author =       "Raman Adaikkalavan and Xing Xie and Indrakshi Ray",
  title =        "Multilevel secure data stream processing: Architecture
                 and implementation",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "547--581",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0451",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hong:2012:SED,
  author =       "Yuan Hong and Jaideep Vaidya and Haibing Lu",
  title =        "Secure and efficient distributed linear programming",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "583--634",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0452",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Myers:2012:P,
  author =       "Andrew Myers and Michael Backes",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "635--636",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0445",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chong:2012:RIR,
  author =       "Stephen Chong",
  title =        "Required information release",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "637--676",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0442",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Becker:2012:IFT,
  author =       "Moritz Y. Becker",
  title =        "Information flow in trust management systems",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "677--708",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0443",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kusters:2012:GBD,
  author =       "Ralf K{\"u}sters and Tomasz Truderung and Andreas
                 Vogt",
  title =        "A game-based definition of coercion resistance and its
                 applications",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "709--764",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0444",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2012:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 20 (2012)",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "765--767",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-20605",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yarmand:2013:BBA,
  author =       "Mohammad H. Yarmand and Kamran Sartipi and Douglas G.
                 Down",
  title =        "Behavior-based access control for distributed
                 healthcare systems",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "1--39",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0454",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:44 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Meier:2013:ECM,
  author =       "Simon Meier and Cas Cremers and David Basin",
  title =        "Efficient construction of machine-checked symbolic
                 protocol security proofs",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "41--87",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0455",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:44 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cortier:2013:AFH,
  author =       "V{\'e}ronique Cortier and Ben Smyth",
  title =        "Attacking and fixing {Helios}: An analysis of ballot
                 secrecy",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "89--148",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0458",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:44 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cuppens:2013:FSM,
  author =       "Fr{\'e}d{\'e}ric Cuppens and Nora Cuppens-Boulahia and
                 Yehia Elrakaiby",
  title =        "Formal specification and management of security
                 policies with collective group obligations",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "149--190",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0459",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:44 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Geigel:2013:NNT,
  author =       "Arturo Geigel",
  title =        "Neural network {Trojan}",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "191--232",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0460",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:48 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Phatak:2013:SIN,
  author =       "Dhananjay Phatak and Alan T. Sherman and Nikhil Joshi
                 and Bhushan Sonawane and Vivek G. Relan and Amol
                 Dawalbhakta",
  title =        "Spread Identity: A new dynamic address remapping
                 mechanism for anonymity and {DDoS} defense",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "233--281",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0463",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:48 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kolesnikov:2013:SAP,
  author =       "Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas
                 Schneider",
  title =        "A systematic approach to practically efficient general
                 two-party secure function evaluation protocols and
                 their modular design",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "283--315",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130464",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:48 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jadliwala:2013:OMZ,
  author =       "Murtuza Jadliwala and Igor Bilogrevic and Jean-Pierre
                 Hubaux",
  title =        "Optimizing mix-zone coverage in pervasive wireless
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "317--346",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130465",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kobsa:2013:CJV,
  author =       "Alfred Kobsa and Rishab Nithyanand and Gene Tsudik and
                 Ersin Uzun",
  title =        "Can {Jannie} verify? {Usability} of display-equipped
                 {RFID} tags for security purposes",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "347--370",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130470",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kreitz:2013:FSW,
  author =       "Gunnar Kreitz",
  title =        "Flow stealing: A well-timed redirection attack",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "371--391",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130466",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Herzberg:2013:FJL,
  author =       "Amir Herzberg and Ronen Margulies",
  title =        "Forcing {Johnny} to login safely",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "393--424",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130467",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:2013:SCM,
  author =       "Sabrina {De Capitani di Vimercati} and Sara Foresti
                 and Stefano Paraboschi and Gerardo Pelosi and
                 Pierangela Samarati",
  title =        "Supporting concurrency and multiple indexes in private
                 access to outsourced data",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "425--461",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130468",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:52 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mardziel:2013:DEK,
  author =       "Piotr Mardziel and Stephen Magill and Michael Hicks
                 and Mudhakar Srivatsa",
  title =        "Dynamic enforcement of knowledge-based security
                 policies using probabilistic abstract interpretation",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "463--532",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130469",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:55 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhou:2013:SVC,
  author =       "Fangfei Zhou and Manish Goel and Peter Desnoyers and
                 Ravi Sundaram",
  title =        "Scheduler vulnerabilities and coordinated attacks in
                 cloud computing",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "533--559",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130474",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:55 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Homer:2013:AVM,
  author =       "John Homer and Su Zhang and Xinming Ou and David
                 Schmidt and Yanhui Du and S. Raj Rajagopalan and Anoop
                 Singhal",
  title =        "Aggregating vulnerability metrics in enterprise
                 networks using attack graphs",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "561--597",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130475",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:55 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Visconti:2013:SIA,
  author =       "Ivan Visconti",
  title =        "Special Issue: Advances in Security for Communication
                 Networks",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "599--600",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130483",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Baron:2013:SPM,
  author =       "Joshua Baron and Karim {El Defrawy} and Kirill
                 Minkovich and Rafail Ostrovsky and Eric Tressler",
  title =        "{5PM}: Secure pattern matching",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "601--625",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130481",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 http://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blazy:2013:SBS,
  author =       "Olivier Blazy and Georg Fuchsbauer and David
                 Pointcheval and Damien Vergnaud",
  title =        "Short blind signatures",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "627--661",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130477",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gentry:2013:FSB,
  author =       "Craig Gentry and Shai Halevi and Chris Peikert and
                 Nigel P. Smart",
  title =        "Field switching in {BGV}-style homomorphic
                 encryption",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "663--684",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130480",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lipmaa:2013:MEC,
  author =       "Helger Lipmaa and Bingsheng Zhang",
  title =        "A more efficient computationally sound non-interactive
                 zero-knowledge shuffle argument",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "685--719",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130478",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Myers:2013:BBC,
  author =       "Steven Myers and Mona Sergi and abhi shelat",
  title =        "Black-box construction of a more than non-malleable
                 {CCA1} encryption scheme from plaintext awareness",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "721--748",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130485",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nieto:2013:PVC,
  author =       "Juan Gonz{\'a}lez Nieto and Mark Manulis and Bertram
                 Poettering and Jothi Rangasamy and Douglas Stebila",
  title =        "Publicly verifiable ciphertexts",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "749--778",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130473",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Degano:2013:P,
  author =       "Pierpaolo Degano and Joshua D. Guttman",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "779--780",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130488",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Paiola:2013:VSP,
  author =       "Miriam Paiola and Bruno Blanchet",
  title =        "Verification of security protocols with lists: From
                 length one to unbounded length",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "781--816",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130471",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Basin:2013:PRI,
  author =       "David Basin and Cas Cremers and Simon Meier",
  title =        "Provably repairing the {ISO\slash IEC 9798} standard
                 for entity authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "817--846",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130472",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Arapinis:2013:PSC,
  author =       "Myrto Arapinis and Sergiu Bursuc and Mark Ryan",
  title =        "Privacy-supporting cloud computing by in-browser key
                 translation",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "847--880",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130489",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Barthe:2013:VIH,
  author =       "Gilles Barthe and Benjamin Gr{\'e}goire and Sylvain
                 Heraud and Federico Olmedo and Santiago
                 Zanella-B{\'e}guelin",
  title =        "Verified indifferentiable hashing into elliptic
                 curves",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "881--917",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130476",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Acar:2013:CCP,
  author =       "Umut A. Acar and Amal Ahmed and James Cheney and Roly
                 Perera",
  title =        "A core calculus for provenance",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "919--969",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130487",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Centenaro:2013:TBA,
  author =       "Matteo Centenaro and Riccardo Focardi and Flaminia L.
                 Luccio",
  title =        "Type-based analysis of key management in {PKCS\#11}
                 cryptographic devices",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "971--1007",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130479",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2013:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 21 (2013)",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "1009--1012",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2013-21608",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lu:2014:OFR,
  author =       "Haibing Lu and Jaideep Vaidya and Vijayalakshmi
                 Atluri",
  title =        "An optimization framework for role mining",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "1--31",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130484",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:08 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yuen:2014:TCT,
  author =       "Tsz Hon Yuen and Willy Susilo and Yi Mu",
  title =        "Towards a cryptographic treatment of publish\slash
                 subscribe systems",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "33--67",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130486",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:08 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Niu:2014:FVS,
  author =       "Jianwei Niu and Mark Reith and William H.
                 Winsborough",
  title =        "Formal verification of security properties in trust
                 management policy",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "69--153",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130490",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:08 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Peddinti:2014:WSQ,
  author =       "Sai Teja Peddinti and Nitesh Saxena",
  title =        "{Web} search query privacy: Evaluating query
                 obfuscation and anonymizing networks",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "155--199",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130491",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:08 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chatzikokolakis:2014:FAS,
  author =       "Konstantinos Chatzikokolakis and Sebastian Alexander
                 M{\"o}dersheim and Catuscia Palamidessi and Jun Pang",
  title =        "Foundational aspects of security",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "201--202",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140497",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2014:EPP,
  author =       "Joshua D. Guttman",
  title =        "Establishing and preserving protocol security goals",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "203--267",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140499",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ngo:2014:EVC,
  author =       "Tri Minh Ngo and Mari{\"e}lle Stoelinga and Marieke
                 Huisman",
  title =        "Effective verification of confidentiality for
                 multi-threaded programs",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "269--300",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130492",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 http://www.math.utah.edu/pub/tex/bib/multithreading.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Backes:2014:UIR,
  author =       "Michael Backes and C{\u{a}}t{\u{a}}lin Hri{\c{t}}cu
                 and Matteo Maffei",
  title =        "Union, intersection and refinement types and reasoning
                 about type disjointness for secure protocol
                 implementations",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "301--353",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130493",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blundo:2014:EEP,
  author =       "Carlo Blundo and Emiliano {De Cristofaro} and Paolo
                 Gasti",
  title =        "{EsPRESSO}: Efficient privacy-preserving evaluation of
                 sample set similarity",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "355--381",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130482",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:16 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Soupionis:2014:GTA,
  author =       "Yannis Soupionis and Remous-Aris Koutsiamanis and
                 Pavlos Efraimidis and Dimitris Gritzalis",
  title =        "A game-theoretic analysis of preventing spam over
                 {Internet Telephony} via audio {CAPTCHA}-based
                 authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "383--413",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140496",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:16 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bisht:2014:ADP,
  author =       "Prithvi Bisht and Timothy Hinrichs and Nazari Skrupsky
                 and V. N. Venkatakrishnan",
  title =        "Automated detection of parameter tampering
                 opportunities and vulnerabilities in web applications",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "415--465",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140498",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:16 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Desmet:2014:P,
  author =       "Lieven Desmet and Martin Johns and Benjamin Livshits
                 and Andrei Sabelfeld",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "467--468",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140506",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeGroef:2014:SME,
  author =       "Willem {De Groef} and Dominique Devriese and Nick
                 Nikiforakis and Frank Piessens",
  title =        "Secure multi-execution of web scripts: Theory and
                 practice",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "469--509",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130495",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Politz:2014:TBV,
  author =       "Joe Gibbs Politz and Arjun Guha and Shriram
                 Krishnamurthi",
  title =        "Typed-based verification of {Web} sandboxes",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "511--565",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140504",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Heiderich:2014:SAS,
  author =       "M. Heiderich and M. Niemietz and F. Schuster and T.
                 Holz and J. Schwenk",
  title =        "Scriptless attacks: Stealing more pie without touching
                 the sill",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "567--599",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130494",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bansal:2014:DCA,
  author =       "Chetan Bansal and Karthikeyan Bhargavan and Antoine
                 Delignat-Lavaud and Sergio Maffeis",
  title =        "Discovering concrete attacks on website authorization
                 by formal analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "601--657",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:20 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Backes:2014:MGE,
  author =       "Michael Backes and Steve Zdancewic",
  title =        "Message from the {Guest Editors}",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "659--660",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140505",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Basin:2014:OFA,
  author =       "David Basin and Samuel J. Burri and G{\"u}nter
                 Karjoth",
  title =        "Obstruction-free authorization enforcement: Aligning
                 security and business objectives",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "661--698",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140500",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Schlesinger:2014:MPA,
  author =       "Cole Schlesinger and Karthik Pattabiraman and Nikhil
                 Swamy and David Walker and Benjamin Zorn",
  title =        "Modular protections against non-control data attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "699--742",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140502",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Arapinis:2014:SVS,
  author =       "Myrto Arapinis and Joshua Phillips and Eike Ritter and
                 Mark D. Ryan",
  title =        "{StatVerif}: Verification of stateful processes",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "743--821",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140501",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dupressoir:2014:GGP,
  author =       "Fran{\c{c}}ois Dupressoir and Andrew D. Gordon and Jan
                 J{\"u}rjens and David A. Naumann",
  title =        "Guiding a general-purpose {C} verifier to prove
                 cryptographic protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "823--866",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140508",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:24 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Akinyele:2014:MGA,
  author =       "Joseph A. Akinyele and Matthew Green and Susan
                 Hohenberger and Matthew Pagano",
  title =        "Machine-generated algorithms, proofs and software for
                 the batch verification of digital signature schemes",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "867--912",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140507",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Braun:2014:CTM,
  author =       "Johannes Braun and Florian Volk and Jiska Classen and
                 Johannes Buchmann and Max M{\"u}hlh{\"a}user",
  title =        "{CA} trust management for the {Web PKI}",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "913--959",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140509",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Uzun:2014:SAT,
  author =       "Emre Uzun and Vijayalakshmi Atluri and Jaideep Vaidya
                 and Shamik Sural and Anna Lisa Ferrara and Gennaro
                 Parlato and P. Madhusudan",
  title =        "Security analysis for temporal role based access
                 control",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "961--996",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140510",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chen:2014:PUQ,
  author =       "Yen-Chung Chen and Yu-Sung Wu and Wen-Guey Tzeng",
  title =        "Preserving user query privacy in cloud-based security
                 services",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "997--1024",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140520",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Buchmann:2014:TMS,
  author =       "Nicolas Buchmann and Harald Baier",
  title =        "Towards a more secure and scalable verifying {PKI} of
                 {eMRTD}",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "1025--1049",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140522",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2014:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 22 (2014)",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "1051--1054",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2014-22606",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yang:2015:PAA,
  author =       "Ping Yang and Mikhail I. Gofman and Scott D. Stoller
                 and Zijiang Yang",
  title =        "Policy analysis for administrative role based access
                 control without separate administration",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "1--29",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140511",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mitra:2015:GTR,
  author =       "Barsha Mitra and Shamik Sural and Vijayalakshmi Atluri
                 and Jaideep Vaidya",
  title =        "The generalized temporal role mining problem",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "31--58",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140512",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:2015:LAI,
  author =       "Sabrina {De Capitani di Vimercati} and Sara Foresti
                 and Sushil Jajodia and Giovanni Livraga and Stefano
                 Paraboschi and Pierangela Samarati",
  title =        "Loose associations to increase utility in data
                 publishing",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "59--88",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140513",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{AlBouna:2015:ATD,
  author =       "Bechara {Al Bouna} and Chris Clifton and Qutaibah
                 Malluhi",
  title =        "Anonymizing transactional datasets",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "89--106",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140517",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lu:2015:TUO,
  author =       "Haibing Lu and Yuan Hong and Yanjiang Yang and Lian
                 Duan and Nazia Badar",
  title =        "Towards user-oriented {RBAC} model",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "107--129",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140519",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Liu:2015:JSD,
  author =       "Wen Ming Liu and Lingyu Wang and Lei Zhang and Shunzhi
                 Zhu",
  title =        "$k$-jump: A strategy to design publicly-known
                 algorithms for privacy preserving micro-data
                 disclosure",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "131--165",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140514",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bates:2015:AWK,
  author =       "Adam Bates and Kevin R. B. Butler and Micah Sherr and
                 Clay Shields and Patrick Traynor and Dan Wallach",
  title =        "Accountable wiretapping --- or --- {I} know they can
                 hear you now",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "167--195",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140515",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{vanderMeyden:2015:WII,
  author =       "Ron van der Meyden",
  title =        "What, indeed, is intransitive noninterference?",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "197--228",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140516",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Boureanu:2015:PPS,
  author =       "Ioana Boureanu and Aikaterini Mitrokotsa and Serge
                 Vaudenay",
  title =        "Practical and provably secure distance-bounding",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "229--257",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140518",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:36 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gibson-Robinson:2015:VLS,
  author =       "Thomas Gibson-Robinson and Allaa Kamil and Gavin
                 Lowe",
  title =        "Verifying layered security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "259--307",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150526",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dimitrakakis:2015:ELA,
  author =       "Christos Dimitrakakis and Aikaterini Mitrokotsa and
                 Serge Vaudenay",
  title =        "Expected loss analysis for authentication in
                 constrained channels",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "309--329",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140521",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cade:2015:PGI,
  author =       "David Cad{\'e} and Bruno Blanchet",
  title =        "Proved generation of implementations from
                 computationally secure protocol specifications",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "331--402",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150524",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yuan:2015:PPC,
  author =       "Jiawei Yuan and Shucheng Yu",
  title =        "{PCPOR}: Public and constant-cost proofs of
                 retrievability in {cloud1}",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "403--425",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150525",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Alvim:2015:ILD,
  author =       "M{\'a}rio S. Alvim and Miguel E. Andr{\'e}s and
                 Konstantinos Chatzikokolakis and Pierpaolo Degano and
                 Catuscia Palamidessi",
  title =        "On the information leakage of differentially-private
                 mechanisms",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "427--469",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150528",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:43 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shen:2015:DIC,
  author =       "Shiuan-Tzuo Shen and Wen-Guey Tzeng",
  title =        "Delegated integrity check for hierarchical cloud
                 data",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "471--508",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150527",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:43 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bugliesi:2015:CPB,
  author =       "Michele Bugliesi and Stefano Calzavara and Riccardo
                 Focardi and Wilayat Khan",
  title =        "{CookiExt}: Patching the browser against session
                 hijacking attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "509--537",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150529",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:43 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Spalazzi:2015:SIS,
  author =       "Luca Spalazzi and Luca Vigan{\`o}",
  title =        "Special issue on security and high performance
                 computing systems",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "539--540",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150537",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lowden:2015:DPA,
  author =       "Jason Lowden and Marcin {\L}ukowiak and Sonia Lopez
                 Alarcon",
  title =        "Design and performance analysis of efficient {Keccak}
                 tree hashing on {GPU} architectures",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "541--562",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150534",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bella:2015:SSP,
  author =       "Giampaolo Bella and Paul Curzon and Gabriele Lenzini",
  title =        "Service security and privacy as a socio-technical
                 problem",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "563--585",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150536",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dreier:2015:BFP,
  author =       "Jannik Dreier and Jean-Guillaume Dumas and Pascal
                 Lafourcade",
  title =        "{Brandt}'s fully private auction protocol revisited",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "587--610",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150535",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Merlo:2015:MEP,
  author =       "Alessio Merlo and Mauro Migliardi and Paolo
                 Fontanelli",
  title =        "Measuring and estimating power consumption in
                 {Android} to support energy-based intrusion detection",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "611--637",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150530",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2015:RPS,
  author =       "Anonymous",
  title =        "Regular Paper Section",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "639--639",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Belim:2015:AGR,
  author =       "Sergey Belim and Nadezda Bogachenko and Evgeniy
                 Ilushechkin",
  title =        "An analysis of graphs that represent a role-based
                 security policy hierarchy",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "641--657",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150532",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2015:NAC,
  author =       "Jin Li and Xiaofeng Chen and Jingwei Li and Chunfu Jia
                 and Jianfeng Ma and Wenjing Lou",
  title =        "New access control systems based on outsourced
                 attribute-based encryption",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "659--683",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150533",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:51 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Alshehri:2015:FFS,
  author =       "Ali Alshehri and Steve Schneider",
  title =        "A formal framework for security analysis of {NFC}
                 mobile coupon protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "685--707",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150531",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:51 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bonatti:2015:EDR,
  author =       "Piero Bonatti and Clemente Galdi and Davide Torres",
  title =        "Event-driven {RBAC}",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "709--757",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150539",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:51 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mallios:2015:PCE,
  author =       "Yannis Mallios and Lujo Bauer and Dilsun Kaynar and
                 Fabio Martinelli and Charles Morisset",
  title =        "Probabilistic cost enforcement of security policies",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "759--787",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150538",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:51 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2015:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 23 (2015)",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "789--791",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:51 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bohl:2016:SUC,
  author =       "Florian B{\"o}hl and Dominique Unruh",
  title =        "Symbolic universal composability",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "1--38",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140523",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:55 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Rafnsson:2016:SME,
  author =       "Willard Rafnsson and Andrei Sabelfeld",
  title =        "Secure multi-execution: Fine-grained,
                 declassification-aware, and transparent",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "39--90",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150541",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:55 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Luo:2016:MCM,
  author =       "Zhengqin Luo and Jos{\'e} Fragoso Santos and Ana
                 Almeida Matos and Tamara Rezk",
  title =        "{Mashic} compiler: Mashup sandboxing based on
                 inter-frame communication",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "91--136",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160542",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:55 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Carter:2016:SOG,
  author =       "Henry Carter and Benjamin Mood and Patrick Traynor and
                 Kevin Butler",
  title =        "Secure outsourced garbled circuit evaluation for
                 mobile devices",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "137--180",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150540",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hedin:2016:IFS,
  author =       "Daniel Hedin and Luciano Bello and Andrei Sabelfeld",
  title =        "Information-flow security for {JavaScript} and its
                 {APIs}",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "181--234",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160544",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Taglienti:2016:UAP,
  author =       "Claudio Taglienti and James Cannady",
  title =        "The user attribution problem and the challenge of
                 persistent surveillance of user activity in complex
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "235--288",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160546",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chen:2016:PEP,
  author =       "Yu Chen and Zongyang Zhang",
  title =        "Publicly evaluable pseudorandom functions and their
                 applications",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "289--320",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160547",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:59 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Vavilis:2016:SBQ,
  author =       "Sokratis Vavilis and Milan Petkovi{\'c} and Nicola
                 Zannone",
  title =        "A severity-based quantification of data leakages in
                 database systems",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "321--345",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160543",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:2016:EIC,
  author =       "Sabrina {De Capitani di Vimercati} and Sara Foresti
                 and Sushil Jajodia and Stefano Paraboschi and
                 Pierangela Samarati",
  title =        "Efficient integrity checks for join queries in the
                 cloud",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "347--378",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160545",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Le:2016:MCR,
  author =       "Meixing Le and Krishna Kant and Malek Athamnah and
                 Sushil Jajodia",
  title =        "Minimum cost rule enforcement for cooperative database
                 access",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "379--403",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160548",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:31 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jing:2016:TML,
  author =       "Yiming Jing and Gail-Joon Ahn and Hongxin Hu and
                 Haehyun Cho and Ziming Zhao",
  title =        "{TripleMon}: A multi-layer security framework for
                 mediating inter-process communication on {Android}",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "405--426",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160552",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bodei:2016:CAS,
  author =       "Chiara Bodei and Pierpaolo Degano and Letterio
                 Galletta and Francesco Salvatori",
  title =        "Context-aware security: Linguistic mechanisms and
                 static analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "427--477",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160551",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DiCrescenzo:2016:PPP,
  author =       "Giovanni {Di Crescenzo} and Debra L. Cook and Allen
                 McIntosh and Euthimios Panagos",
  title =        "Practical and privacy-preserving information retrieval
                 from a database table",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "479--506",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160550",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kar:2016:SSI,
  author =       "Debabrata Kar and Suvasini Panigrahi and Srikanth
                 Sundararajan",
  title =        "{SQLiDDS}: {SQL} injection detection using document
                 similarity measure",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "507--539",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160554",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:32 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lester:2016:IFA,
  author =       "Martin Lester and Luke Ong and Max Sch{\"a}fer",
  title =        "Information flow analysis for a dynamically typed
                 language with staged metaprogramming",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "541--582",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160557",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:06 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kremer:2016:AAS,
  author =       "Steve Kremer and Robert K{\"u}nnemann",
  title =        "Automated analysis of security protocols with global
                 state",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "583--616",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160556",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:06 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DSouza:2016:MCT,
  author =       "Deepak D'Souza and K. R. Raghavendra",
  title =        "Model-checking trace-based information flow properties
                 for infinite-state systems",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "617--643",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160549",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:06 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sonchack:2016:ELS,
  author =       "John Sonchack and Adam J. Aviv",
  title =        "Exploring large scale security system reproducibility
                 with the {LESS} simulator",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "645--665",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160553",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:06 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Davidson:2016:CSS,
  author =       "Michal Davidson and Tamir Tassa and Ehud Gudes",
  title =        "Content sharing schemes in {DRM} systems with enhanced
                 performance and privacy preservation",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "667--688",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15746",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:07 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{deAmorim:2016:VIF,
  author =       "Arthur Azevedo de Amorim and Nathan Collins and
                 Andr{\'e} DeHon and Delphine Demange and
                 C{\u{a}}t{\u{a}}lin Hri{\c{t}}cu and David Pichardie
                 and Benjamin C. Pierce and Randy Pollack and Andrew
                 Tolmach",
  title =        "A verified information-flow architecture",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "689--734",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15784",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:07 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:2016:UTP,
  author =       "Sushil Jajodia and Noseong Park and Edoardo Serra and
                 V. S. Subrahmanian",
  title =        "Using temporal probabilistic logic for optimal
                 monitoring of security events with limited resources",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "735--791",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160555",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:07 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guanciale:2016:PSM,
  author =       "Roberto Guanciale and Hamed Nemati and Mads Dam and
                 Christoph Baumann",
  title =        "Provably secure memory isolation for {Linux} on
                 {ARM}",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "793--837",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160558",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:07 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2016:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 24 (2016)",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "839--841",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:07 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Halpern:2017:QQP,
  author =       "Joseph Y. Halpern",
  title =        "From qualitative to quantitative proofs of security
                 properties using first-order conditional logic",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "1--19",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15774",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:08 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cortier:2017:FAN,
  author =       "V{\'e}ronique Cortier and Cyrille Wiedling",
  title =        "A formal analysis of the {Norwegian} {E}-voting
                 protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "21--57",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15777",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:08 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wuller:2017:DPP,
  author =       "Stefan W{\"u}ller and Daniel Mayer and Fabian F{\"o}rg
                 and Samuel Sch{\"u}ppen and Benjamin Assadsolimani and
                 Ulrike Meyer and Susanne Wetzel",
  title =        "Designing privacy-preserving interval operations based
                 on homomorphic encryption and secret sharing
                 techniques",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "59--81",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16830",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:08 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Crampton:2017:BOW,
  author =       "Jason Crampton and Gregory Gutin and Daniel Karapetyan
                 and R{\'e}mi Watrigant",
  title =        "The bi-objective workflow satisfiability problem and
                 workflow resiliency",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "83--115",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16849",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:08 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Continella:2017:PAW,
  author =       "Andrea Continella and Michele Carminati and Mario
                 Polino and Andrea Lanzi and Stefano Zanero and Federico
                 Maggi",
  title =        "{Prometheus}: Analyzing {WebInject}-based information
                 stealers",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "117--137",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15773",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:09 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guan:2017:SKE,
  author =       "Albert Guan and Wen-Guey Tzeng",
  title =        "A secret key establishment protocol for wireless
                 networks using noisy channels",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "139--151",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15807",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:09 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lin:2017:SAC,
  author =       "Chung-Yi Lin and Wen-Guey Tzeng",
  title =        "Strategy analysis for cloud storage reliability
                 management based on game theory",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "153--171",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16813",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:09 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Migault:2017:DEI,
  author =       "Daniel Migault and Tobias Guggemos and Sylvain Killian
                 and Maryline Laurent and Guy Pujolle and Jean Philippe
                 Wary",
  title =        "{Diet-ESP}: {IP} layer security for {IoT}",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "173--203",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16857",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:09 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mohamed:2017:SUD,
  author =       "Manar Mohamed and Song Gao and Niharika Sachdeva and
                 Nitesh Saxena and Chengcui Zhang and Ponnurangam
                 Kumaraguru and Paul C. {Van Oorschot}",
  title =        "On the security and usability of dynamic cognitive
                 game {CAPTCHAs}",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "205--230",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16847",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:10 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cheng:2017:SFN,
  author =       "Yao Cheng and Yingjiu Li and Robert Deng and Lingyun
                 Ying and Wei He",
  title =        "A study on a feasible no-root approach on {Android}",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "231--253",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16866",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:10 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{dosSantos:2017:AFE,
  author =       "Daniel Ricardo dos Santos and Silvio Ranise and Luca
                 Compagna and Serena Elisa Ponta",
  title =        "Automatically finding execution scenarios to deploy
                 security-sensitive workflows",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "255--282",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16894",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:10 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Choo:2017:DOS,
  author =       "Euijin Choo and Ting Yu and Min Chi",
  title =        "Detecting opinion spammer groups and spam targets
                 through community discovery and sentiment analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "283--318",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16941",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:10 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}