Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.05",
%%%     date            = "23 September 2019",
%%%     time            = "05:51:48 MDT",
%%%     filename        = "jcompsecur.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "26999 13573 49403 529964",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "BibTeX; bibliography; Journal of Computer
%%%                        Security",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        Journal of Computer Security (CODEN JCSIET,
%%%                        ISSN 0926-227X (print), 1875-8924
%%%                        (electronic)), published by IOS Press.
%%%                        Publication began with volume 1, number 1, in
%%%                        1992, and there are 4 to 6 issues per annual
%%%                        volume, and issues are often combined.
%%%
%%%                        At version 1.05, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             1992 (  20)    2002 (  20)    2012 (  24)
%%%                             1993 (  14)    2003 (  24)    2013 (  30)
%%%                             1994 (   0)    2004 (  30)    2014 (  27)
%%%                             1995 (  20)    2005 (  31)    2015 (  28)
%%%                             1996 (  20)    2006 (  24)    2016 (  23)
%%%                             1997 (  22)    2007 (  24)    2017 (  21)
%%%                             1998 (  12)    2008 (  29)    2018 (  26)
%%%                             1999 (  13)    2009 (  30)    2019 (  19)
%%%                             2000 (  15)    2010 (  41)
%%%                             2001 (  13)    2011 (  37)
%%%
%%%                             Article:        637
%%%
%%%                             Total entries:  637
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{"\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-J-COMP-SECUR          = "Journal of Computer Security"}

%%% ====================================================================
%%% Bibliography entries, sorted in publication order, with
%%% `bibsort -byvolume':
@Article{Jajodia:1992:EPa,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "1--3",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:05 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Meadows:1992:AFM,
  author =       "Catherine Meadows",
  title =        "Applying Formal Methods to the Analysis of a Key
                 Management Protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "5--35",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:05 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{McLean:1992:PNF,
  author =       "John McLean",
  title =        "Proving Noninterference and Functional Correctness
                 Using Traces",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "37--57",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:05 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sandhu:1992:EPS,
  author =       "Ravi S. Sandhu",
  title =        "Expressive Power of the Schematic Protection Model",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "59--98",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:05 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bieber:1992:LVS,
  author =       "Pierre Bieber and Fr{\'e}d{\'e}ric Cuppens",
  title =        "A Logical View of Secure Dependencies",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "99--129",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:05 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1992:CPE,
  author =       "Anonymous",
  title =        "Call for Papers: {European Symposium on Research in
                 Computer Security}",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "131--131",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:05 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sandhu:1992:GEP,
  author =       "Ravi Sandhu",
  title =        "{Guest Editor}'s Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "131--132",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:09 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gupta:1992:TTP,
  author =       "Sarbari Gupta and Virgil D. Gligor",
  title =        "Towards a Theory of Penetration-Resistant Systems and
                 Its Applications",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "133--158",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:09 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Foley:1992:ASN,
  author =       "Simon N. Foley",
  title =        "Aggregation and Separation as Noninterference
                 Properties",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "159--188",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:09 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Motro:1992:UMS,
  author =       "Amihai Motro",
  title =        "A Unified Model for Security and Integrity in
                 Relational Databases",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "189--213",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-1204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:09 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1992:EPb,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "215--215",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lunt:1992:GEP,
  author =       "Teresa F. Lunt and John McLean",
  title =        "{Guest Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "217--218",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wray:1992:ACT,
  author =       "John C. Wray",
  title =        "An Analysis of Covert Timing Channels",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "219--232",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hu:1992:RTC,
  author =       "Wei-Ming Hu",
  title =        "Reducing Timing Channels with Fuzzy Time",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "233--254",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gray:1992:TMF,
  author =       "James W. {Gray III}",
  title =        "Toward a Mathematical Foundation for Information Flow
                 Security",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "255--294",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Tardo:1992:SGA,
  author =       "Joseph J. Tardo and Kannan Alagappan",
  title =        "{SPX}: Global Authentication Using Public Key
                 Certificates",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "295--316",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Syverson:1992:KBS,
  author =       "Paul F. Syverson",
  title =        "Knowledge, Belief, and Semantics in the Analysis of
                 Cryptographic Protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "317--334",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-407",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ammann:1992:ESP,
  author =       "Paul E. Ammann and Ravi S. Sandhu",
  title =        "The Extended Schematic Protection Model",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "335--383",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-408",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jacob:1992:BTA,
  author =       "Jeremy Jacob",
  title =        "Basic Theorems about Security",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "385--411",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-409",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1992:AI,
  author =       "Anonymous",
  title =        "Author Index",
  journal =      j-J-COMP-SECUR,
  volume =       "1",
  number =       "3--4",
  pages =        "413--413",
  month =        "????",
  year =         "1992",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1992-13-410",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1993:EPa,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "85--85",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{McLean:1993:GEP,
  author =       "John McLean and Richard Kemmerer",
  title =        "{Guest Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "87--88",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:1993:RAM,
  author =       "Jonathan K. Millen",
  title =        "A Resource Allocation Model for Denial of Service
                 Protection",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "89--106",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Woo:1993:ADS,
  author =       "Thomas Y. C. Woo and Simon S. Lam",
  title =        "Authorization in Distributed Systems: A New Approach",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "107--136",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gligor:1993:IRA,
  author =       "Virgil D. Gligor and Shyh-Wei Luan and Joseph N.
                 Pato",
  title =        "On Inter-Realm Authentication in Large Distributed
                 Systems",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "137--157",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Epstein:1993:HAW,
  author =       "Jeremy Epstein and John McHugh and Hilarie Orman and
                 Rita Pascale and Ann Marmor-Squires and Bonnie Danner
                 and Charles R. Martin and Martha Branstad and Glenn
                 Benson and Doug Rothnie",
  title =        "A High Assurance Window System Prototype",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "159--190",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yahalom:1993:OAT,
  author =       "Raphael Yahalom",
  title =        "Optimality of Asynchronous Two-Party Secure
                 Data-Exchange Protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "191--209",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-307",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Littlewood:1993:TOM,
  author =       "Bev Littlewood and Sarah Brocklehurst and Norman
                 Fenton and Peter Mellor and Stella Page and David
                 Wright and John Dobson and John McDermid and Dieter
                 Gollmann",
  title =        "Towards Operational Measures of Computer Security",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "211--229",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-308",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Thomas:1993:KAM,
  author =       "Roshan K. Thomas and Ravi S. Sandhu",
  title =        "A Kernelized Architecture for Multilevel Secure
                 Object-Oriented Databases Supporting Write-Up",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "2--3",
  pages =        "231--275",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-22-309",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:17 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:1993:EPb,
  author =       "Jonathan Millen",
  title =        "{Editor}'s Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "4",
  pages =        "277--277",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-2401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Horton:1993:CVP,
  author =       "J. D. Horton and R. H. Cooper and W. F. Hyslop and B.
                 G. Nickerson and O. K. Ward and Robert Harland and
                 Elton Ashby and W. M. Stewart",
  title =        "The Cascade Vulnerability Problem",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "4",
  pages =        "279--290",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-2402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Trostle:1993:MFT,
  author =       "Jonathan T. Trostle",
  title =        "Modelling a Fuzzy Time System",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "4",
  pages =        "291--309",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-2403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:1993:ASC,
  author =       "Vijayalakshmi Atluri and Sushil Jajodia and Elisa
                 Bertino",
  title =        "Achieving Stricter Correctness Requirements in
                 Multilevel Secure Database Management Systems",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "4",
  pages =        "311--351",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-2404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1993:AI,
  author =       "Anonymous",
  title =        "Author Index",
  journal =      j-J-COMP-SECUR,
  volume =       "2",
  number =       "4",
  pages =        "353--354",
  month =        "????",
  year =         "1993",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1993-2405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1995:EPa,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "1--1",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gong:1995:GEP,
  author =       "Li Gong",
  title =        "{Guest Editor}'s Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "3--3",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Focardi:1995:CSP,
  author =       "Riccardo Focardi and Roberto Gorrieri",
  title =        "A Classification of Security Properties for Process
                 Algebras",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "5--33",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:1995:UFC,
  author =       "Jonathan K. Millen",
  title =        "Unwinding Forward Correctability",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "35--54",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bevier:1995:SBA,
  author =       "William R. Bevier and William D. Young",
  title =        "A State-based Approach to Noninterference",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "55--70",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Simmons:1995:RTI,
  author =       "G. J. Simmons and Catherine Meadows",
  title =        "The Role of Trust in Information Integrity Protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "71--84",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:1995:EPb,
  author =       "Jonathan K. Millen",
  title =        "{Editor}'s Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "2--3",
  pages =        "85--85",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-32-301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ammann:1995:CCS,
  author =       "Paul Ammann and Frank Jaeckle and Sushil Jajodia",
  title =        "Concurrency Control in a Secure Multilevel Database
                 via a Two-Snapshot Algorithm",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "2--3",
  pages =        "87--113",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-32-302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kang:1995:TMM,
  author =       "I. E. Kang and T. F. Keefe",
  title =        "Transaction Management for Multilevel Secure
                 Replicated Databases",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "2--3",
  pages =        "115--145",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-32-303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hinke:1995:FAD,
  author =       "Thomas H. Hinke and Harry S. Delugach and Asha
                 Chandrasekhar",
  title =        "A Fast Algorithm for Detecting Second Paths in
                 Database Inference Analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "2--3",
  pages =        "147--168",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-32-304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:1995:EAM,
  author =       "Elisa Bertino and Fabio Origgi and Pierangela
                 Samarati",
  title =        "An Extended Authorization Model for Object Databases",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "2--3",
  pages =        "169--206",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-32-305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Notargiacomo:1995:MMI,
  author =       "LouAnna Notargiacomo and Barbara T. Blaustein and
                 Catherine D. McCollum",
  title =        "Merging Models: Integrity, Dynamic Separation of Duty
                 and Trusted Data Management",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "2--3",
  pages =        "207--230",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-32-306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1995:EPc,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "231--231",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Foley:1995:SSC,
  author =       "Simon N. Foley and Jeremy L. Jacob",
  title =        "Specifying Security for Computer Supported
                 Collaborative Working",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "233--253",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chen:1995:DTA,
  author =       "Liqun Chen and Dieter Gollmann and Christopher J.
                 Mitchell",
  title =        "Distributing Trust Amongst Multiple Authentication
                 Servers",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "255--267",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zakinthinos:1995:CNI,
  author =       "A. Zakinthinos and E. S. Lee",
  title =        "The Composability of Non-Interference",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "269--281",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bishop:1995:TIT,
  author =       "Matt Bishop",
  title =        "Theft of Information in the Take-{Grant} Protection
                 Model",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "283--308",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blundo:1995:MKD,
  author =       "C. Blundo and Luiz A. Frota Mattos and D. R. Stinson",
  title =        "Multiple Key Distribution Maintaining User Anonymity
                 via Broadcast Channels",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "309--322",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1995:CP,
  author =       "Anonymous",
  title =        "Call for Papers",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "323--324",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3407",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1995:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 3",
  journal =      j-J-COMP-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "325--326",
  month =        "????",
  year =         "1995",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1994/1995-3408",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:1996:GEP,
  author =       "Elisa Bertino and G{\'e}rard Eizenberg and Roger M.
                 Needham",
  title =        "Guest-editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "1--2",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{dAusbourg:1996:CCD,
  author =       "Bruno d'Ausbourg and Christel Calas",
  title =        "Controlling causal dependencies over a secure
                 network",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "3--25",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Roscoe:1996:NIT,
  author =       "A. W. Roscoe and J. C. P. Woodcock and L. Wulf",
  title =        "Non-interference through determinism",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "27--53",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Maurer:1996:CSB,
  author =       "Ueli M. Maurer and Pierre E. Schmid",
  title =        "A calculus for security boots trapping in distributed
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "55--80",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jiwa:1996:BAD,
  author =       "Azad Jiwa and Thomas Hardjono and Jennifer Seberry",
  title =        "Beacons for authentication in distributed systems",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "81--96",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hauser:1996:RSP,
  author =       "Ralf Hauser and Philippe Janson and Gene Tsudik and
                 Els {Van Herreweghen} and Refik Molva",
  title =        "Robust and secure password and key change method",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "97--111",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1996:IA,
  author =       "Anonymous",
  title =        "Information for authors",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "113--119",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4107",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1996:EPa,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "121--121",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shieh:1996:DIL,
  author =       "Shiuh-Pyng Shieh and Virgil D. Gligor",
  title =        "Detecting illicit leakage of information in operating
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "123--148",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/061242.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
  keywords =     "information hiding; steganography",
}

@Article{Ammann:1996:EPM,
  author =       "Paul Ammann and Ravi S. Sandhu and Richard Lipton",
  title =        "The expressive power of multi-parent creation in
                 monotonic access control models",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "149--165",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Volpano:1996:STS,
  author =       "Dennis Volpano and Cynthia Irvine and Geoffrey Smith",
  title =        "A sound type system for secure flow analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "167--187",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{McDermott:1996:APC,
  author =       "John McDermott and Ravi Mukkamala",
  title =        "Analytic performance comparison of transaction
                 processing algorithms for the {SINTRA}
                 replicated-architecture database system",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "189--228",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:1996:EPB,
  author =       "Jonathan Millen",
  title =        "{Editor}'s preface to the {Bell--LaPadula} model",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "229--231",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{LaPadula:1996:F,
  author =       "Leonard J. LaPadula",
  title =        "Foreword",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "233--238",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-307",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{LaPadula:1996:MTR,
  author =       "Leonard J. LaPadula and D. Elliott Bell",
  title =        "{MITRE} Technical Report 2547, Volume {II}",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "2--3",
  pages =        "239--263",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-42-308",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:41 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1996:EPb,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "265--265",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Reiter:1996:KMS,
  author =       "Michael K. Reiter and Matthew K. Franklin and John B.
                 Lacy and Rebecca N. Wright",
  title =        "The {$ \Omega $} key management service",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "267--287",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chuang:1996:SAN,
  author =       "Shaw-Cheng Chuang",
  title =        "Securing {ATM} networks",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "289--329",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bishop:1996:CIF,
  author =       "Matt Bishop",
  title =        "Conspiracy and information flow in the {Take-Grant
                 Protection Model}",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "331--359",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1996:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 4 (1996)",
  journal =      j-J-COMP-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "361--362",
  month =        "????",
  year =         "1996",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1996-4405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:1997:GEP,
  author =       "Elisa Bertino and Emilio Montolivo and Helmut Kurth",
  title =        "Guest editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "1--2",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bonatti:1997:MHS,
  author =       "P. A. Bonatti and M. L. Sapino and V. S.
                 Subrahmanian",
  title =        "Merging heterogeneous security orderings",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "3--29",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lotz:1997:TSM,
  author =       "Volkmar Lotz",
  title =        "Threat scenarios as a means to formally develop secure
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "31--67",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Camenisch:1997:DPS,
  author =       "Jan Camenisch and Ueli Maurer and Markus Stadler",
  title =        "Digital payment systems with passive
                 anonymity-revoking trustees",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "69--89",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Asokan:1997:SSS,
  author =       "N. Asokan and G. Tsudik and M. Waidner",
  title =        "Server-supported signatures",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "91--108",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:1997:EP,
  author =       "Sushil Jajodia and Jonathan Millen",
  title =        "{Editors}' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "109--109",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:53 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Merritt:1997:GEP,
  author =       "Michael Merritt",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "111--112",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:53 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Malkhi:1997:HTS,
  author =       "Dahlia Malkhi and Michael Reiter",
  title =        "A high-throughput secure reliable multicast protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "113--127",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:53 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sinclair:1997:ASS,
  author =       "Jane Sinclair",
  title =        "Action systems for security specification",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "129--154",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:53 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:1997:ASE,
  author =       "Sabrina {De Capitani di Vimercati} and Pierangela
                 Samarati",
  title =        "Authorization specification and enforcement in
                 federated database systems",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "155--188",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5205",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:53 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:1997:SIS,
  author =       "Elisa Bertino and Pierangela Samarati and Gian Paolo
                 Rossi",
  title =        "Special issue on Security in the {World Wide Web
                 (WWW)}",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "189--190",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bergadano:1997:SAP,
  author =       "F. Bergadano and B. Crispo and M. Lomas",
  title =        "Strong authentication and privacy with standard
                 browsers",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "191--212",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Quisquater:1997:ASS,
  author =       "Jean-Jacques Quisquater and Marc Joye",
  title =        "Authentication of sequences with the {SL$_2$} hash
                 function: application to video sequences",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "213--223",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bryce:1997:CEI,
  author =       "Ciar{\'a}n Bryce and Winfried K{\"u}hnhauser and
                 R{\'e}my Amouroux and Mauricio L{\'o}pez and Harry
                 Rudnik",
  title =        "{CWASAR}: a {European} infrastructure for secure
                 electronic commerce",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "225--235",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Syverson:1997:PWB,
  author =       "Paul F. Syverson and Michael G. Reed and David M.
                 Goldschlag",
  title =        "Private {Web} browsing",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "237--248",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Roscheisen:1997:NCD,
  author =       "Martin R{\"o}scheisen and Terry Winograd",
  title =        "A network-centric design for relationship-based
                 security and access control",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "249--254",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Winslett:1997:UDC,
  author =       "M. Winslett and N. Ching and V. Jones and I.
                 Slepchin",
  title =        "Using digital credentials on the {World Wide Web}",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "255--267",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5307",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:20:57 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Samarati:1997:GEP,
  author =       "Pierangela Samarati and Ravi Sandhu",
  title =        "Guest editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "269--270",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:01 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Castano:1997:ADG,
  author =       "S. Castano and S. {De Capitani di Vimercati} and M. G.
                 Fugini",
  title =        "Automated derivation of global authorizations for
                 database federations",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "271--301",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:01 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:1997:EMD,
  author =       "Vijayalakshmi Atluri and Wei-Kuang Huang",
  title =        "Enforcing mandatory and discretionary security in
                 workflow management systems",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "303--339",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:01 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Demurjian:1997:TDP,
  author =       "S. A. {Demurjian Sr.} and T. C. Ting",
  title =        "Towards a definitive paradigm for security in
                 object-oriented systems and applications",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "341--382",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:01 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1997:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 5 (1997)",
  journal =      j-J-COMP-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "383--384",
  month =        "????",
  year =         "1997",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1997-5405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:01 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Foley:1998:GEP,
  author =       "Simon N. Foley",
  title =        "Guest editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "1--2",
  pages =        "1--1",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-61-201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:05 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Abadi:1998:SLL,
  author =       "Mart{\'\i}n Abadi",
  title =        "On {SDSI}'s linked local name spaces",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "1--2",
  pages =        "3--21",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-61-202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:05 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gray:1998:PSC,
  author =       "James W. {Gray III} and Kin Fai {Epsilon Ip} and
                 King-Shan Lui",
  title =        "Provable security for cryptographic protocols ---
                 exact analysis and engineering applications",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "1--2",
  pages =        "23--52",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-61-203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:05 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lowe:1998:CCA,
  author =       "Gavin Lowe",
  title =        "{Casper}: A compiler for the analysis of security
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "1--2",
  pages =        "53--84",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-61-204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:05 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Paulson:1998:IAV,
  author =       "Lawrence C. Paulson",
  title =        "The inductive approach to verifying cryptographic
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "1--2",
  pages =        "85--128",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-61-205",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:05 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Matsumoto:1998:HCC,
  author =       "Tsutomu Matsumoto",
  title =        "Human--computer cryptography: An attempt",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "129--149",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-980076",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hofmeyr:1998:IDU,
  author =       "Steven A. Hofmeyr and Stephanie Forrest and Anil
                 Somayaji",
  title =        "Intrusion detection using sequences of system calls",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "151--180",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-980109",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ray:1998:SBT,
  author =       "Indrakshi Ray and Paul Ammann and Sushil Jajodia",
  title =        "A semantic-based transaction processing model for
                 multilevel transactions",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "181--217",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-980108",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Knudsen:1998:SMD,
  author =       "Lars R. Knudsen and Keith M. Martin",
  title =        "In search of multiple domain key recovery",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "219--235",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-6401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Franklin:1998:AML,
  author =       "Matthew K. Franklin and Dahlia Malkhi",
  title =        "Auditable metering with lightweight security",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "237--255",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-6402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Casati:1998:EWA,
  author =       "Fabio Casati and Silvana Castano and Maria Grazia
                 Fugini",
  title =        "Enforcing workflow authorization constraints using
                 triggers",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "257--285",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-6403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:1998:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 6 (1998)",
  journal =      j-J-COMP-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "287--287",
  month =        "????",
  year =         "1998",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1998-6404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:1999:SSI,
  author =       "Jonathan Millen",
  title =        "Special section on Intrusion Detection",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "1--1",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Daniels:1999:IHA,
  author =       "Thomas E. Daniels and Eugene H. Spafford",
  title =        "Identification of host audit data to detect attacks on
                 low-level {IP} vulnerabilities",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "3--35",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Vigna:1999:NNB,
  author =       "Giovanni Vigna and Richard A. Kemmerer",
  title =        "{NetSTAT}: A network-based intrusion detection
                 system",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "37--71",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blundo:1999:NRD,
  author =       "Carlo Blundo and Barbara Masucci",
  title =        "A note on the randomness in dynamic threshold
                 schemes",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "73--85",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Foley:1999:GEP,
  author =       "Simon N. Foley",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "2--3",
  pages =        "87--87",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-72-301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lowe:1999:TCR,
  author =       "Gavin Lowe",
  title =        "Towards a completeness result for model checking of
                 security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "2--3",
  pages =        "89--146",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-72-302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Roscoe:1999:PSP,
  author =       "A. W. Roscoe and P. J. Broadfoot",
  title =        "Proving security protocols with model checkers by data
                 independence techniques",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "2--3",
  pages =        "147--190",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-72-303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Fabrega:1999:SSP,
  author =       "F. Javier Thayer F{\'a}brega and Jonathan C. Herzog
                 and Joshua D. Guttman",
  title =        "Strand spaces: proving security protocols correct",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "2--3",
  pages =        "191--230",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-72-304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Volpano:1999:PNC,
  author =       "Dennis Volpano and Geoffrey Smith",
  title =        "Probabilistic noninterference in a concurrent
                 language",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "2--3",
  pages =        "231--253",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-72-305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lin:1999:GEP,
  author =       "T. Y. Lin",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "255--255",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:1999:SOD,
  author =       "Elisa Bertino and Elena Ferrari",
  title =        "Secure object deletion and garbage collection in
                 multilevel object bases",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "257--285",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gudes:1999:MSI,
  author =       "Ehud Gudes and Martin S. Olivier and Reind P. van de
                 Riet",
  title =        "Modelling, specifying and implementing workflow
                 security in {Cyberspace}",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "287--315",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sandhu:1999:RBA,
  author =       "Ravi Sandhu and Venkata Bhamidipati",
  title =        "Role-based administration of user-role assignment: The
                 {URA97} model and its {Oracle} implementation",
  journal =      j-J-COMP-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "317--342",
  month =        "????",
  year =         "1999",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-1999-7404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lin:2000:GEP,
  author =       "T. Y. Lin",
  title =        "Guest editor's preface",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "1--1",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:27 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:2000:SBE,
  author =       "Vijayalakshmi Atluri and Wei-Kuang Huang and Elisa
                 Bertino",
  title =        "A semantic-based execution model for multilevel secure
                 workflows",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "3--41",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:27 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hale:2000:TBA,
  author =       "John Hale and Jody Threet and Sujeet Shenoi",
  title =        "A ticket-based access control architecture for object
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "43--65",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:27 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Spalka:2000:SNS,
  author =       "Adrian Spalka and Armin B. Cremers",
  title =        "Structured name-spaces in secure databases",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "67--86",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:27 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Deswarte:2000:GEP,
  author =       "Yves Deswarte and Catherine Meadows",
  title =        "Guest editors' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "87--87",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Karjoth:2000:ACS,
  author =       "G{\"u}nter Karjoth",
  title =        "Authorization in {CORBA} Security",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "89--108",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:2000:LBA,
  author =       "Elisa Bertino and Francesco Buccafurri and Elena
                 Ferrari and Pasquale Rullo",
  title =        "A logic-based approach for enforcing access control",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "109--139",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kelsey:2000:SCC,
  author =       "John Kelsey and Bruce Schneier and David Wagner and
                 Chris Hall",
  title =        "Side channel cryptanalysis of product ciphers",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "141--158",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wespi:2000:FVV,
  author =       "Andreas Wespi and Herv{\'e} Debar and Marc Dacier and
                 Mehdi Nassehi",
  title =        "Fixed- vs. variable-length patterns for detecting
                 suspicious process behavior",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "159--181",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Horn:2000:APF,
  author =       "G{\"u}nther Horn and Bart Preneel",
  title =        "Authentication and payment in future mobile systems",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "183--207",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:2000:PNB,
  author =       "Vijayalakshmi Atluri and Wei-Kuang Huang",
  title =        "A {Petri} net based safety analysis of workflow
                 authorization models",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "209--240",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-307",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:2000:GEP,
  author =       "Vijay Atluri and John Hale",
  title =        "{Guest Editor}'s preface",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "241--242",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Liu:2000:ICI,
  author =       "Peng Liu and Sushil Jajodia and Catherine D.
                 McCollum",
  title =        "Intrusion confinement by isolation in information
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "243--279",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Clifton:2000:USS,
  author =       "Chris Clifton",
  title =        "Using sample size to limit exposure to data mining",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "281--307",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:2000:TAB,
  author =       "Elisa Bertino and Piero Andrea Bonatti and Elena
                 Ferrari and Maria Luisa Sapino",
  title =        "Temporal authorization bases: From specification to
                 integration",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "309--353",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-8404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Syverson:2001:GEP,
  author =       "Paul F. Syverson",
  title =        "{Guest Editor}'s preface",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "1--2",
  pages =        "1--2",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-91-201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hui:2001:FPS,
  author =       "Mei Lin Hui and Gavin Lowe",
  title =        "Fault-preserving simplifying transformations for
                 security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "1--2",
  pages =        "3--46",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-91-202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Song:2001:ANA,
  author =       "Dawn Xiaodong Song and Sergey Berezin and Adrian
                 Perrig",
  title =        "{Athena}: a novel approach to efficient automatic
                 security protocol analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "1--2",
  pages =        "47--74",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-91-203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ryan:2001:PAN,
  author =       "P. Y. A. Ryan and S. A. Schneider",
  title =        "Process algebra and non-interference",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "1--2",
  pages =        "75--103",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-91-204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Halpern:2001:LSL,
  author =       "Joseph Y. Halpern and Ron van der Meyden",
  title =        "A logic for {SDSI}'s linked local name spaces",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "1--2",
  pages =        "105--142",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-91-205",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Meadows:2001:CBF,
  author =       "Catherine Meadows",
  title =        "A cost-based framework for analysis of denial of
                 service in networks",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "1--2",
  pages =        "143--164",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-91-206",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:2001:MST,
  author =       "Sushil Jajodia and Vijayalakshmi Atluri and Thomas F.
                 Keefe and Catherine D. McCollum and Ravi Mukkamala",
  title =        "Multilevel secure transaction processing",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "165--195",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Paulson:2001:RBS,
  author =       "Lawrence C. Paulson",
  title =        "Relations between secrets: two formal analyses of the
                 {Yahalom} protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "197--216",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Besson:2001:MCS,
  author =       "Fr{\'e}d{\'e}ric Besson and Thomas Jensen and Daniel
                 {Le M{\'e}tayer} and Tommy Thorn",
  title =        "Model checking security properties of control flow
                 graphs",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "217--250",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:2001:GIP,
  author =       "Sabrina {De Capitani di Vimercati} and Patrick Lincoln
                 and Livio Ricciulli and Pierangela Samarati",
  title =        "Global infrastructure protection system",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "251--283",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Clarke:2001:CCD,
  author =       "Dwaine Clarke and Jean-Emile Elien and Carl Ellison
                 and Matt Fredette and Alexander Morcos and Ronald L.
                 Rivest",
  title =        "Certificate chain discovery in {SPKI\slash SDSI}",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "285--322",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wright:2001:DGM,
  author =       "Rebecca N. Wright and Patrick D. Lincoln and Jonathan
                 K. Millen",
  title =        "Depender graphs: A method of fault-tolerant
                 certificate distribution",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "323--338",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2001:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 9 (2001)",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "339--340",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Frincke:2002:GEP,
  author =       "Deborah Frincke",
  title =        "{Guest Editor}'s preface",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "1--3",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lee:2002:TCS,
  author =       "Wenke Lee and Wei Fan and Matthew Miller and Salvatore
                 J. Stolfo and Erez Zadok",
  title =        "Toward cost-sensitive modeling for intrusion detection
                 and response",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "5--22",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kerschbaum:2002:UIS,
  author =       "Florian Kerschbaum and Eugene H. Spafford and Diego
                 Zamboni",
  title =        "Using internal sensors and embedded detectors for
                 intrusion detection",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "23--70",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Eckmann:2002:SAL,
  author =       "Steven T. Eckmann and Giovanni Vigna and Richard A.
                 Kemmerer",
  title =        "{STATL}: An attack language for state-based intrusion
                 detection",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "71--103",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Staniford:2002:PAD,
  author =       "Stuart Staniford and James A. Hoagland and Joseph M.
                 McAlerney",
  title =        "Practical automated detection of stealthy portscans",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "105--136",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-205",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2002:EPA,
  author =       "Yingjiu Li and Ningning Wu and X. Sean Wang and Sushil
                 Jajodia",
  title =        "Enhancing profiles for anomaly detection using time
                 granularities",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "137--157",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-206",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Spinellis:2002:PID,
  author =       "Diomidis Spinellis and Dimitris Gritzalis",
  title =        "Panoptis: Intrusion detection using a domain-specific
                 language",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "159--176",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-207",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yasinsac:2002:ESP,
  author =       "Alec Yasinsac",
  title =        "An environment for security protocol intrusion
                 detection",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "177--188",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-208",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ramakrishnan:2002:MBA,
  author =       "C. R. Ramakrishnan and R. Sekar",
  title =        "Model-based analysis of configuration
                 vulnerabilities",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "1--2",
  pages =        "189--209",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-101-209",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:49 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:2002:GEP,
  author =       "Sushil Jajodia and Dimitris Gritzalis",
  title =        "{Guest Editor}s' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "211--211",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Levine:2002:HMB,
  author =       "Brian Neil Levine and Clay Shields",
  title =        "Hordes: a multicast based protocol for anonymity",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "213--240",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bonatti:2002:UFR,
  author =       "Piero A. Bonatti and Pierangela Samarati",
  title =        "A uniform framework for regulating service access and
                 information release on the {Web}",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "241--271",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Buldas:2002:ECA,
  author =       "Ahto Buldas and Peeter Laud and Helger Lipmaa",
  title =        "Eliminating counterevidence with applications to
                 accountable certificate management",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "273--296",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wright:2002:DGM,
  author =       "Rebecca N. Wright and Patrick D. Lincoln and Jonathan
                 K. Millen",
  title =        "Depender graphs: A method of fault-tolerant
                 certificate distribution",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "297--297",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cuppens:2002:GEP,
  author =       "Fr{\'e}d{\'e}ric Cuppens",
  title =        "{Guest Editor}'s preface",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "299--300",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Brose:2002:MAC,
  author =       "Gerald Brose",
  title =        "Manageable access control for {CORBA}",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "301--337",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Schellhorn:2002:VFS,
  author =       "Gerhard Schellhorn and Wolfgang Reif and Axel Schairer
                 and Paul Karger and Vernon Austel and David Toll",
  title =        "Verified formal security models for multiapplicative
                 smart cards",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "339--367",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bieber:2002:CSI,
  author =       "P. Bieber and J. Cazin and P. Girard and J.-L. Lanet
                 and V. Wiels and G. Zanon",
  title =        "Checking secure interactions of smart card applets:
                 extended version",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "369--398",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Welch:2002:URM,
  author =       "Ian Welch and Robert J. Stroud",
  title =        "Using reflection as a mechanism for enforcing security
                 policies on compiled code",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "399--432",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2002:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 10 (2002)",
  journal =      j-J-COMP-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "433--434",
  month =        "????",
  year =         "2002",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2002-10406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Iheagwara:2003:CEE,
  author =       "Charles Iheagwara and Andrew Blyth and Mukesh
                 Singhal",
  title =        "A comparative experimental evaluation study of
                 intrusion detection system performance in a gigabit
                 environment",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "1--33",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:02 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2003:DCC,
  author =       "Ninghui Li and William H. Winsborough and John C.
                 Mitchell",
  title =        "Distributed credential chain discovery in trust
                 management",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "35--86",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:02 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bella:2003:IVS,
  author =       "Giampaolo Bella",
  title =        "Inductive verification of smart card protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "87--132",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:02 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Syverson:2003:GEP,
  author =       "Paul F. Syverson",
  title =        "{Guest Editor}'s preface",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "133--133",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sewell:2003:SCU,
  author =       "Peter Sewell and Jan Vitek",
  title =        "Secure composition of untrusted code: box $ \pi $,
                 wrappers, and causality types",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "135--187",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cohen:2003:FOV,
  author =       "Ernie Cohen",
  title =        "First-order verification of cryptographic protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "189--216",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Heather:2003:HPT,
  author =       "James Heather and Gavin Lowe and Steve Schneider",
  title =        "How to prevent type flaw attacks on security
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "217--244",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kakkar:2003:RAS,
  author =       "Pankaj Kakkar and Carl A. Gunter and Mart{\'\i}n
                 Abadi",
  title =        "Reasoning about secrecy for active networks",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "245--287",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11205",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Thuraisingham:2003:GEP,
  author =       "Bhavani Thuraisingham and Reind van de Riet",
  title =        "{Guest Editor}s' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "289--289",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Devanbu:2003:ADP,
  author =       "Premkumar Devanbu and Michael Gertz and Charles Martel
                 and Stuart G. Stubblebine",
  title =        "Authentic data publication over the {Internet}",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "291--314",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Barbara:2003:CBC,
  author =       "Daniel Barbar{\'a} and Rajni Goel and Sushil Jajodia",
  title =        "A checksum-based corruption detection technique",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "315--329",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hale:2003:PAC,
  author =       "John Hale and Mauricio Papa and Sujeet Shenoi",
  title =        "Programmable access control",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "331--351",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Teepe:2003:WAS,
  author =       "Wouter Teepe and Reind van de Riet and Martin
                 Olivier",
  title =        "{WorkFlow} analyzed for security and privacy in using
                 databases",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "353--363",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Altenschmidt:2003:SMR,
  author =       "C. Altenschmidt and J. Biskup and U. Flegel and Y.
                 Karabulut",
  title =        "Secure mediation: requirements, design, and
                 architecture",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "365--398",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kremer:2003:GBV,
  author =       "Steve Kremer and Jean-Fran{\c{c}}ois Raskin",
  title =        "A game-based verification of non-repudiation and fair
                 exchange protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "399--429",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11307",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Campbell:2003:ECP,
  author =       "Katherine Campbell and Lawrence A. Gordon and Martin
                 P. Loeb and Lei Zhou",
  title =        "The economic cost of publicly announced information
                 security breaches: empirical evidence from the stock
                 market",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "431--448",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11308",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Schneider:2003:GEP,
  author =       "Steve Schneider",
  title =        "{Guest Editor}'s preface",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "449--450",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gordon:2003:ATS,
  author =       "Andrew D. Gordon and Alan Jeffrey",
  title =        "Authenticity by typing for security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "451--519",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sumii:2003:LRE,
  author =       "Eijiro Sumii and Benjamin C. Pierce",
  title =        "Logical relations for encryption",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "521--554",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pereira:2003:SAU,
  author =       "Olivier Pereira and Jean-Jacques Quisquater",
  title =        "Some attacks upon authenticated group key agreement
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "555--580",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Halpern:2003:LRS,
  author =       "Joseph Y. Halpern and Ron van der Meyden",
  title =        "A logical reconstruction of {SPKI}",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "581--613",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mantel:2003:UAS,
  author =       "Heiko Mantel and Andrei Sabelfeld",
  title =        "A unifying approach to the security of distributed and
                 multi-threaded programs",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "615--676",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 https://www.math.utah.edu/pub/tex/bib/multithreading.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Durgin:2003:CLP,
  author =       "Nancy Durgin and John Mitchell and Dusko Pavlovic",
  title =        "A compositional logic for proving security properties
                 of protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "677--721",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11407",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2003:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 11 (2003)",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "723--725",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11408",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2004:GEP,
  author =       "Joshua Guttman",
  title =        "{Guest Editor}'s preface",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "1--1",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hughes:2004:IHA,
  author =       "Dominic Hughes and Vitaly Shmatikov",
  title =        "Information hiding, anonymity and privacy: a modular
                 approach",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "3--36",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DiPierro:2004:ANI,
  author =       "Alessandra {Di Pierro} and Chris Hankin and Herbert
                 Wiklicky",
  title =        "Approximate non-interference",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "37--81",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lowe:2004:APS,
  author =       "Gavin Lowe",
  title =        "Analysing protocols subject to guessing attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "83--97",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Micciancio:2004:CTA,
  author =       "Daniele Micciancio and Bogdan Warinschi",
  title =        "Completeness theorems for the {Abadi--Rogaway}
                 language of encrypted expressions",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "99--129",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 https://www.math.utah.edu/pub/tex/bib/sgml2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chander:2004:RTM,
  author =       "Ajay Chander and Drew Dean and John C. Mitchell",
  title =        "Reconstructing trust management",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "131--164",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ourston:2004:CIA,
  author =       "Dirk Ourston and Sara Matzner and William Stump and
                 Bryan Hopkins",
  title =        "Coordinated {Internet} attacks: responding to attack
                 complexity",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "165--190",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Aldini:2004:PAA,
  author =       "Alessandro Aldini and Mario Bravetti and Roberto
                 Gorrieri",
  title =        "A process-algebraic approach for the analysis of
                 probabilistic noninterference",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "191--245",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Durgin:2004:MRC,
  author =       "Nancy Durgin and Patrick Lincoln and John Mitchell and
                 Andre Scedrov",
  title =        "Multiset rewriting and the complexity of bounded
                 security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "247--311",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Schneider:2004:GEP,
  author =       "Steve Schneider",
  title =        "{Guest Editor}'s preface",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "313--315",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jha:2004:MCS,
  author =       "S. Jha and T. Reps",
  title =        "Model checking {SPKI\slash SDSI}",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "317--353",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shmatikov:2004:PAA,
  author =       "Vitaly Shmatikov",
  title =        "Probabilistic analysis of an anonymity system",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "355--377",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Broadfoot:2004:EAW,
  author =       "P. J. Broadfoot and A. W. Roscoe",
  title =        "Embedding agents within the intruder to detect
                 parallel attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "379--408",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2004:ATD,
  author =       "Joshua D. Guttman",
  title =        "Authentication tests and disjoint encryption: A design
                 method for security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "409--433",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gordon:2004:TEA,
  author =       "Andrew D. Gordon and Alan Jeffrey",
  title =        "Types and effects for asymmetric cryptographic
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "435--483",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Duggan:2004:TBC,
  author =       "Dominic Duggan",
  title =        "Type-based cryptographic operations",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "485--550",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-407",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Buttyan:2004:FMR,
  author =       "Levente Butty{\'a}n and Jean-Pierre Hubaux and Srdjan
                 {\v{C}}apkun",
  title =        "A formal model of rational exchange and its
                 application to the analysis of {Syverson}'s protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "551--587",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-408",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Backes:2004:PL,
  author =       "Michael Backes and Birgit Pfitzmann and Michael
                 Waidner and Michael Steiner",
  title =        "Polynomial liveness",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "589--617",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-409",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lowe:2004:DIF,
  author =       "Gavin Lowe",
  title =        "Defining information flow quantity",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "619--653",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-410",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wang:2004:CBI,
  author =       "Lingyu Wang and Duminda Wijesekera and Sushil
                 Jajodia",
  title =        "Cardinality-based inference control in data cubes",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "655--692",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12501",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DiPietro:2004:KMH,
  author =       "Roberto {Di Pietro} and Luigi V. Mancini and
                 Alessandro Mei",
  title =        "Key management for high bandwidth secure multicast",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "693--709",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12502",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cho:2004:GKR,
  author =       "Taenam Cho and Sang-Ho Lee and Won Kim",
  title =        "A group key recovery mechanism based on logical key
                 hierarchy",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "711--736",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhang:2004:RAR,
  author =       "Jian Zhang and Jian Gong and Yong Ding",
  title =        "Research on automated rollbackability of intrusion
                 response",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "737--751",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12504",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Buchholz:2004:PPO,
  author =       "Florian P. Buchholz and Clay Shields",
  title =        "Providing process origin information to aid in
                 computer forensic investigations",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "753--776",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12505",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Iheagwara:2004:CEM,
  author =       "Charles Iheagwara and Andrew Blyth and Mukesh
                 Singhal",
  title =        "Cost effective management frameworks for intrusion
                 detection systems",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "777--798",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12506",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:2004:CWS,
  author =       "Vijayalakshmi Atluri and Soon Ae Chun and Pietro
                 Mazzoleni",
  title =        "{Chinese} wall security for decentralized workflow
                 management systems",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "799--840",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12601",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Devanbu:2004:FAX,
  author =       "Premkumar Devanbu and Michael Gertz and April Kwong
                 and Charles Martel and Glen Nuckolls and Stuart G.
                 Stubblebine",
  title =        "Flexible authentication of {XML} documents",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "841--864",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12602",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2004:FAP,
  author =       "Joshua D. Guttman and F. Javier Thayer and Lenore D.
                 Zuck",
  title =        "The faithfulness of abstract protocol analysis:
                 Message authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "865--891",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12603",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Meadows:2004:FSA,
  author =       "Catherine Meadows and Paul Syverson and Iliano
                 Cervesato",
  title =        "Formal specification and analysis of the {Group Domain
                 of Interpretation Protocol} using {NPATRL} and the {NRL
                 Protocol Analyzer}",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "893--931",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12604",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2004:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 12 (2004)",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "933--935",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12605",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gorrieri:2005:GEP,
  author =       "Roberto Gorrieri",
  title =        "{Guest Editor}'s preface",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "1--2",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bistarelli:2005:RMR,
  author =       "Stefano Bistarelli and Iliano Cervesato and Gabriele
                 Lenzini and Fabio Martinelli",
  title =        "Relating multiset rewriting and process algebras for
                 security protocol analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "3--47",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bodei:2005:CSP,
  author =       "Chiara Bodei and Pierpaolo Degano and Corrado Priami",
  title =        "Checking security policies through an enhanced
                 {Control Flow Analysis}",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "49--85",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bugliesi:2005:NIP,
  author =       "Michele Bugliesi and Sabina Rossi",
  title =        "Non-interference proof techniques for the analysis of
                 cryptographic protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "87--113",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2005:VIF,
  author =       "Joshua D. Guttman and Amy L. Herzog and John D.
                 Ramsdell and Clement W. Skorupka",
  title =        "Verifying information flow goals in {Security-Enhanced
                 Linux}",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "115--134",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ramanujam:2005:DCE,
  author =       "R. Ramanujam and S. P. Suresh",
  title =        "Decidability of context-explicit security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "135--165",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shmatikov:2005:RBT,
  author =       "Vitaly Shmatikov and Carolyn Talcott",
  title =        "Reputation-based trust management",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "167--190",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13107",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bertino:2005:ACU,
  author =       "E. Bertino and E. Ferrari and G. Mella",
  title =        "An approach to cooperative updates of {XML} documents
                 in distributed systems",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "191--242",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:44 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zuquete:2005:EHQ,
  author =       "Andr{\'e} Z{\'u}quete",
  title =        "An efficient high quality random number generator for
                 multi-programmed systems",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "243--263",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:44 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://dl.acm.org/citation.cfm?id=1077819.1077821",
  acknowledgement = ack-nhfb,
  acmid =        "1077821",
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
  keywords =     "operating systems; Pentium processors; random number
                 generators; time samples",
  pagecount =    "21",
}

@Article{Cervesato:2005:CBS,
  author =       "Iliano Cervesato and Nancy A. Durgin and Patrick D.
                 Lincoln and John C. Mitchell and Andre Scedrov",
  title =        "A comparison between strand spaces and multiset
                 rewriting for security protocol analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "265--316",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:44 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Heather:2005:DPE,
  author =       "James Heather and Steve Schneider",
  title =        "A decision procedure for the existence of a rank
                 function",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "317--344",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:44 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Focardi:2005:GEP,
  author =       "Riccardo Focardi",
  title =        "{Guest Editor}'s preface",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "345--345",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bodei:2005:SVS,
  author =       "Chiara Bodei and Mikael Buchholtz and Pierpaolo Degano
                 and Flemming Nielson and Hanne Riis Nielson",
  title =        "Static validation of security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "347--390",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bossi:2005:IFS,
  author =       "Annalisa Bossi and Damiano Macedonio and Carla Piazza
                 and Sabina Rossi",
  title =        "Information flow in secure contexts",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "391--422",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Datta:2005:DSC,
  author =       "Anupam Datta and Ante Derek and John C. Mitchell and
                 Dusko Pavlovic",
  title =        "A derivation system and compositional logic for
                 security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "423--482",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Halpern:2005:AIH,
  author =       "Joseph Y. Halpern and Kevin R. O'Neill",
  title =        "Anonymity and information hiding in multiagent
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "483--514",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:2005:SPAa,
  author =       "Jonathan Millen and Vitaly Shmatikov",
  title =        "Symbolic protocol analysis with an {Abelian} group
                 operator or {Diffie--Hellman} exponentiation",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "515--564",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Warinschi:2005:CAN,
  author =       "Bogdan Warinschi",
  title =        "A computational analysis of the
                 {Needham--Schroeder--(Lowe)} protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "565--591",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13307",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Vaidya:2005:SSI,
  author =       "Jaideep Vaidya and Chris Clifton",
  title =        "Secure set intersection cardinality with application
                 to association rule mining",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "593--622",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yu:2005:SUI,
  author =       "Meng Yu and Peng Liu and Wanyu Zang",
  title =        "Specifying and using intrusion masking models to
                 process distributed operations",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "623--658",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Stolfo:2005:CET,
  author =       "Salvatore J. Stolfo and Frank Apap and Eleazar Eskin
                 and Katherine Heller and Shlomo Hershkop and Andrew
                 Honig and Krysta Svore",
  title =        "A comparative evaluation of two algorithms for
                 {Windows Registry Anomaly Detection}",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "659--693",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millen:2005:SPAb,
  author =       "Jonathan Millen and Vitaly Shmatikov",
  title =        "Symbolic protocol analysis with an {Abelian} group
                 operator or {Diffie--Hellman} exponentiation",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "695--695",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bella:2005:GEP,
  author =       "Giampaolo Bella and Peter Ryan",
  title =        "{Guest Editors}' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "697--697",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13501",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bistarelli:2005:SCB,
  author =       "Stefano Bistarelli and Simon N. Foley and Barry
                 O'Sullivan",
  title =        "A soft constraint-based approach to the cascade
                 vulnerability problem",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "699--720",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13502",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Collberg:2005:SWF,
  author =       "Christian Collberg and Tapas Ranjan Sahoo",
  title =        "Software watermarking in the frequency domain:
                 Implementation, analysis, and attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "721--755",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nenadic:2005:RBV,
  author =       "Aleksandra Nenadi{\'c} and Ning Zhang and Qi Shi",
  title =        "{RSA-based Verifiable and Recoverable Encryption of
                 Signatures} and its application in certified e-mail
                 delivery",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "757--777",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13504",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Siaterlis:2005:OSA,
  author =       "Christos Siaterlis and Vasilis Maglaris",
  title =        "One step ahead to multisensor data fusion for {DDoS}
                 detection",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "779--806",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13505",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Molsa:2005:MDS,
  author =       "Jarmo M{\"o}ls{\"a}",
  title =        "Mitigating denial of service attacks: A tutorial",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "807--837",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13601",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:00 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sherwood:2005:PPS,
  author =       "Rob Sherwood and Bobby Bhattacharjee and Aravind
                 Srinivasan",
  title =        "{P5}: A protocol for scalable anonymous
                 communication",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "839--876",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13602",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:00 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pescape:2005:EAA,
  author =       "Antonio Pescap{\`e} and Giorgio Ventre",
  title =        "Experimental analysis of attacks against intradomain
                 routing protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "877--903",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13603",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:00 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2005:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 13 (2005)",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "905--907",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13604",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:00 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cortier:2006:SAP,
  author =       "V{\'e}ronique Cortier and St{\'e}phanie Delaune and
                 Pascal Lafourcade",
  title =        "A survey of algebraic properties used in cryptographic
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "1--43",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cimato:2006:UMU,
  author =       "Stelvio Cimato and Antonella Cresti and Paolo D'Arco",
  title =        "A unified model for unconditionally secure key
                 distribution",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "45--64",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Focardi:2006:IFS,
  author =       "Riccardo Focardi and Sabina Rossi",
  title =        "Information flow security in dynamic contexts",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "65--110",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Focardi:2006:P,
  author =       "Riccardo Focardi",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "111--111",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Braghin:2006:RBA,
  author =       "Chiara Braghin and Daniele Gorla and Vladimiro
                 Sassone",
  title =        "Role-based access control for a distributed calculus",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "113--155",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Myers:2006:ERD,
  author =       "Andrew C. Myers and Andrei Sabelfeld and Steve
                 Zdancewic",
  title =        "Enforcing Robust Declassification and Qualified
                 Robustness",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "157--196",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pereira:2006:IBS,
  author =       "Olivier Pereira and Jean-Jacques Quisquater",
  title =        "On the impossibility of building secure {Cliques}-type
                 authenticated group key agreement protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "197--246",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Goto:2006:P,
  author =       "Atsuhiro Goto",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "247--247",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Candebat:2006:SPM,
  author =       "Thibault Candebat and David Gray",
  title =        "Secure pseudonym management using mediated
                 identity-based encryption",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "249--267",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bhargav-Spantzel:2006:EPD,
  author =       "Abhilasha Bhargav-Spantzel and Anna C. Squicciarini
                 and Elisa Bertino",
  title =        "Establishing and protecting digital identity in
                 federation systems",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "269--300",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhu:2006:GEG,
  author =       "Sencun Zhu and Sanjeev Setia and Shouhuai Xu and
                 Sushil Jajodia",
  title =        "{GKMPAN}: An Efficient Group Rekeying Scheme for
                 Secure Multicast in Ad-Hoc Networks",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "301--325",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Eamani:2006:LBP,
  author =       "Arun K. Eamani and A. Prasad Sistla",
  title =        "Language based policy analysis in a {SPKI} Trust
                 Management System",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "327--357",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Xia:2006:EWD,
  author =       "Jianhong Xia and Sarma Vangala and Jiang Wu and Lixin
                 Gao and Kevin Kwiat",
  title =        "Effective worm detection for various scan techniques",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "359--387",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhou:2006:P,
  author =       "Jianying Zhou and Meng-Chow Kang",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "389--390",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14501",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Price:2006:PKI,
  author =       "Geraint Price",
  title =        "Public Key Infrastructures: A research agenda",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "391--417",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14502",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lippert:2006:LCM,
  author =       "M. Lippert and V. Karatsiolis and A. Wiesmaier and J.
                 Buchmann",
  title =        "Life-cycle management of {X.509} certificates based on
                 {LDAP} directories",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "419--439",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wang:2006:GNR,
  author =       "Guilin Wang",
  title =        "Generic non-repudiation protocols supporting
                 transparent off-line {TTP}",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "441--467",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14504",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lopez:2006:UPK,
  author =       "Javier Lopez",
  title =        "Unleashing public-key cryptography in wireless sensor
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "469--482",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14505",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{McDaniel:2006:EPA,
  author =       "Patrick McDaniel and Atul Prakash",
  title =        "Enforcing provisioning and authorization policy in the
                 {Antigone} system",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "483--511",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14601",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blyth:2006:PRT,
  author =       "Andrew Blyth and Paula Thomas",
  title =        "Performing real-time threat assessment of security
                 incidents using data fusion of {IDS} logs",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "513--534",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14602",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Aimeur:2006:BEC,
  author =       "Esma A{\"\i}meur and Gilles Brassard and Flavien Serge
                 Mani Onana",
  title =        "Blind Electronic Commerce",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "535--559",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14603",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Norman:2006:APC,
  author =       "Gethin Norman and Vitaly Shmatikov",
  title =        "Analysis of probabilistic contract signing",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "561--589",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14604",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Smith:2006:ITP,
  author =       "Geoffrey Smith",
  title =        "Improved typings for probabilistic noninterference in
                 a multi-threaded language",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "591--623",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14605",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 https://www.math.utah.edu/pub/tex/bib/multithreading.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2006:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 14 (2006)",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "625--626",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14606",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:23 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2007:MGE,
  author =       "Anonymous",
  title =        "Message from the {Guest Editors}",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "1--2",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zouridaki:2007:HQT,
  author =       "Charikleia Zouridaki and Brian L. Mark and Marek Hejmo
                 and Roshan K. Thomas",
  title =        "{Hermes}: A quantitative trust establishment framework
                 for reliable data packet delivery in {MANETs}",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "3--38",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Raya:2007:SVA,
  author =       "Maxim Raya and Jean-Pierre Hubaux",
  title =        "Securing vehicular ad hoc networks",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "39--68",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chan:2007:SSI,
  author =       "Haowen Chan and Adrian Perrig and Bartosz Przydatek
                 and Dawn Song",
  title =        "{SIA}: Secure information aggregation in sensor
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "69--102",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Radosavac:2007:DIM,
  author =       "S. Radosavac and Alvaro A. C{\'a}rdenas and John S.
                 Baras and George V. Moustakides",
  title =        "Detecting {IEEE 802.11 MAC} layer misbehavior in ad
                 hoc networks: Robust strategies against individual and
                 colluding attackers",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "103--128",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Xu:2007:SGC,
  author =       "Shouhuai Xu",
  title =        "On the security of group communication schemes",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "129--169",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zanin:2007:RRD,
  author =       "Giorgio Zanin and Roberto {Di Pietro} and Luigi V.
                 Mancini",
  title =        "Robust {RSA} distributed signatures for large-scale
                 long-lived ad hoc networks",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "171--196",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15107",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:27 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Casola:2007:PBM,
  author =       "Valentina Casola and Antonino Mazzeo and Nicola
                 Mazzocca and Valeria Vittorini",
  title =        "A policy-based methodology for security evaluation: A
                 Security Metric for Public Key Infrastructures",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "197--229",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:30 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Tripunitara:2007:TCE,
  author =       "Mahesh V. Tripunitara and Ninghui Li",
  title =        "A theory for comparing the expressive power of access
                 control models",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "231--272",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:30 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Skormin:2007:PIA,
  author =       "V. Skormin and A. Volynkin and D. Summerville and J.
                 Moronski",
  title =        "Prevention of information attacks by run-time
                 detection of self-replication in computer codes",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "273--302",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:30 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wehner:2007:AWN,
  author =       "Stephanie Wehner",
  title =        "Analyzing worms and network traffic using
                 compression",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "303--320",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Clark:2007:SAQ,
  author =       "David Clark and Sebastian Hunt and Pasquale
                 Malacaria",
  title =        "A static analysis for quantifying information flow in
                 a simple imperative language",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "321--371",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bossi:2007:CIF,
  author =       "Annalisa Bossi and Carla Piazza and Sabina Rossi",
  title =        "Compositional information flow security for concurrent
                 programs",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "373--416",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wang:2007:PBI,
  author =       "Lingyu Wang and Yingjiu Li and Sushil Jajodia and
                 Duminda Wijesekera",
  title =        "Parity-based inference control for multi-dimensional
                 range sum queries",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "417--445",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:38 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Skalka:2007:RMD,
  author =       "Christian Skalka and X. Sean Wang and Peter Chapin",
  title =        "Risk management for distributed authorization",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "447--489",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:38 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Goto:2007:P,
  author =       "Atsuhiro Goto",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "491--491",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15501",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:42 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bhargav-Spantzel:2007:UCT,
  author =       "Abhilasha Bhargav-Spantzel and Jan Camenisch and
                 Thomas Gross and Dieter Sommer",
  title =        "User centricity: A taxonomy and open issues",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "493--527",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15502",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:42 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bhargav-Spantzel:2007:PPM,
  author =       "Abhilasha Bhargav-Spantzel and Anna C. Squicciarini
                 and Shimon Modi and Matthew Young and Elisa Bertino and
                 Stephen J. Elliott",
  title =        "Privacy preserving multi-factor authentication with
                 biometrics",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "529--560",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:42 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Backes:2007:P,
  author =       "Michael Backes and David Basin and Michael Waidner",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "561--561",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15601",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bugliesi:2007:DTA,
  author =       "Michele Bugliesi and Riccardo Focardi and Matteo
                 Maffei",
  title =        "Dynamic types for authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "563--617",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15602",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Corin:2007:TAS,
  author =       "R. Corin and S. Etalle and P. H. Hartel and A. Mader",
  title =        "Timed analysis of security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "619--645",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15603",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Barthe:2007:SIF,
  author =       "Gilles Barthe and Leonor Prensa Nieto",
  title =        "Secure information flow for a concurrent language with
                 scheduling",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "647--689",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15604",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Uribe:2007:AAF,
  author =       "Tom{\'a}s E. Uribe and Steven Cheung",
  title =        "Automatic analysis of firewall and network intrusion
                 detection system configurations",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "691--715",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15605",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2007:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 15 (2007)",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "717--719",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15606",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhang:2008:SVA,
  author =       "Nan Zhang and Mark Ryan and Dimitar P. Guelev",
  title =        "Synthesising verified access control systems through
                 model checking",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "1--61",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:48 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Krukow:2008:LFH,
  author =       "Karl Krukow and Mogens Nielsen and Vladimiro Sassone",
  title =        "A logical framework for history-based access control
                 and reputation systems",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "63--101",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:48 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yee:2008:GEIa,
  author =       "George O. M. Yee and Ali A. Ghorbani and Patrick C. K.
                 Hung",
  title =        "{Guest Editors}' Introduction",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "103--106",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhou:2008:SPR,
  author =       "Jie Zhou and Jim Alves-Foss",
  title =        "Security policy refinement and enforcement for the
                 design of multi-level secure systems",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "107--131",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16202",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mont:2008:PPE,
  author =       "Marco Casassa Mont and Robert Thyne",
  title =        "Privacy policy enforcement in enterprises with
                 identity management solutions",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "133--163",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nayyar:2008:AAM,
  author =       "Harshit Nayyar and Ali A. Ghorbani",
  title =        "Approximate autoregressive modeling for network attack
                 detection",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "165--197",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Spindler:2008:PVS,
  author =       "Torsten Spindler and Christoph Wartmann and Ludger
                 Hovestadt and Daniel Roth and Luc {Van Gool} and
                 Andreas Steffen",
  title =        "Privacy in video surveilled spaces",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "199--222",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16205",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Alam:2008:CBR,
  author =       "Muhammad Alam and Michael Hafner and Ruth Breu",
  title =        "Constraint based role based access control in the
                 {SECTET}-framework",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "223--260",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16206",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yee:2008:GEIb,
  author =       "George O. M. Yee and Chunming Rong and Laurence T.
                 Yang",
  title =        "{Guest Editors}' Introduction",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "261--264",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16301",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Elbirt:2008:AAI,
  author =       "A. J. Elbirt",
  title =        "Accelerated {AES} implementations via generalized
                 instruction set extensions",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "265--288",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kayem:2008:RCK,
  author =       "Anne V. D. M. Kayem and Selim G. Akl and Patrick
                 Martin",
  title =        "On replacing cryptographic keys in hierarchical key
                 management systems",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "289--309",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wang:2008:CBH,
  author =       "Lifu Wang and Partha Dasgupta",
  title =        "Coprocessor-based hierarchical trust management for
                 software integrity and digital identity protection",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "311--339",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hagen:2008:PAU,
  author =       "Janne Merete Hagen and Tormod Kalberg Sivertsen and
                 Chunming Rong",
  title =        "Protection against unauthorized access and computer
                 crime in {Norwegian} enterprises",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "341--366",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16305",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Damiani:2008:GE,
  author =       "Ernesto Damiani",
  title =        "Guest Editorial",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "367--368",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0338",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ardagna:2008:PAA,
  author =       "C. A. Ardagna and M. Cremonini and S. {De Capitani di
                 Vimercati} and P. Samarati",
  title =        "A privacy-aware access control system",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "369--397",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0328",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Goodrich:2008:NFI,
  author =       "Michael T. Goodrich and Roberto Tamassia and Danfeng
                 (Daphne) Yao",
  title =        "Notarized federated {ID} management and
                 authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "399--418",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0324",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wang:2008:IIA,
  author =       "Lingyu Wang and Chao Yao and Anoop Singhal and Sushil
                 Jajodia",
  title =        "Implementing interactive analysis of attack graphs
                 using relational databases",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "419--437",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0327",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:2008:ESP,
  author =       "Vijayalakshmi Atluri and Heechang Shin and Jaideep
                 Vaidya",
  title =        "Efficient security policy enforcement for the mobile
                 environment",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "439--475",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0329",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Biskup:2008:PCQ,
  author =       "Joachim Biskup and Lena Wiese",
  title =        "Preprocessing for controlled query evaluation with
                 availability policy",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "477--494",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0325",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sabelfeld:2008:P,
  author =       "Andrei Sabelfeld",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "495--495",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0331",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Backes:2008:KDM,
  author =       "Michael Backes and Birgit Pfitzmann and Andre
                 Scedrov",
  title =        "Key-dependent message security under active attacks
                 --- {BRSIM\slash UC}-soundness of {Dolev--Yao}-style
                 encryption with key cycles",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "497--530",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0332",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chatzikokolakis:2008:BRI,
  author =       "Konstantinos Chatzikokolakis and Catuscia Palamidessi
                 and Prakash Panangaden",
  title =        "On the {Bayes} risk in information-hiding protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "531--571",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0333",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Corin:2008:SCS,
  author =       "Ricardo Corin and Pierre-Malo Deni{\'e}lou and
                 C{\'e}dric Fournet and Karthikeyan Bhargavan and James
                 Leifer",
  title =        "A secure compiler for session abstractions",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "573--636",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0334",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shroff:2008:SIF,
  author =       "Paritosh Shroff and Scott F. Smith and Mark Thober",
  title =        "Securing information flow via dynamic capture of
                 dependencies",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "637--688",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0335",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Tiplea:2008:SBS,
  author =       "Ferucio L. {\c{T}}iplea and C{\u{a}}t{\u{a}}lin V.
                 B{\^\i}rjoveanu and Constantin Enea and Ioana
                 Boureanu",
  title =        "Secrecy for bounded security protocols with freshness
                 check is {NEXPTIME}-complete",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "689--712",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-0306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Traynor:2008:EOF,
  author =       "Patrick Traynor and William Enck and Patrick McDaniel
                 and Thomas {La Porta}",
  title =        "Exploiting open functionality in {SMS}-capable
                 cellular networks",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "713--742",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-0308",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Murray:2008:NDA,
  author =       "Toby Murray and Duncan Grove",
  title =        "Non-delegatable authorities in capability systems",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "743--759",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0314",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Belsis:2008:AEF,
  author =       "Petros Belsis and Kostas Fragos and Stefanos Gritzalis
                 and Christos Skourlas",
  title =        "Applying effective feature selection techniques with
                 hierarchical mixtures of experts for spam
                 classification",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "761--790",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0319",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2008:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 16 (2008)",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "791--793",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16605",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Petkovic:2009:P,
  author =       "Milan Petkovi{\'c} and Willem Jonker",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "1--3",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0326",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yao:2009:EPT,
  author =       "Chao Yao and Lingyu Wang and X. Sean Wang and Claudio
                 Bettini and Sushil Jajodia",
  title =        "Evaluating privacy threats in released database views
                 by symmetric indistinguishability",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "5--42",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0317",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Byun:2009:PPI,
  author =       "Ji-Won Byun and Tiancheng Li and Elisa Bertino and
                 Ninghui Li and Yonglak Sohn",
  title =        "Privacy-preserving incremental data dissemination",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "43--68",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0316",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bottcher:2009:IDA,
  author =       "Stefan B{\"o}ttcher and Rita Hartel",
  title =        "Information disclosure by answers to {XPath} queries",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "69--99",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0318",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cheng:2009:QAV,
  author =       "Weiwei Cheng and Kian-Lee Tan",
  title =        "Query assurance verification for outsourced
                 multi-dimensional databases",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "101--126",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0315",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hu:2009:CRR,
  author =       "Nan Hu and Giri K. Tayi and Chengyu Ma and Yingjiu
                 Li",
  title =        "Certificate revocation release policies",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "127--157",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0330",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Herzberg:2009:FPT,
  author =       "Amir Herzberg",
  title =        "Folklore, practice and theory of robust combiners",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "159--189",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0336",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Aziz:2009:CSA,
  author =       "Benjamin Aziz and Simon N. Foley and John Herbert and
                 Garret Swart",
  title =        "Configuring storage-area networks using mandatory
                 security",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "191--210",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0337",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Vaidya:2009:ERM,
  author =       "Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo and
                 Haibing Lu",
  title =        "Edge-{RMP}: Minimizing administrative assignments for
                 role-based access control",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "211--235",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0341",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bella:2009:JCS,
  author =       "Giampaolo Bella and Peter Y. A. Ryan",
  title =        "{{\booktitle{Journal of Computer Security}}}",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "237--237",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0346",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Belsis:2009:AEF,
  author =       "Petros Belsis and Kostas Fragos and Stefanos Gritzalis
                 and Christos Skourlas",
  title =        "Applying effective feature selection techniques with
                 hierarchical mixtures of experts for spam
                 classification",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "239--268",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0377",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Grothoff:2009:TBS,
  author =       "Christian Grothoff and Krista Grothoff and Ryan
                 Stutsman and Ludmila Alkhutova and Mikhail Atallah",
  title =        "Translation-based steganography",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "269--303",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0320",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Vigna:2009:REA,
  author =       "Giovanni Vigna and Fredrik Valeur and Davide
                 Balzarotti and William Robertson and Christopher
                 Kruegel and Engin Kirda",
  title =        "Reducing errors in the anomaly-based detection of
                 web-based attacks through the combined analysis of web
                 requests and {SQL} queries",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "305--329",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0321",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Xu:2009:ASL,
  author =       "Haizhi Xu and Steve J. Chapin",
  title =        "Address-space layout randomization using code
                 islands",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "331--362",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0322",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blanchet:2009:AVC,
  author =       "Bruno Blanchet",
  title =        "Automatic verification of correspondences for security
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "363--434",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0339",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:22 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Delaune:2009:VPT,
  author =       "St{\'e}phanie Delaune and Steve Kremer and Mark Ryan",
  title =        "Verifying privacy-type properties of electronic voting
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "435--487",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0340",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:22 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ding:2009:LFM,
  author =       "Xuhua Ding and Gene Tsudik and Shouhuai Xu",
  title =        "Leak-free mediated group signatures",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "489--514",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0342",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:22 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2009:I,
  author =       "Joshua D. Guttman",
  title =        "Introduction",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "515--515",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0396",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sabelfeld:2009:DDP,
  author =       "Andrei Sabelfeld and David Sands",
  title =        "Declassification: Dimensions and principles",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "517--548",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0352",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Matos:2009:DND,
  author =       "Ana Almeida Matos and G{\'e}rard Boudol",
  title =        "On declassification and the non-disclosure policy",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "549--597",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0355",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Harrison:2009:AIF,
  author =       "William L. Harrison and James Hook",
  title =        "Achieving information flow security through monadic
                 control of effects",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "599--653",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0356",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Clarkson:2009:QIF,
  author =       "Michael R. Clarkson and Andrew C. Myers and Fred B.
                 Schneider",
  title =        "Quantifying information flow with beliefs",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "655--701",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0353",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hofheinz:2009:PRS,
  author =       "Dennis Hofheinz and J{\"o}rn M{\"u}ller-Quade and
                 Dominique Unruh",
  title =        "Polynomial runtime in simulatability definitions",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "703--735",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0354",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Adao:2009:SCF,
  author =       "Pedro Ad{\~a}o and Gergei Bana and Jonathan Herzog and
                 Andre Scedrov",
  title =        "Soundness and completeness of formal encryption: The
                 cases of key cycles and partial information leakage",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "737--797",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0358",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bartoletti:2009:PVS,
  author =       "Massimo Bartoletti and Pierpaolo Degano and Gian Luigi
                 Ferrari",
  title =        "Planning and verifying service composition",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "799--837",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0357",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guette:2009:ATK,
  author =       "Gilles Guette",
  title =        "Automating trusted key rollover in {DNSSEC}",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "839--854",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0343",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Preda:2009:SBC,
  author =       "Mila Dalla Preda and Roberto Giacobazzi",
  title =        "Semantics-based code obfuscation by abstract
                 interpretation",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "855--908",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0345",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jacobs:2009:SLS,
  author =       "Bart Jacobs and Ichiro Hasuo",
  title =        "Semantics and logic for security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "909--944",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0348",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dainotti:2009:CAA,
  author =       "Alberto Dainotti and Antonio Pescap{\'e} and Giorgio
                 Ventre",
  title =        "A cascade architecture for {DoS} attacks detection
                 based on the wavelet transform",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "945--968",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0350",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2009:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 17 (2009)",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "969--971",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-17605",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Campolargo:2010:JSI,
  author =       "M{\'a}rio Campolargo",
  title =        "{JCS} special issue on {EU}-funded {ICT} research on
                 Trust and Security: Foreword",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "??--??",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0368",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Camenisch:2010:JSI,
  author =       "Jan Camenisch and Javier Lopez and Fabio Massacci and
                 Massimo Ciscato and Thomas Skordas",
  title =        "{JCS} special issue on {EU}-funded {ICT} research on
                 Trust and Security",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "1--5",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0375",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bergholz:2010:NFA,
  author =       "Andr{\'e} Bergholz and Jan {De Beer} and Sebastian
                 Glahn and Marie-Francine Moens and Gerhard Paa{\ss} and
                 Siehyun Strobel",
  title =        "New filtering approaches for phishing email",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "7--35",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0371",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dam:2010:PCI,
  author =       "Mads Dam and Bart Jacobs and Andreas Lundblad and
                 Frank Piessens",
  title =        "Provably correct inline monitoring for multithreaded
                 {Java}-like programs",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "37--59",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0365",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 https://www.math.utah.edu/pub/tex/bib/multithreading.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Salvail:2010:STR,
  author =       "Louis Salvail and Momtchil Peev and Eleni Diamanti and
                 Romain All{\'e}aume and Norbert L{\"u}tkenhaus and
                 Thomas L{\"a}nger",
  title =        "Security of trusted repeater quantum key distribution
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "61--87",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0373",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cabuk:2010:TAS,
  author =       "Serdar Cabuk and Chris I. Dalton and Konrad Eriksson
                 and Dirk Kuhlmann and HariGovind V. Ramasamy and
                 Gianluca Ramunno and Ahmad-Reza Sadeghi and Matthias
                 Schunter and Christian St{\"u}ble",
  title =        "Towards automated security policy enforcement in
                 multi-tenant virtual data centers",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "89--121",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0376",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ardagna:2010:ECP,
  author =       "Claudio A. Ardagna and Jan Camenisch and Markulf
                 Kohlweiss and Ronald Leenes and Gregory Neven and Bart
                 Priem and Pierangela Samarati and Dieter Sommer and
                 Mario Verdicchio",
  title =        "Exploiting cryptography for privacy-enhanced access
                 control: A result of the {PRIME Project}",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "123--160",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0367",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Argyropoulos:2010:BTP,
  author =       "Savvas Argyropoulos and Dimitrios Tzovaras and
                 Dimosthenis Ioannidis and Yannis Damousis and Michael
                 G. Strintzis and Martin Braun and Serge Boverie",
  title =        "Biometric template protection in multimodal
                 authentication systems based on error correcting
                 codes",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "161--185",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0369",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:2010:E,
  author =       "Sushil Jajodia and Jon Millen",
  title =        "Editorial",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "187--187",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:38 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gorla:2010:P,
  author =       "Daniele Gorla and Catuscia Palamidessi",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "189--189",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0359",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:38 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Malacaria:2010:RAS,
  author =       "Pasquale Malacaria",
  title =        "Risk assessment of security threats for looping
                 constructs",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "191--228",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0360",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:38 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bodei:2010:DPT,
  author =       "Chiara Bodei and Linda Brodo and Pierpaolo Degano and
                 Han Gao",
  title =        "Detecting and preventing type flaws at static time",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "229--264",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0361",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:38 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hamadou:2010:CPS,
  author =       "Sardaouna Hamadou and John Mullins",
  title =        "Calibrating the power of schedulers for probabilistic
                 polynomial-time calculus",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "265--316",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0362",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:38 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Delaune:2010:SBA,
  author =       "St{\'e}phanie Delaune and Steve Kremer and Mark D.
                 Ryan",
  title =        "Symbolic bisimulation for the applied pi calculus",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "317--377",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0363",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:38 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lekkas:2010:PMT,
  author =       "Dimitrios Lekkas and Dimitris Gritzalis",
  title =        "{e-Passports} as a means towards a {Globally
                 Interoperable Public Key Infrastructure}",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "379--396",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0370",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pala:2010:FPN,
  author =       "Massimiliano Pala and Sean W. Smith",
  title =        "Finding the {PKI} needles in the {Internet} haystack",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "397--420",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0401",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2010:CCB,
  author =       "Jiguo Li and Xinyi Huang and Yi Mu and Willy Susilo
                 and Qianhong Wu",
  title =        "Constructions of certificate-based signature secure
                 against key replacement attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "421--449",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0366",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2010:ESS,
  author =       "Chung Ki Li and Guomin Yang and Duncan S. Wong and
                 Xiaotie Deng and Sherman S. M. Chow",
  title =        "An efficient signcryption scheme with key privacy and
                 its extension to ring signcryption",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "451--473",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0374",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chadwick:2010:ICR,
  author =       "David W. Chadwick and Sean Antony and Rune Bjerk",
  title =        "Instant certificate revocation and publication using
                 {WebDAV}",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "475--496",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0372",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Goto:2010:P,
  author =       "Atsuhiro Goto",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "497--497",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0381",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Saklikar:2010:IFV,
  author =       "Samir Saklikar and Subir Saha",
  title =        "Identity Federation for {VoIP} systems",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "499--540",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0349",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Baldwin:2010:AFI,
  author =       "Adrian Baldwin and Marco Casassa Mont and Yolanta
                 Beres and Simon Shiu",
  title =        "Assurance for federated identity management",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "541--572",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0380",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Modersheim:2010:CDS,
  author =       "Sebastian M{\"o}dersheim and Luca Vigan{\`o} and David
                 Basin",
  title =        "Constraint differentiation: Search-space reduction for
                 the constraint-based analysis of security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "575--618",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0351",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Becker:2010:SDS,
  author =       "Moritz Y. Becker and C{\'e}dric Fournet and Andrew D.
                 Gordon",
  title =        "{SecPAL}: Design and semantics of a decentralized
                 authorization language",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "619--665",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0364",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Conrad:2010:AUT,
  author =       "James R. Conrad and Jim Alves-Foss and Sauchi Stephen
                 Lee",
  title =        "Analyzing uncertainty in {TG} protection graphs with
                 {TG\slash MC}",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "667--699",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0378",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pucella:2010:IOS,
  author =       "Riccardo Pucella and Fred B. Schneider",
  title =        "Independence from obfuscation: A semantic framework
                 for diversity",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "701--749",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0379",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Giacobazzi:2010:ACU,
  author =       "Roberto Giacobazzi and Isabella Mastroeni",
  title =        "Adjoining classified and unclassified information by
                 abstract interpretation",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "751--797",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0382",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pirretti:2010:SAB,
  author =       "Matthew Pirretti and Patrick Traynor and Patrick
                 McDaniel and Brent Waters",
  title =        "Secure attribute-based systems",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "799--837",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0383",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DiPietro:2010:HKS,
  author =       "Roberto {Di Pietro} and Luigi V. Mancini and
                 Alessandro Mei",
  title =        "Hierarchies of keys in secure multicast
                 communications",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "839--860",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0384",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jovanovic:2010:SAD,
  author =       "Nenad Jovanovic and Christopher Kruegel and Engin
                 Kirda",
  title =        "Static analysis for detecting taint-style
                 vulnerabilities in web applications",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "861--907",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0385",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Baudet:2010:GAC,
  author =       "Mathieu Baudet and Bogdan Warinschi and Mart{\'\i}n
                 Abadi",
  title =        "Guessing attacks and the computational soundness of
                 static equivalence",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "909--968",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0386",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Focardi:2010:E,
  author =       "Riccardo Focardi",
  title =        "Editorial",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "969--969",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0390",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Besson:2010:VRA,
  author =       "Fr{\'e}d{\'e}ric Besson and Guillaume Dufay and Thomas
                 Jensen and David Pichardie",
  title =        "Verifying resource access control on mobile
                 interactive devices",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "971--998",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0387",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kremer:2010:CSA,
  author =       "Steve Kremer and Laurent Mazar{\'e}",
  title =        "Computationally sound analysis of protocols using
                 bilinear pairings",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "999--1033",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0388",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Roy:2010:ITP,
  author =       "Arnab Roy and Anupam Datta and Ante Derek and John C.
                 Mitchell",
  title =        "Inductive trace properties for computational
                 security",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1035--1073",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-389",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sabelfeld:2010:P,
  author =       "Andrei Sabelfeld",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1075--1075",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0391",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Backes:2010:CSS,
  author =       "Michael Backes and Dominique Unruh",
  title =        "Computational soundness of symbolic zero-knowledge
                 proofs",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1077--1155",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0392",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Clarkson:2010:H,
  author =       "Michael R. Clarkson and Fred B. Schneider",
  title =        "Hyperproperties",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1157--1210",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0393",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Delaune:2010:FSA,
  author =       "St{\'e}phanie Delaune and Steve Kremer and Graham
                 Steel",
  title =        "Formal security analysis of {PKCS\#11} and proprietary
                 extensions",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1211--1245",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0394",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Goubault-Larrecq:2010:FMF,
  author =       "Jean Goubault-Larrecq",
  title =        "Finite models for formal security proofs",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1247--1299",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0395",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2010:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 18 (2010)",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "1301--1305",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-18610",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kopf:2011:ADI,
  author =       "Boris K{\"o}pf and David Basin",
  title =        "Automatically deriving information-theoretic bounds
                 for adaptive side-channel attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "1--31",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0397",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gordon:2011:IIS,
  author =       "Lawrence A. Gordon and Martin P. Loeb and Lei Zhou",
  title =        "The impact of information security breaches: Has there
                 been a downward shift in costs?",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "33--56",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0398",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeAngelis:2011:SAT,
  author =       "David DeAngelis and K. Suzanne Barber",
  title =        "Security applications of trust in multi-agent
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "57--99",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0399",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DSouza:2011:MCT,
  author =       "Deepak D'Souza and Raveendra Holla and K. R.
                 Raghavendra and Barbara Sprick",
  title =        "Model-checking trace-based information flow
                 properties",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "101--138",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0400",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nguyen:2011:APB,
  author =       "L. H. Nguyen and A. W. Roscoe",
  title =        "Authentication protocols based on low-bandwidth
                 unspoofable channels: A comparative survey",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "139--201",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sinha:2011:SSS,
  author =       "Anshuman Sinha",
  title =        "A survey of system security in contactless electronic
                 passports",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "203--226",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0414",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2011:GEP,
  author =       "Yingjiu Li and Jianying Zhou",
  title =        "{Guest Editor}s' preface",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "227--228",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Alomair:2011:SLC,
  author =       "Basel Alomair and Loukas Lazos and Radha Poovendran",
  title =        "Securing low-cost {RFID} systems: An unconditionally
                 secure approach",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "229--257",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hancke:2011:PES,
  author =       "Gerhard P. Hancke",
  title =        "Practical eavesdropping and skimming attacks on
                 high-frequency {RFID} tokens",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "259--288",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0407",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Avoine:2011:FAR,
  author =       "Gildas Avoine and Muhammed Ali Bing{\"o}l and
                 S{\"u}leyman Karda{\c{s}} and C{\'e}dric Lauradoux and
                 Benjamin Martin",
  title =        "A framework for analyzing {RFID} distance bounding
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "289--317",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0408",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ng:2011:PRO,
  author =       "Ching Yu Ng and Willy Susilo and Yi Mu and Rei
                 Safavi-Naini",
  title =        "Practical {RFID} ownership transfer scheme",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "319--341",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0409",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Halevi:2011:TBH,
  author =       "Tzipora Halevi and Nitesh Saxena and Shai Halevi",
  title =        "Tree-based {HB} protocols for privacy-preserving
                 authentication of {RFID} tags",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "343--363",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Atluri:2011:P,
  author =       "Vijay Atluri",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "365--365",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0425",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dong:2011:SSE,
  author =       "Changyu Dong and Giovanni Russello and Naranker
                 Dulay",
  title =        "Shared and searchable encrypted data for untrusted
                 servers",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "367--397",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0415",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Toahchoodee:2011:FAS,
  author =       "Manachai Toahchoodee and Indrakshi Ray",
  title =        "On the formalization and analysis of a spatio-temporal
                 role-based access control model",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "399--452",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0418",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{He:2011:SCP,
  author =       "Xiaoyun He and Haibing Lu and Jaideep Vaidya and Nabil
                 Adam",
  title =        "Secure construction and publication of contingency
                 tables from distributed data",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "453--484",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0417",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Vaidya:2011:I,
  author =       "Jaideep Vaidya and Ehud Gudes",
  title =        "Introduction",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "485--486",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0427",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Biskup:2011:IPV,
  author =       "Joachim Biskup and Christian Gogolin and Jens Seiler
                 and Torben Weibert",
  title =        "Inference-proof view update transactions with
                 forwarded refreshments",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "487--529",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0420",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ciriani:2011:SDO,
  author =       "Valentina Ciriani and Sabrina {De Capitani di
                 Vimercati} and Sara Foresti and Sushil Jajodia and
                 Stefano Paraboschi and Pierangela Samarati",
  title =        "Selective data outsourcing for enforcing privacy",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "531--566",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0422",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Foley:2011:MSP,
  author =       "Simon N. Foley and William M. Fitzgerald",
  title =        "Management of security policy configuration using a
                 {Semantic Threat Graph} approach",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "567--605",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0421",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shin:2011:EES,
  author =       "Heechang Shin and Vijayalakshmi Atluri and June-suh
                 Cho",
  title =        "Efficiently enforcing spatiotemporal access control
                 under uncertain location information",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "607--637",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0423",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Rieck:2011:AAM,
  author =       "Konrad Rieck and Philipp Trinius and Carsten Willems
                 and Thorsten Holz",
  title =        "Automatic analysis of malware behavior using machine
                 learning",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "639--668",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0410",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{vanOorschot:2011:EPC,
  author =       "P. C. van Oorschot and Julie Thorpe",
  title =        "Exploiting predictability in click-based graphical
                 passwords",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "669--702",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0411",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mannan:2011:LPD,
  author =       "Mohammad Mannan and P. C. van Oorschot",
  title =        "Leveraging personal devices for stronger password
                 authentication from untrusted computers",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "703--750",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0412",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:2011:AED,
  author =       "Sabrina {De Capitani di Vimercati} and Sara Foresti
                 and Sushil Jajodia and Stefano Paraboschi and
                 Pierangela Samarati",
  title =        "Authorization enforcement in distributed query
                 evaluation",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "751--794",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0413",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shin:2011:PAM,
  author =       "Heechang Shin and Jaideep Vaidya and Vijayalakshmi
                 Atluri",
  title =        "A profile anonymization model for location-based
                 services",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "795--833",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0416",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gritzalis:2011:SPM,
  author =       "Dimitris Gritzalis and Giannis Marias and Yacine
                 Rebahi and Yannis Soupionis and Sven Ehlert",
  title =        "{SPIDER}: A platform for managing {SIP}-based {Spam
                 over Internet Telephony (SPIT)}",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "835--867",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0419",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hsu:2011:WLC,
  author =       "Francis Hsu and Hao Chen and Sridhar Machiraju",
  title =        "{WebCallerID}: Leveraging cellular networks for {Web}
                 authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "869--893",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0424",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Curtmola:2011:SSE,
  author =       "Reza Curtmola and Juan Garay and Seny Kamara and
                 Rafail Ostrovsky",
  title =        "Searchable symmetric encryption: Improved definitions
                 and efficient constructions",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "895--934",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0426",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dewri:2011:EPV,
  author =       "Rinku Dewri and Indrajit Ray and Indrakshi Ray and
                 Darrell Whitley",
  title =        "Exploring privacy versus data quality trade-offs in
                 anonymization techniques using multi-objective
                 optimization",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "935--974",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0428",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kamil:2011:ATS,
  author =       "Allaa Kamil and Gavin Lowe",
  title =        "Analysing {TLS} in the strand spaces model",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "975--1025",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0429",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gritzalis:2011:GEP,
  author =       "Dimitris Gritzalis",
  title =        "{Guest Editor}'s Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "1027--1028",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0441",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yasuoka:2011:BPQ,
  author =       "Hirotoshi Yasuoka and Tachio Terauchi",
  title =        "On bounding problems of quantitative information
                 flow",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "1029--1082",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0437",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhang:2011:UTA,
  author =       "Chao Zhang and Wei Zou and Tielei Wang and Yu Chen and
                 Tao Wei",
  title =        "Using type analysis in compiler to mitigate
                 integer-overflow-to-buffer-overflow threat",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "1083--1107",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0434",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Deng:2011:ZKB,
  author =       "Robert H. Deng and Yingjiu Li and Moti Yung and Yunlei
                 Zhao",
  title =        "A zero-knowledge based framework for {RFID} privacy",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "1109--1146",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0440",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nithyanand:2011:UAR,
  author =       "Rishab Nithyanand and Gene Tsudik and Ersin Uzun",
  title =        "User-aided reader revocation in {PKI}-based {RFID}
                 systems",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "1147--1172",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0435",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2011:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 19 (2011)",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "1173--1176",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-19606",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Armando:2012:P,
  author =       "Alessandro Armando and Gavin Lowe",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "1--1",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0438",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Alvim:2012:QIF,
  author =       "M{\'a}rio S. Alvim and Miguel E. Andr{\'e}s and
                 Catuscia Palamidessi",
  title =        "Quantitative information flow in interactive systems",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "3--50",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0433",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bielova:2012:IES,
  author =       "Nataliia Bielova and Fabio Massacci",
  title =        "Iterative enforcement by suppression: Towards
                 practical enforcement theories",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "51--79",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0431",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Costa:2012:MPS,
  author =       "Gabriele Costa and Pierpaolo Degano and Fabio
                 Martinelli",
  title =        "Modular plans for secure service composition",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "81--117",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0430",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhou:2012:FAS,
  author =       "Hongbin Zhou and Simon N. Foley",
  title =        "Fast automatic security protocol generation",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "2--3",
  pages =        "119--167",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0432",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Stakhanova:2012:TCS,
  author =       "Natalia Stakhanova and Chris Strasburg and Samik Basu
                 and Johnny S. Wong",
  title =        "Towards cost-sensitive assessment of intrusion
                 response selection",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "2--3",
  pages =        "169--198",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0436",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bowen:2012:SGI,
  author =       "Brian M. Bowen and Vasileios P. Kemerlis and Pratap
                 Prabhu and Angelos D. Keromytis and Salvatore J.
                 Stolfo",
  title =        "A system for generating and injecting
                 indistinguishable network decoys",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "2--3",
  pages =        "199--221",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0439",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ahn:2012:PDR,
  author =       "Gail-Joon Ahn and Jing Jin and Mohamed Shehab",
  title =        "Policy-driven role-based access management for ad-hoc
                 collaboration",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "2--3",
  pages =        "223--257",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0446",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blanton:2012:SOC,
  author =       "Marina Blanton and Mehrdad Aliasgari",
  title =        "Secure outsourced computation of iris matching",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "2--3",
  pages =        "259--305",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0447",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Barthe:2012:P,
  author =       "Gilles Barthe and Jorge Cuellar and Javier Lopez and
                 Alexander Pretschner",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "307--308",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0462",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Armando:2012:SAS,
  author =       "Alessandro Armando and Silvio Ranise",
  title =        "Scalable automated symbolic analysis of administrative
                 role-based access control policies by {SMT} solving",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "309--352",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0461",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Garg:2012:SAL,
  author =       "Deepak Garg and Frank Pfenning",
  title =        "Stateful authorization logic --- Proof theory and a
                 case study",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "353--391",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0456",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bezzi:2012:MPI,
  author =       "Michele Bezzi and Sabrina {De Capitani di Vimercati}
                 and Sara Foresti and Giovanni Livraga and Pierangela
                 Samarati and Roberto Sassi",
  title =        "Modeling and preventing inferences from sensitive
                 value distributions in data release",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "393--436",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0457",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sun:2012:TAV,
  author =       "Yanjie Sun and Chenyi Zhang and Jun Pang and Baptiste
                 Alcalde and Sjouke Mauw",
  title =        "A trust-augmented voting scheme for collaborative
                 privacy management",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "437--459",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0453",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2012:GEP,
  author =       "Yingjiu Li",
  title =        "{Guest Editor}'s Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "461--462",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0448",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ciriani:2012:OAE,
  author =       "Valentina Ciriani and Sabrina {De Capitani di
                 Vimercati} and Sara Foresti and Giovanni Livraga and
                 Pierangela Samarati",
  title =        "An {OBDD} approach to enforce confidentiality and
                 visibility constraints in data publishing",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "463--508",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0449",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Biskup:2012:DPA,
  author =       "Joachim Biskup",
  title =        "Dynamic policy adaptation for inference control of
                 queries to a propositional information system",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "509--546",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0450",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Adaikkalavan:2012:MSD,
  author =       "Raman Adaikkalavan and Xing Xie and Indrakshi Ray",
  title =        "Multilevel secure data stream processing: Architecture
                 and implementation",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "547--581",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0451",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hong:2012:SED,
  author =       "Yuan Hong and Jaideep Vaidya and Haibing Lu",
  title =        "Secure and efficient distributed linear programming",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "583--634",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0452",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Myers:2012:P,
  author =       "Andrew Myers and Michael Backes",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "635--636",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0445",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chong:2012:RIR,
  author =       "Stephen Chong",
  title =        "Required information release",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "637--676",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0442",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Becker:2012:IFT,
  author =       "Moritz Y. Becker",
  title =        "Information flow in trust management systems",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "677--708",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0443",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kusters:2012:GBD,
  author =       "Ralf K{\"u}sters and Tomasz Truderung and Andreas
                 Vogt",
  title =        "A game-based definition of coercion resistance and its
                 applications",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "709--764",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0444",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2012:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 20 (2012)",
  journal =      j-J-COMP-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "765--767",
  month =        "????",
  year =         "2012",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-20605",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yarmand:2013:BBA,
  author =       "Mohammad H. Yarmand and Kamran Sartipi and Douglas G.
                 Down",
  title =        "Behavior-based access control for distributed
                 healthcare systems",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "1--39",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0454",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:44 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Meier:2013:ECM,
  author =       "Simon Meier and Cas Cremers and David Basin",
  title =        "Efficient construction of machine-checked symbolic
                 protocol security proofs",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "41--87",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0455",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:44 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cortier:2013:AFH,
  author =       "V{\'e}ronique Cortier and Ben Smyth",
  title =        "Attacking and fixing {Helios}: An analysis of ballot
                 secrecy",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "89--148",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0458",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:44 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cuppens:2013:FSM,
  author =       "Fr{\'e}d{\'e}ric Cuppens and Nora Cuppens-Boulahia and
                 Yehia Elrakaiby",
  title =        "Formal specification and management of security
                 policies with collective group obligations",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "149--190",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0459",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:44 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Geigel:2013:NNT,
  author =       "Arturo Geigel",
  title =        "Neural network {Trojan}",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "191--232",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0460",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:48 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Phatak:2013:SIN,
  author =       "Dhananjay Phatak and Alan T. Sherman and Nikhil Joshi
                 and Bhushan Sonawane and Vivek G. Relan and Amol
                 Dawalbhakta",
  title =        "Spread Identity: A new dynamic address remapping
                 mechanism for anonymity and {DDoS} defense",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "233--281",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0463",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:48 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kolesnikov:2013:SAP,
  author =       "Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas
                 Schneider",
  title =        "A systematic approach to practically efficient general
                 two-party secure function evaluation protocols and
                 their modular design",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "283--315",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130464",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:48 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jadliwala:2013:OMZ,
  author =       "Murtuza Jadliwala and Igor Bilogrevic and Jean-Pierre
                 Hubaux",
  title =        "Optimizing mix-zone coverage in pervasive wireless
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "317--346",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130465",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kobsa:2013:CJV,
  author =       "Alfred Kobsa and Rishab Nithyanand and Gene Tsudik and
                 Ersin Uzun",
  title =        "Can {Jannie} verify? {Usability} of display-equipped
                 {RFID} tags for security purposes",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "347--370",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130470",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kreitz:2013:FSW,
  author =       "Gunnar Kreitz",
  title =        "Flow stealing: A well-timed redirection attack",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "371--391",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130466",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Herzberg:2013:FJL,
  author =       "Amir Herzberg and Ronen Margulies",
  title =        "Forcing {Johnny} to login safely",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "393--424",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130467",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:2013:SCM,
  author =       "Sabrina {De Capitani di Vimercati} and Sara Foresti
                 and Stefano Paraboschi and Gerardo Pelosi and
                 Pierangela Samarati",
  title =        "Supporting concurrency and multiple indexes in private
                 access to outsourced data",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "425--461",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130468",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mardziel:2013:DEK,
  author =       "Piotr Mardziel and Stephen Magill and Michael Hicks
                 and Mudhakar Srivatsa",
  title =        "Dynamic enforcement of knowledge-based security
                 policies using probabilistic abstract interpretation",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "463--532",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130469",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:55 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhou:2013:SVC,
  author =       "Fangfei Zhou and Manish Goel and Peter Desnoyers and
                 Ravi Sundaram",
  title =        "Scheduler vulnerabilities and coordinated attacks in
                 cloud computing",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "533--559",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130474",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:55 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Homer:2013:AVM,
  author =       "John Homer and Su Zhang and Xinming Ou and David
                 Schmidt and Yanhui Du and S. Raj Rajagopalan and Anoop
                 Singhal",
  title =        "Aggregating vulnerability metrics in enterprise
                 networks using attack graphs",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "561--597",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130475",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:55 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Visconti:2013:SIA,
  author =       "Ivan Visconti",
  title =        "Special Issue: Advances in Security for Communication
                 Networks",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "599--600",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130483",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Baron:2013:SPM,
  author =       "Joshua Baron and Karim {El Defrawy} and Kirill
                 Minkovich and Rafail Ostrovsky and Eric Tressler",
  title =        "{5PM}: Secure pattern matching",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "601--625",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130481",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blazy:2013:SBS,
  author =       "Olivier Blazy and Georg Fuchsbauer and David
                 Pointcheval and Damien Vergnaud",
  title =        "Short blind signatures",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "627--661",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130477",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gentry:2013:FSB,
  author =       "Craig Gentry and Shai Halevi and Chris Peikert and
                 Nigel P. Smart",
  title =        "Field switching in {BGV}-style homomorphic
                 encryption",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "663--684",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130480",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lipmaa:2013:MEC,
  author =       "Helger Lipmaa and Bingsheng Zhang",
  title =        "A more efficient computationally sound non-interactive
                 zero-knowledge shuffle argument",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "685--719",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130478",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Myers:2013:BBC,
  author =       "Steven Myers and Mona Sergi and abhi shelat",
  title =        "Black-box construction of a more than non-malleable
                 {CCA1} encryption scheme from plaintext awareness",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "721--748",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130485",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nieto:2013:PVC,
  author =       "Juan Gonz{\'a}lez Nieto and Mark Manulis and Bertram
                 Poettering and Jothi Rangasamy and Douglas Stebila",
  title =        "Publicly verifiable ciphertexts",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "749--778",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130473",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Degano:2013:P,
  author =       "Pierpaolo Degano and Joshua D. Guttman",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "779--780",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130488",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Paiola:2013:VSP,
  author =       "Miriam Paiola and Bruno Blanchet",
  title =        "Verification of security protocols with lists: From
                 length one to unbounded length",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "781--816",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130471",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Basin:2013:PRI,
  author =       "David Basin and Cas Cremers and Simon Meier",
  title =        "Provably repairing the {ISO\slash IEC 9798} standard
                 for entity authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "817--846",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130472",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Arapinis:2013:PSC,
  author =       "Myrto Arapinis and Sergiu Bursuc and Mark Ryan",
  title =        "Privacy-supporting cloud computing by in-browser key
                 translation",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "847--880",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130489",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Barthe:2013:VIH,
  author =       "Gilles Barthe and Benjamin Gr{\'e}goire and Sylvain
                 Heraud and Federico Olmedo and Santiago
                 Zanella-B{\'e}guelin",
  title =        "Verified indifferentiable hashing into elliptic
                 curves",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "881--917",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130476",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Acar:2013:CCP,
  author =       "Umut A. Acar and Amal Ahmed and James Cheney and Roly
                 Perera",
  title =        "A core calculus for provenance",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "919--969",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130487",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Centenaro:2013:TBA,
  author =       "Matteo Centenaro and Riccardo Focardi and Flaminia L.
                 Luccio",
  title =        "Type-based analysis of key management in {PKCS\#11}
                 cryptographic devices",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "971--1007",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130479",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2013:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 21 (2013)",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "1009--1012",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2013-21608",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lu:2014:OFR,
  author =       "Haibing Lu and Jaideep Vaidya and Vijayalakshmi
                 Atluri",
  title =        "An optimization framework for role mining",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "1--31",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130484",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yuen:2014:TCT,
  author =       "Tsz Hon Yuen and Willy Susilo and Yi Mu",
  title =        "Towards a cryptographic treatment of publish\slash
                 subscribe systems",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "33--67",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130486",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Niu:2014:FVS,
  author =       "Jianwei Niu and Mark Reith and William H.
                 Winsborough",
  title =        "Formal verification of security properties in trust
                 management policy",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "69--153",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130490",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Peddinti:2014:WSQ,
  author =       "Sai Teja Peddinti and Nitesh Saxena",
  title =        "{Web} search query privacy: Evaluating query
                 obfuscation and anonymizing networks",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "155--199",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130491",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chatzikokolakis:2014:FAS,
  author =       "Konstantinos Chatzikokolakis and Sebastian Alexander
                 M{\"o}dersheim and Catuscia Palamidessi and Jun Pang",
  title =        "Foundational aspects of security",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "201--202",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140497",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2014:EPP,
  author =       "Joshua D. Guttman",
  title =        "Establishing and preserving protocol security goals",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "203--267",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140499",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ngo:2014:EVC,
  author =       "Tri Minh Ngo and Mari{\"e}lle Stoelinga and Marieke
                 Huisman",
  title =        "Effective verification of confidentiality for
                 multi-threaded programs",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "269--300",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130492",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 https://www.math.utah.edu/pub/tex/bib/multithreading.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Backes:2014:UIR,
  author =       "Michael Backes and C{\u{a}}t{\u{a}}lin Hri{\c{t}}cu
                 and Matteo Maffei",
  title =        "Union, intersection and refinement types and reasoning
                 about type disjointness for secure protocol
                 implementations",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "301--353",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130493",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blundo:2014:EEP,
  author =       "Carlo Blundo and Emiliano {De Cristofaro} and Paolo
                 Gasti",
  title =        "{EsPRESSO}: Efficient privacy-preserving evaluation of
                 sample set similarity",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "355--381",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130482",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:16 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Soupionis:2014:GTA,
  author =       "Yannis Soupionis and Remous-Aris Koutsiamanis and
                 Pavlos Efraimidis and Dimitris Gritzalis",
  title =        "A game-theoretic analysis of preventing spam over
                 {Internet Telephony} via audio {CAPTCHA}-based
                 authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "383--413",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140496",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:16 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bisht:2014:ADP,
  author =       "Prithvi Bisht and Timothy Hinrichs and Nazari Skrupsky
                 and V. N. Venkatakrishnan",
  title =        "Automated detection of parameter tampering
                 opportunities and vulnerabilities in web applications",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "415--465",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140498",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:16 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Desmet:2014:P,
  author =       "Lieven Desmet and Martin Johns and Benjamin Livshits
                 and Andrei Sabelfeld",
  title =        "Preface",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "467--468",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140506",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeGroef:2014:SME,
  author =       "Willem {De Groef} and Dominique Devriese and Nick
                 Nikiforakis and Frank Piessens",
  title =        "Secure multi-execution of web scripts: Theory and
                 practice",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "469--509",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130495",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Politz:2014:TBV,
  author =       "Joe Gibbs Politz and Arjun Guha and Shriram
                 Krishnamurthi",
  title =        "Typed-based verification of {Web} sandboxes",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "511--565",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140504",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Heiderich:2014:SAS,
  author =       "M. Heiderich and M. Niemietz and F. Schuster and T.
                 Holz and J. Schwenk",
  title =        "Scriptless attacks: Stealing more pie without touching
                 the sill",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "567--599",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130494",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bansal:2014:DCA,
  author =       "Chetan Bansal and Karthikeyan Bhargavan and Antoine
                 Delignat-Lavaud and Sergio Maffeis",
  title =        "Discovering concrete attacks on website authorization
                 by formal analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "601--657",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Backes:2014:MGE,
  author =       "Michael Backes and Steve Zdancewic",
  title =        "Message from the {Guest Editors}",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "659--660",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140505",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Basin:2014:OFA,
  author =       "David Basin and Samuel J. Burri and G{\"u}nter
                 Karjoth",
  title =        "Obstruction-free authorization enforcement: Aligning
                 security and business objectives",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "661--698",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140500",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Schlesinger:2014:MPA,
  author =       "Cole Schlesinger and Karthik Pattabiraman and Nikhil
                 Swamy and David Walker and Benjamin Zorn",
  title =        "Modular protections against non-control data attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "699--742",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140502",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Arapinis:2014:SVS,
  author =       "Myrto Arapinis and Joshua Phillips and Eike Ritter and
                 Mark D. Ryan",
  title =        "{StatVerif}: Verification of stateful processes",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "743--821",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140501",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dupressoir:2014:GGP,
  author =       "Fran{\c{c}}ois Dupressoir and Andrew D. Gordon and Jan
                 J{\"u}rjens and David A. Naumann",
  title =        "Guiding a general-purpose {C} verifier to prove
                 cryptographic protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "823--866",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140508",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Akinyele:2014:MGA,
  author =       "Joseph A. Akinyele and Matthew Green and Susan
                 Hohenberger and Matthew Pagano",
  title =        "Machine-generated algorithms, proofs and software for
                 the batch verification of digital signature schemes",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "867--912",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140507",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Braun:2014:CTM,
  author =       "Johannes Braun and Florian Volk and Jiska Classen and
                 Johannes Buchmann and Max M{\"u}hlh{\"a}user",
  title =        "{CA} trust management for the {Web PKI}",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "913--959",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140509",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Uzun:2014:SAT,
  author =       "Emre Uzun and Vijayalakshmi Atluri and Jaideep Vaidya
                 and Shamik Sural and Anna Lisa Ferrara and Gennaro
                 Parlato and P. Madhusudan",
  title =        "Security analysis for temporal role based access
                 control",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "961--996",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140510",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chen:2014:PUQ,
  author =       "Yen-Chung Chen and Yu-Sung Wu and Wen-Guey Tzeng",
  title =        "Preserving user query privacy in cloud-based security
                 services",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "997--1024",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140520",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Buchmann:2014:TMS,
  author =       "Nicolas Buchmann and Harald Baier",
  title =        "Towards a more secure and scalable verifying {PKI} of
                 {eMRTD}",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "1025--1049",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140522",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2014:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 22 (2014)",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "1051--1054",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2014-22606",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yang:2015:PAA,
  author =       "Ping Yang and Mikhail I. Gofman and Scott D. Stoller
                 and Zijiang Yang",
  title =        "Policy analysis for administrative role based access
                 control without separate administration",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "1--29",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140511",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mitra:2015:GTR,
  author =       "Barsha Mitra and Shamik Sural and Vijayalakshmi Atluri
                 and Jaideep Vaidya",
  title =        "The generalized temporal role mining problem",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "31--58",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140512",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:2015:LAI,
  author =       "Sabrina {De Capitani di Vimercati} and Sara Foresti
                 and Sushil Jajodia and Giovanni Livraga and Stefano
                 Paraboschi and Pierangela Samarati",
  title =        "Loose associations to increase utility in data
                 publishing",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "59--88",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140513",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{AlBouna:2015:ATD,
  author =       "Bechara {Al Bouna} and Chris Clifton and Qutaibah
                 Malluhi",
  title =        "Anonymizing transactional datasets",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "89--106",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140517",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lu:2015:TUO,
  author =       "Haibing Lu and Yuan Hong and Yanjiang Yang and Lian
                 Duan and Nazia Badar",
  title =        "Towards user-oriented {RBAC} model",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "107--129",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140519",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Liu:2015:JSD,
  author =       "Wen Ming Liu and Lingyu Wang and Lei Zhang and Shunzhi
                 Zhu",
  title =        "$k$-jump: A strategy to design publicly-known
                 algorithms for privacy preserving micro-data
                 disclosure",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "131--165",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140514",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bates:2015:AWK,
  author =       "Adam Bates and Kevin R. B. Butler and Micah Sherr and
                 Clay Shields and Patrick Traynor and Dan Wallach",
  title =        "Accountable wiretapping --- or --- {I} know they can
                 hear you now",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "167--195",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140515",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{vanderMeyden:2015:WII,
  author =       "Ron van der Meyden",
  title =        "What, indeed, is intransitive noninterference?",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "197--228",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140516",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Boureanu:2015:PPS,
  author =       "Ioana Boureanu and Aikaterini Mitrokotsa and Serge
                 Vaudenay",
  title =        "Practical and provably secure distance-bounding",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "229--257",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140518",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gibson-Robinson:2015:VLS,
  author =       "Thomas Gibson-Robinson and Allaa Kamil and Gavin
                 Lowe",
  title =        "Verifying layered security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "259--307",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150526",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dimitrakakis:2015:ELA,
  author =       "Christos Dimitrakakis and Aikaterini Mitrokotsa and
                 Serge Vaudenay",
  title =        "Expected loss analysis for authentication in
                 constrained channels",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "309--329",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140521",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cade:2015:PGI,
  author =       "David Cad{\'e} and Bruno Blanchet",
  title =        "Proved generation of implementations from
                 computationally secure protocol specifications",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "331--402",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150524",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yuan:2015:PPC,
  author =       "Jiawei Yuan and Shucheng Yu",
  title =        "{PCPOR}: Public and constant-cost proofs of
                 retrievability in {cloud1}",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "403--425",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150525",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Alvim:2015:ILD,
  author =       "M{\'a}rio S. Alvim and Miguel E. Andr{\'e}s and
                 Konstantinos Chatzikokolakis and Pierpaolo Degano and
                 Catuscia Palamidessi",
  title =        "On the information leakage of differentially-private
                 mechanisms",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "427--469",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150528",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shen:2015:DIC,
  author =       "Shiuan-Tzuo Shen and Wen-Guey Tzeng",
  title =        "Delegated integrity check for hierarchical cloud
                 data",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "471--508",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150527",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bugliesi:2015:CPB,
  author =       "Michele Bugliesi and Stefano Calzavara and Riccardo
                 Focardi and Wilayat Khan",
  title =        "{CookiExt}: Patching the browser against session
                 hijacking attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "509--537",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150529",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Spalazzi:2015:SIS,
  author =       "Luca Spalazzi and Luca Vigan{\`o}",
  title =        "Special issue on security and high performance
                 computing systems",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "539--540",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150537",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lowden:2015:DPA,
  author =       "Jason Lowden and Marcin {\L}ukowiak and Sonia Lopez
                 Alarcon",
  title =        "Design and performance analysis of efficient {Keccak}
                 tree hashing on {GPU} architectures",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "541--562",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150534",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bella:2015:SSP,
  author =       "Giampaolo Bella and Paul Curzon and Gabriele Lenzini",
  title =        "Service security and privacy as a socio-technical
                 problem",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "563--585",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150536",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Dreier:2015:BFP,
  author =       "Jannik Dreier and Jean-Guillaume Dumas and Pascal
                 Lafourcade",
  title =        "{Brandt}'s fully private auction protocol revisited",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "587--610",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150535",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Merlo:2015:MEP,
  author =       "Alessio Merlo and Mauro Migliardi and Paolo
                 Fontanelli",
  title =        "Measuring and estimating power consumption in
                 {Android} to support energy-based intrusion detection",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "611--637",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150530",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2015:RPS,
  author =       "Anonymous",
  title =        "Regular Paper Section",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "639--639",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Belim:2015:AGR,
  author =       "Sergey Belim and Nadezda Bogachenko and Evgeniy
                 Ilushechkin",
  title =        "An analysis of graphs that represent a role-based
                 security policy hierarchy",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "641--657",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150532",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2015:NAC,
  author =       "Jin Li and Xiaofeng Chen and Jingwei Li and Chunfu Jia
                 and Jianfeng Ma and Wenjing Lou",
  title =        "New access control systems based on outsourced
                 attribute-based encryption",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "659--683",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150533",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:51 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Alshehri:2015:FFS,
  author =       "Ali Alshehri and Steve Schneider",
  title =        "A formal framework for security analysis of {NFC}
                 mobile coupon protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "685--707",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150531",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:51 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bonatti:2015:EDR,
  author =       "Piero Bonatti and Clemente Galdi and Davide Torres",
  title =        "Event-driven {RBAC}",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "709--757",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150539",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:51 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mallios:2015:PCE,
  author =       "Yannis Mallios and Lujo Bauer and Dilsun Kaynar and
                 Fabio Martinelli and Charles Morisset",
  title =        "Probabilistic cost enforcement of security policies",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "759--787",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150538",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:51 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2015:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 23 (2015)",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "789--791",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:51 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bohl:2016:SUC,
  author =       "Florian B{\"o}hl and Dominique Unruh",
  title =        "Symbolic universal composability",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "1--38",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140523",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:55 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Rafnsson:2016:SME,
  author =       "Willard Rafnsson and Andrei Sabelfeld",
  title =        "Secure multi-execution: Fine-grained,
                 declassification-aware, and transparent",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "39--90",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150541",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:55 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Luo:2016:MCM,
  author =       "Zhengqin Luo and Jos{\'e} Fragoso Santos and Ana
                 Almeida Matos and Tamara Rezk",
  title =        "{Mashic} compiler: Mashup sandboxing based on
                 inter-frame communication",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "91--136",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160542",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:55 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Carter:2016:SOG,
  author =       "Henry Carter and Benjamin Mood and Patrick Traynor and
                 Kevin Butler",
  title =        "Secure outsourced garbled circuit evaluation for
                 mobile devices",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "137--180",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150540",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hedin:2016:IFS,
  author =       "Daniel Hedin and Luciano Bello and Andrei Sabelfeld",
  title =        "Information-flow security for {JavaScript} and its
                 {APIs}",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "181--234",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160544",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Taglienti:2016:UAP,
  author =       "Claudio Taglienti and James Cannady",
  title =        "The user attribution problem and the challenge of
                 persistent surveillance of user activity in complex
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "235--288",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160546",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chen:2016:PEP,
  author =       "Yu Chen and Zongyang Zhang",
  title =        "Publicly evaluable pseudorandom functions and their
                 applications",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "289--320",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160547",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Vavilis:2016:SBQ,
  author =       "Sokratis Vavilis and Milan Petkovi{\'c} and Nicola
                 Zannone",
  title =        "A severity-based quantification of data leakages in
                 database systems",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "321--345",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160543",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:2016:EIC,
  author =       "Sabrina {De Capitani di Vimercati} and Sara Foresti
                 and Sushil Jajodia and Stefano Paraboschi and
                 Pierangela Samarati",
  title =        "Efficient integrity checks for join queries in the
                 cloud",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "347--378",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160545",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Le:2016:MCR,
  author =       "Meixing Le and Krishna Kant and Malek Athamnah and
                 Sushil Jajodia",
  title =        "Minimum cost rule enforcement for cooperative database
                 access",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "379--403",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160548",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jing:2016:TML,
  author =       "Yiming Jing and Gail-Joon Ahn and Hongxin Hu and
                 Haehyun Cho and Ziming Zhao",
  title =        "{TripleMon}: A multi-layer security framework for
                 mediating inter-process communication on {Android}",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "405--426",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160552",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bodei:2016:CAS,
  author =       "Chiara Bodei and Pierpaolo Degano and Letterio
                 Galletta and Francesco Salvatori",
  title =        "Context-aware security: Linguistic mechanisms and
                 static analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "427--477",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160551",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DiCrescenzo:2016:PPP,
  author =       "Giovanni {Di Crescenzo} and Debra L. Cook and Allen
                 McIntosh and Euthimios Panagos",
  title =        "Practical and privacy-preserving information retrieval
                 from a database table",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "479--506",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160550",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kar:2016:SSI,
  author =       "Debabrata Kar and Suvasini Panigrahi and Srikanth
                 Sundararajan",
  title =        "{SQLiDDS}: {SQL} injection detection using document
                 similarity measure",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "507--539",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160554",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 12 16:13:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lester:2016:IFA,
  author =       "Martin Lester and Luke Ong and Max Sch{\"a}fer",
  title =        "Information flow analysis for a dynamically typed
                 language with staged metaprogramming",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "541--582",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160557",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:06 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kremer:2016:AAS,
  author =       "Steve Kremer and Robert K{\"u}nnemann",
  title =        "Automated analysis of security protocols with global
                 state",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "583--616",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160556",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:06 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DSouza:2016:MCT,
  author =       "Deepak D'Souza and K. R. Raghavendra",
  title =        "Model-checking trace-based information flow properties
                 for infinite-state systems",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "617--643",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160549",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:06 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sonchack:2016:ELS,
  author =       "John Sonchack and Adam J. Aviv",
  title =        "Exploring large scale security system reproducibility
                 with the {LESS} simulator",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "645--665",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160553",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:06 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Davidson:2016:CSS,
  author =       "Michal Davidson and Tamir Tassa and Ehud Gudes",
  title =        "Content sharing schemes in {DRM} systems with enhanced
                 performance and privacy preservation",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "667--688",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15746",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{deAmorim:2016:VIF,
  author =       "Arthur Azevedo de Amorim and Nathan Collins and
                 Andr{\'e} DeHon and Delphine Demange and
                 C{\u{a}}t{\u{a}}lin Hri{\c{t}}cu and David Pichardie
                 and Benjamin C. Pierce and Randy Pollack and Andrew
                 Tolmach",
  title =        "A verified information-flow architecture",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "689--734",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15784",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Jajodia:2016:UTP,
  author =       "Sushil Jajodia and Noseong Park and Edoardo Serra and
                 V. S. Subrahmanian",
  title =        "Using temporal probabilistic logic for optimal
                 monitoring of security events with limited resources",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "735--791",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160555",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guanciale:2016:PSM,
  author =       "Roberto Guanciale and Hamed Nemati and Mads Dam and
                 Christoph Baumann",
  title =        "Provably secure memory isolation for {Linux} on
                 {ARM}",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "793--837",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-160558",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2016:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 24 (2016)",
  journal =      j-J-COMP-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "839--841",
  month =        "????",
  year =         "2016",
  CODEN =        "JCSIET",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Halpern:2017:QQP,
  author =       "Joseph Y. Halpern",
  title =        "From qualitative to quantitative proofs of security
                 properties using first-order conditional logic",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "1--19",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15774",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cortier:2017:FAN,
  author =       "V{\'e}ronique Cortier and Cyrille Wiedling",
  title =        "A formal analysis of the {Norwegian} {E}-voting
                 protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "21--57",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15777",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Wuller:2017:DPP,
  author =       "Stefan W{\"u}ller and Daniel Mayer and Fabian F{\"o}rg
                 and Samuel Sch{\"u}ppen and Benjamin Assadsolimani and
                 Ulrike Meyer and Susanne Wetzel",
  title =        "Designing privacy-preserving interval operations based
                 on homomorphic encryption and secret sharing
                 techniques",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "59--81",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16830",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Crampton:2017:BOW,
  author =       "Jason Crampton and Gregory Gutin and Daniel Karapetyan
                 and R{\'e}mi Watrigant",
  title =        "The bi-objective workflow satisfiability problem and
                 workflow resiliency",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "83--115",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16849",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Continella:2017:PAW,
  author =       "Andrea Continella and Michele Carminati and Mario
                 Polino and Andrea Lanzi and Stefano Zanero and Federico
                 Maggi",
  title =        "{Prometheus}: Analyzing {WebInject}-based information
                 stealers",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "117--137",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15773",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:09 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guan:2017:SKE,
  author =       "Albert Guan and Wen-Guey Tzeng",
  title =        "A secret key establishment protocol for wireless
                 networks using noisy channels",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "139--151",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15807",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:09 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lin:2017:SAC,
  author =       "Chung-Yi Lin and Wen-Guey Tzeng",
  title =        "Strategy analysis for cloud storage reliability
                 management based on game theory",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "153--171",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16813",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:09 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Migault:2017:DEI,
  author =       "Daniel Migault and Tobias Guggemos and Sylvain Killian
                 and Maryline Laurent and Guy Pujolle and Jean Philippe
                 Wary",
  title =        "{Diet-ESP}: {IP} layer security for {IoT}",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "173--203",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16857",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:09 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mohamed:2017:SUD,
  author =       "Manar Mohamed and Song Gao and Niharika Sachdeva and
                 Nitesh Saxena and Chengcui Zhang and Ponnurangam
                 Kumaraguru and Paul C. {Van Oorschot}",
  title =        "On the security and usability of dynamic cognitive
                 game {CAPTCHAs}",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "205--230",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16847",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cheng:2017:SFN,
  author =       "Yao Cheng and Yingjiu Li and Robert Deng and Lingyun
                 Ying and Wei He",
  title =        "A study on a feasible no-root approach on {Android}",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "231--253",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16866",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{dosSantos:2017:AFE,
  author =       "Daniel Ricardo dos Santos and Silvio Ranise and Luca
                 Compagna and Serena Elisa Ponta",
  title =        "Automatically finding execution scenarios to deploy
                 security-sensitive workflows",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "255--282",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16894",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Choo:2017:DOS,
  author =       "Euijin Choo and Ting Yu and Min Chi",
  title =        "Detecting opinion spammer groups and spam targets
                 through community discovery and sentiment analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "283--318",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16941",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Jun 5 17:50:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Murray:2017:SIV,
  author =       "Toby Murray and Andrei Sabelfeld and Lujo Bauer",
  title =        "Special issue on verified information flow security",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "4--5",
  pages =        "319--321",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-0559",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:12 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Broberg:2017:PPP,
  author =       "Niklas Broberg and Bart van Delft and David Sands",
  title =        "{Paragon} --- Practical programming with information
                 flow control",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "4--5",
  pages =        "323--365",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15791",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:12 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Liu:2017:FBO,
  author =       "Jed Liu and Owen Arden and Michael D. George and
                 Andrew C. Myers",
  title =        "{Fabric}: Building open distributed systems securely
                 by construction",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "4--5",
  pages =        "367--426",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15805",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:12 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Giffin:2017:HPD,
  author =       "Daniel Giffin and Amit Levy and Deian Stefan and David
                 Terei and David Mazi{\`e}res and John Mitchell and
                 Alejandro Russo",
  title =        "{Hails}: Protecting data privacy in untrusted web
                 applications",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "4--5",
  pages =        "427--461",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15801",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:12 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Rocchetto:2017:IBM,
  author =       "Marco Rocchetto and Luca Vigan{\`o} and Marco Volpe",
  title =        "An interpolation-based method for the verification of
                 security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "463--510",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16832",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:13 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Crampton:2017:CEI,
  author =       "Jason Crampton and Naomi Farley and Gregory Gutin and
                 Mark Jones and Bertram Poettering",
  title =        "Cryptographic enforcement of information flow policies
                 without public information via tree partitions",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "511--535",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16863",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:13 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chen:2017:RDI,
  author =       "Bo Chen and Reza Curtmola",
  title =        "Remote data integrity checking with server-side
                 repair",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "537--584",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16868",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:13 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Kanovich:2017:TCC,
  author =       "Max Kanovich and Tajana Ban Kirigin and Vivek Nigam
                 and Andre Scedrov and Carolyn Talcott",
  title =        "Time, computational complexity, and probability in the
                 analysis of distance-bounding protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "585--630",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-0560",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:13 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Anonymous:2017:AIV,
  author =       "Anonymous",
  title =        "Author Index Volume 25 (2017)",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "631--633",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:13 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Moataz:2018:SSE,
  author =       "Tarik Moataz and Indrajit Ray and Indrakshi Ray and
                 Abdullatif Shikfa and Fr{\'e}d{\'e}ric Cuppens and Nora
                 Cuppens",
  title =        "Substring search over encrypted data",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "1--30",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-14652",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Preda:2018:CPD,
  author =       "Mila Dalla Preda and Isabella Mastroeni",
  title =        "Characterizing a property-driven obfuscation
                 strategy",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "31--69",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-14672",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sprenger:2018:RSP,
  author =       "Christoph Sprenger and David Basin",
  title =        "Refining security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "71--120",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16814",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Stoller:2018:MHT,
  author =       "Scott D. Stoller and Thang Bui",
  title =        "Mining hierarchical temporal roles with multiple
                 metrics",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "121--142",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-17989",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{DeCapitanidiVimercati:2018:EAW,
  author =       "Sabrina {De Capitani di Vimercati} and Sara Foresti
                 and Stefano Paraboschi and Gerardo Pelosi and
                 Pierangela Samarati",
  title =        "Enforcing authorizations while protecting access
                 confidentiality",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "143--175",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171004",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:15 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Levy:2018:SHB,
  author =       "Silvie Levy and Ehud Gudes and Nurit Gal-Oz",
  title =        "Sharing-habits based privacy control in social
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "177--205",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171012",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:15 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Neville:2018:RAF,
  author =       "Ultan Neville and Simon N. Foley",
  title =        "Reasoning about firewall policies through refinement
                 and composition",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "207--254",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-17971",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:15 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gupta:2018:SCA,
  author =       "Haritabh Gupta and Shamik Sural and Vijayalakshmi
                 Atluri and Jaideep Vaidya",
  title =        "A side-channel attack on smartphones: Deciphering key
                 taps using built-in microphones",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "255--281",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-17975",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:15 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Diao:2018:AMU,
  author =       "Wenrui Diao and Rui Liu and Xiangyu Liu and Zhe Zhou
                 and Zhou Li and Kehuan Zhang",
  title =        "Accessing mobile user's privacy based on {IME}
                 personalization: Understanding and practical attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "283--309",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16909",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Shirvanian:2018:SVI,
  author =       "Maliheh Shirvanian and Nitesh Saxena and Dibya
                 Mukhopadhyay",
  title =        "Short voice imitation man-in-the-middle attacks on
                 {Crypto Phones}: Defeating humans and machines",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "311--333",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-17970",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bischof:2018:LDS,
  author =       "Simon Bischof and Joachim Breitner and J{\"u}rgen Graf
                 and Martin Hecker and Martin Mohr and Gregor Snelting",
  title =        "Low-deterministic security for low-nondeterministic
                 programs",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "335--366",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-17984",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blanchet:2018:ARE,
  author =       "Bruno Blanchet and Ben Smyth",
  title =        "Automated reasoning for equivalences in the applied pi
                 calculus with barriers",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "367--422",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171013",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ranise:2018:AEA,
  author =       "Silvio Ranise and Anh Truong and Luca Vigan{\`o}",
  title =        "Automated and efficient analysis of administrative
                 temporal {RBAC} policies with role hierarchies",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "423--458",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15756",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nguyen:2018:ASP,
  author =       "Binh Thanh Nguyen and Christoph Sprenger and Cas
                 Cremers",
  title =        "Abstractions for security protocol verification",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "459--508",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-15769",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Giustolisi:2018:ICM,
  author =       "Rosario Giustolisi and Giampaolo Bella and Gabriele
                 Lenzini",
  title =        "Invalid certificates in modern browsers: a
                 socio-technical analysis",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "509--541",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16891",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Balagani:2018:IAC,
  author =       "Kiran S. Balagani and Paolo Gasti and Aaron Elliott
                 and Azriel Richardson and Mike O'Neal",
  title =        "The impact of application context on privacy and
                 performance of keystroke authentication systems",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "543--556",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171017",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hallgren:2018:AB,
  author =       "Per Hallgren and Ravi Kishore and Mart{\'\i}n Ochoa
                 and Andrei Sabelfeld",
  title =        "Assuring {BetterTimes}",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "557--587",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171085",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Luckett:2018:ISM,
  author =       "Patrick Luckett and J. Todd McDonald and William B.
                 Glisson and Ryan Benton and Joel Dawson and Blair A.
                 Doyle",
  title =        "Identifying stealth malware using {CPU} power
                 consumption and learning algorithms",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "589--613",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171060",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:18 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chakraborty:2018:HAD,
  author =       "Tanmoy Chakraborty and Sushil Jajodia and Noseong Park
                 and Andrea Pugliese and Edoardo Serra and V. S.
                 Subrahmanian",
  title =        "Hybrid adversarial defense: Merging honeypots and
                 traditional security methods",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "615--645",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171094",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:18 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chen:2018:KSQ,
  author =       "Ling Chen and Ting Yu and Rada Chirkova",
  title =        "{$k$-Skyband} query answering with differential
                 privacy",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "647--676",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:18 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Fuhry:2018:HPS,
  author =       "Benny Fuhry and Raad Bahmani and Ferdinand Brasser and
                 Florian Hahn and Florian Kerschbaum and Ahmad-Reza
                 Sadeghi",
  title =        "{HardIDX}: Practical and secure index with {SGX} in a
                 malicious environment",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "677--706",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171103",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:18 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Han:2018:RAM,
  author =       "Jin Han and Wangyu Zang and Li Liu and Songqing Chen
                 and Meng Yu",
  title =        "Risk-aware multi-objective optimized virtual machine
                 placement in the cloud",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "707--730",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:18 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lorenzi:2018:TDR,
  author =       "David Lorenzi and Emre Uzun and Jaideep Vaidya and
                 Shamik Sural and Vijayalakshmi Atluri",
  title =        "Towards designing robust {CAPTCHAs}",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "6",
  pages =        "731--760",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-17947",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:19 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Borbor:2018:SUV,
  author =       "Daniel Borbor and Lingyu Wang and Sushil Jajodia and
                 Anoop Singhal",
  title =        "Surviving unpatchable vulnerabilities through
                 heterogeneous network hardening options",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "6",
  pages =        "761--789",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171106",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:19 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zhang:2018:PPV,
  author =       "Jun Zhang and Meiqi He and Gongxian Zeng and Siu-Ming
                 Yiu",
  title =        "Privacy-preserving verifiable elastic net among
                 multiple institutions in the cloud",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "6",
  pages =        "791--815",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171107",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:19 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Barenghi:2018:SPX,
  author =       "Alessandro Barenghi and Nicholas Mainardi and Gerardo
                 Pelosi",
  title =        "Systematic parsing of {X.509}: Eradicating security
                 issues with a parse tree",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "6",
  pages =        "817--849",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171110",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:19 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Maffei:2019:GOP,
  author =       "Matteo Maffei and Giulio Malavolta and Manuel Reinert
                 and Dominique Schr{\"o}der",
  title =        "Group {ORAM} for privacy and access control in
                 outsourced personal records",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "1",
  pages =        "1--47",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171030",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:20 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Salva:2019:CAS,
  author =       "S{\'e}bastien Salva and Loukmen Regainia",
  title =        "A catalogue associating security patterns and attack
                 steps to design secure applications",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "1",
  pages =        "49--74",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171063",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:20 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Demay:2019:PSS,
  author =       "Gr{\'e}gory Demay and Peter Ga{\v{z}}i and Ueli Maurer
                 and Bj{\"o}rn Tackmann",
  title =        "Per-session security: Password-based cryptography
                 revisited",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "1",
  pages =        "75--111",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-181131",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:20 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Armknecht:2019:PIR,
  author =       "Frederik Armknecht and Zinaida Benenson and Philipp
                 Morgner and Christian M{\"u}ller and Christian Riess",
  title =        "Privacy implications of room climate data",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "1",
  pages =        "113--136",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-181133",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:20 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Blazy:2019:VCT,
  author =       "Sandrine Blazy and David Pichardie and Alix Trieu",
  title =        "Verifying constant-time implementations by abstract
                 interpretation",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "1",
  pages =        "137--163",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-181136",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:20 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Majumdar:2019:LPD,
  author =       "Suryadipta Majumdar and Azadeh Tabiban and Yosr
                 Jarraya and Momen Oqaily and Amir Alimohammadifar and
                 Makan Pourzandi and Lingyu Wang and Mourad Debbabi",
  title =        "Learning probabilistic dependencies among events for
                 proactive security auditing in clouds",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "2",
  pages =        "165--202",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-181137",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cremers:2019:SAG,
  author =       "Cas Cremers and Martin Dehnel-Wild and Kevin Milner",
  title =        "Secure authentication in the grid: a formal analysis
                 of {DNP3 SAv5}",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "2",
  pages =        "203--232",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-181139",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Calzavara:2019:SSH,
  author =       "Stefano Calzavara and Alvise Rabitti and Michele
                 Bugliesi",
  title =        "Sub-session hijacking on the web: Root causes and
                 prevention",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "2",
  pages =        "233--257",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-181149",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Tian:2019:DSD,
  author =       "Yangguang Tian and Yingjiu Li and Guomin Yang and
                 Willy Susilo and Yi Mu and Hui Cui and Yinghui Zhang",
  title =        "{DABKE}: Secure deniable attribute-based key exchange
                 framework",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "2",
  pages =        "259--275",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-181201",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hirschi:2019:MUV,
  author =       "Lucca Hirschi and David Baelde and St{\'e}phanie
                 Delaune",
  title =        "A method for unbounded verification of privacy-type
                 properties",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "3",
  pages =        "277--342",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171070",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:22 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zavatteri:2019:LMS,
  author =       "Matteo Zavatteri and Luca Vigan{\`o}",
  title =        "Last man standing: Static, decremental and dynamic
                 resiliency via controller synthesis",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "3",
  pages =        "343--373",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-181244",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:22 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Yu:2019:CAF,
  author =       "Xingjie Yu and Michael Shiwen Thang and Yingjiu Li and
                 Robert Huijie Deng",
  title =        "Collusion attacks and fair time-locked deposits for
                 fast-payment transactions in {Bitcoin}",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "3",
  pages =        "375--403",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-191274",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:22 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Balagani:2019:PPP,
  author =       "Kiran Balagani and Matteo Cardaioli and Mauro Conti
                 and Paolo Gasti and Martin Georgiev and Tristan Gurtler
                 and Daniele Lain and Charissa Miller and Kendall Molas
                 and Nikita Samarin and Eugen Saraci and Gene Tsudik and
                 Lynn Wu",
  title =        "{PILOT}: Password and {PIN} information leakage from
                 obfuscated typing videos",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "4",
  pages =        "405--425",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-191289",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Alhebaishi:2019:MIT,
  author =       "Nawaf Alhebaishi and Lingyu Wang and Sushil Jajodia
                 and Anoop Singhal",
  title =        "Mitigating the insider threat of remote administrators
                 in clouds through maintenance task assignments",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "4",
  pages =        "427--458",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-191306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Urban:2019:ALP,
  author =       "Tobias Urban and Dennis Tatang and Thorsten Holz and
                 Norbert Pohlmann",
  title =        "Analyzing leakage of personal information by malware",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "4",
  pages =        "459--481",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-191287",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Batra:2019:DAP,
  author =       "Gunjan Batra and Vijayalakshmi Atluri and Jaideep
                 Vaidya and Shamik Sural",
  title =        "Deploying {ABAC} policies using {RBAC} systems",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "4",
  pages =        "483--506",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-191315",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Stergiopoulos:2019:USC,
  author =       "George Stergiopoulos and Georgia Chronopoulou and
                 Evangelos Bitsikas and Nikolaos Tsalis and Dimitris
                 Gritzalis",
  title =        "Using side channel {TCP} features for real-time
                 detection of malware connections",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "5",
  pages =        "507--520",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-191286",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Rubio:2019:TAI,
  author =       "Juan E. Rubio and Rodrigo Roman and Cristina Alcaraz
                 and Yan Zhang",
  title =        "Tracking {APTs} in industrial ecosystems: a proof of
                 concept",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "5",
  pages =        "521--546",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-191293",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ma:2019:TOP,
  author =       "Ziqiang Ma and Quanwei Cai and Jingqiang Lin and Bo
                 Luo and Jiwu Jing",
  title =        "Towards the optimal performance of integrating {Warm
                 and Delay} against remote cache timing side channels on
                 block ciphers",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "5",
  pages =        "547--580",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-191296",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}