Table of contents for issues of Journal of Computer Security

Last update: Fri Sep 29 09:39:51 MDT 2023                Valid HTML 3.2!

Volume 1, Number 1, 1992
Volume 1, Number 2, 1992
Volume 1, Number 3--4, 1992
Volume 2, Number 2--3, 1993
Volume 2, Number 4, 1993
Volume 3, Number 1, 1995
Volume 3, Number 2--3, 1995
Volume 3, Number 4, 1995
Volume 4, Number 1, 1996
Volume 4, Number 2--3, 1996
Volume 4, Number 4, 1996
Volume 5, Number 1, 1997
Volume 5, Number 2, 1997
Volume 5, Number 3, 1997
Volume 5, Number 4, 1997
Volume 6, Number 1--2, 1998
Volume 6, Number 3, 1998
Volume 6, Number 4, 1998
Volume 7, Number 1, 1999
Volume 7, Number 2--3, 1999
Volume 7, Number 4, 1999
Volume 8, Number 1, 2000
Volume 8, Number 2--3, 2000
Volume 8, Number 4, 2000
Volume 9, Number 1--2, 2001
Volume 9, Number 3, 2001
Volume 9, Number 4, 2001
Volume 10, Number 1--2, 2002
Volume 10, Number 3, 2002
Volume 10, Number 4, 2002
Volume 11, Number 1, 2003
Volume 11, Number 2, 2003
Volume 11, Number 3, 2003
Volume 11, Number 4, 2003
Volume 12, Number 1, 2004
Volume 12, Number 2, 2004
Volume 12, Number 3--4, 2004
Volume 12, Number 5, 2004
Volume 12, Number 6, 2004
Volume 13, Number 1, 2005
Volume 13, Number 2, 2005
Volume 13, Number 3, 2005
Volume 13, Number 4, 2005
Volume 13, Number 5, 2005
Volume 13, Number 6, 2005
Volume 14, Number 1, 2006
Volume 14, Number 2, 2006
Volume 14, Number 3, 2006
Volume 14, Number 4, 2006
Volume 14, Number 5, 2006
Volume 14, Number 6, 2006
Volume 15, Number 1, 2007
Volume 15, Number 2, 2007
Volume 15, Number 3, 2007
Volume 15, Number 4, 2007
Volume 15, Number 5, 2007
Volume 15, Number 6, 2007
Volume 16, Number 1, 2008
Volume 16, Number 2, 2008
Volume 16, Number 3, 2008
Volume 16, Number 4, 2008
Volume 16, Number 5, 2008
Volume 16, Number 6, 2008
Volume 17, Number 1, 2009
Volume 17, Number 2, 2009
Volume 17, Number 3, 2009
Volume 17, Number 4, 2009
Volume 17, Number 5, 2009
Volume 17, Number 6, 2009
Volume 18, Number 1, 2010
Volume 18, Number 2, 2010
Volume 18, Number 3, 2010
Volume 18, Number 4, 2010
Volume 18, Number 5, 2010
Volume 18, Number 6, 2010
Volume 19, Number 1, 2011
Volume 19, Number 2, 2011
Volume 19, Number 3, 2011
Volume 19, Number 4, 2011
Volume 19, Number 5, 2011
Volume 19, Number 6, 2011
Volume 20, Number 1, 2012
Volume 20, Number 2--3, 2012
Volume 20, Number 4, 2012
Volume 20, Number 5, 2012
Volume 20, Number 6, 2012
Volume 21, Number 1, 2013
Volume 21, Number 2, 2013
Volume 21, Number 3, 2013
Volume 21, Number 4, 2013
Volume 21, Number 5, 2013
Volume 21, Number 6, 2013
Volume 22, Number 1, 2014
Volume 22, Number 2, 2014
Volume 22, Number 3, 2014
Volume 22, Number 4, 2014
Volume 22, Number 5, 2014
Volume 22, Number 6, 2014
Volume 23, Number 1, 2015
Volume 23, Number 2, 2015
Volume 23, Number 3, 2015
Volume 23, Number 4, 2015
Volume 23, Number 5, 2015
Volume 23, Number 6, 2015
Volume 24, Number 1, 2016
Volume 24, Number 2, 2016
Volume 24, Number 3, 2016
Volume 24, Number 4, 2016
Volume 24, Number 5, 2016
Volume 24, Number 6, 2016
Volume 25, Number 1, 2017
Volume 25, Number 2, 2017
Volume 25, Number 3, 2017
Volume 25, Number 4--5, 2017
Volume 25, Number 6, 2017
Volume 26, Number 1, 2018
Volume 26, Number 2, 2018
Volume 26, Number 3, 2018
Volume 26, Number 4, 2018
Volume 26, Number 5, 2018
Volume 26, Number 6, 2018
Volume 27, Number 1, 2019
Volume 27, Number 2, 2019
Volume 27, Number 3, 2019
Volume 27, Number 4, 2019
Volume 27, Number 5, 2019


Journal of Computer Security
Volume 1, Number 1, 1992

             Sushil Jajodia and   
                Jonathan Millen   Editors' Preface . . . . . . . . . . . . 1--3
              Catherine Meadows   Applying Formal Methods to the Analysis
                                  of a Key Management Protocol . . . . . . 5--35
                    John McLean   Proving Noninterference and Functional
                                  Correctness Using Traces . . . . . . . . 37--57
                 Ravi S. Sandhu   Expressive Power of the Schematic
                                  Protection Model . . . . . . . . . . . . 59--98
              Pierre Bieber and   
 Frédéric Cuppens   A Logical View of Secure Dependencies    99--129
                      Anonymous   Call for Papers: European Symposium on
                                  Research in Computer Security  . . . . . 131--131

Journal of Computer Security
Volume 1, Number 2, 1992

                    Ravi Sandhu   Guest Editor's Preface . . . . . . . . . 131--132
              Sarbari Gupta and   
               Virgil D. Gligor   Towards a Theory of
                                  Penetration-Resistant Systems and Its
                                  Applications . . . . . . . . . . . . . . 133--158
                 Simon N. Foley   Aggregation and Separation as
                                  Noninterference Properties . . . . . . . 159--188
                   Amihai Motro   A Unified Model for Security and
                                  Integrity in Relational Databases  . . . 189--213

Journal of Computer Security
Volume 1, Number 3--4, 1992

             Sushil Jajodia and   
                Jonathan Millen   Editors' Preface . . . . . . . . . . . . 215--215
             Teresa F. Lunt and   
                    John McLean   Guest Editors' Preface . . . . . . . . . 217--218
                   John C. Wray   An Analysis of Covert Timing Channels    219--232
                    Wei-Ming Hu   Reducing Timing Channels with Fuzzy Time 233--254
              James W. Gray III   Toward a Mathematical Foundation for
                                  Information Flow Security  . . . . . . . 255--294
            Joseph J. Tardo and   
               Kannan Alagappan   SPX: Global Authentication Using Public
                                  Key Certificates . . . . . . . . . . . . 295--316
               Paul F. Syverson   Knowledge, Belief, and Semantics in the
                                  Analysis of Cryptographic Protocols  . . 317--334
             Paul E. Ammann and   
                 Ravi S. Sandhu   The Extended Schematic Protection Model  335--383
                   Jeremy Jacob   Basic Theorems about Security  . . . . . 385--411
                      Anonymous   Author Index . . . . . . . . . . . . . . 413--413


Journal of Computer Security
Volume 2, Number 2--3, 1993

             Sushil Jajodia and   
                Jonathan Millen   Editors' Preface . . . . . . . . . . . . 85--85
                John McLean and   
               Richard Kemmerer   Guest Editors' Preface . . . . . . . . . 87--88
             Jonathan K. Millen   A Resource Allocation Model for Denial
                                  of Service Protection  . . . . . . . . . 89--106
           Thomas Y. C. Woo and   
                   Simon S. Lam   Authorization in Distributed Systems: A
                                  New Approach . . . . . . . . . . . . . . 107--136
           Virgil D. Gligor and   
              Shyh-Wei Luan and   
                 Joseph N. Pato   On Inter-Realm Authentication in Large
                                  Distributed Systems  . . . . . . . . . . 137--157
             Jeremy Epstein and   
                John McHugh and   
              Hilarie Orman and   
               Rita Pascale and   
         Ann Marmor-Squires and   
              Bonnie Danner and   
          Charles R. Martin and   
            Martha Branstad and   
               Glenn Benson and   
                   Doug Rothnie   A High Assurance Window System Prototype 159--190
                Raphael Yahalom   Optimality of Asynchronous Two-Party
                                  Secure Data-Exchange Protocols . . . . . 191--209
             Bev Littlewood and   
         Sarah Brocklehurst and   
              Norman Fenton and   
               Peter Mellor and   
                Stella Page and   
               David Wright and   
                John Dobson and   
              John McDermid and   
                Dieter Gollmann   Towards Operational Measures of Computer
                                  Security . . . . . . . . . . . . . . . . 211--229
           Roshan K. Thomas and   
                 Ravi S. Sandhu   A Kernelized Architecture for Multilevel
                                  Secure Object-Oriented Databases
                                  Supporting Write-Up  . . . . . . . . . . 231--275

Journal of Computer Security
Volume 2, Number 4, 1993

                Jonathan Millen   Editor's Preface . . . . . . . . . . . . 277--277
               J. D. Horton and   
               R. H. Cooper and   
               W. F. Hyslop and   
            B. G. Nickerson and   
                 O. K. Ward and   
             Robert Harland and   
                Elton Ashby and   
                  W. M. Stewart   The Cascade Vulnerability Problem  . . . 279--290
            Jonathan T. Trostle   Modelling a Fuzzy Time System  . . . . . 291--309
       Vijayalakshmi Atluri and   
             Sushil Jajodia and   
                  Elisa Bertino   Achieving Stricter Correctness
                                  Requirements in Multilevel Secure
                                  Database Management Systems  . . . . . . 311--351
                      Anonymous   Author Index . . . . . . . . . . . . . . 353--354


Journal of Computer Security
Volume 3, Number 1, 1995

             Sushil Jajodia and   
                Jonathan Millen   Editors' Preface . . . . . . . . . . . . 1--1
                        Li Gong   Guest Editor's Preface . . . . . . . . . 3--3
           Riccardo Focardi and   
               Roberto Gorrieri   A Classification of Security Properties
                                  for Process Algebras . . . . . . . . . . 5--33
             Jonathan K. Millen   Unwinding Forward Correctability . . . . 35--54
          William R. Bevier and   
               William D. Young   A State-based Approach to
                                  Noninterference  . . . . . . . . . . . . 55--70
              G. J. Simmons and   
              Catherine Meadows   The Role of Trust in Information
                                  Integrity Protocols  . . . . . . . . . . 71--84

Journal of Computer Security
Volume 3, Number 2--3, 1995

             Jonathan K. Millen   Editor's Preface . . . . . . . . . . . . 85--85
                Paul Ammann and   
              Frank Jaeckle and   
                 Sushil Jajodia   Concurrency Control in a Secure
                                  Multilevel Database via a Two-Snapshot
                                  Algorithm  . . . . . . . . . . . . . . . 87--113
                 I. E. Kang and   
                    T. F. Keefe   Transaction Management for Multilevel
                                  Secure Replicated Databases  . . . . . . 115--145
            Thomas H. Hinke and   
          Harry S. Delugach and   
             Asha Chandrasekhar   A Fast Algorithm for Detecting Second
                                  Paths in Database Inference Analysis . . 147--168
              Elisa Bertino and   
               Fabio Origgi and   
            Pierangela Samarati   An Extended Authorization Model for
                                  Object Databases . . . . . . . . . . . . 169--206
       LouAnna Notargiacomo and   
       Barbara T. Blaustein and   
          Catherine D. McCollum   Merging Models: Integrity, Dynamic
                                  Separation of Duty and Trusted Data
                                  Management . . . . . . . . . . . . . . . 207--230

Journal of Computer Security
Volume 3, Number 4, 1995

             Sushil Jajodia and   
                Jonathan Millen   Editors' Preface . . . . . . . . . . . . 231--231
             Simon N. Foley and   
                Jeremy L. Jacob   Specifying Security for Computer
                                  Supported Collaborative Working  . . . . 233--253
                 Liqun Chen and   
            Dieter Gollmann and   
        Christopher J. Mitchell   Distributing Trust Amongst Multiple
                                  Authentication Servers . . . . . . . . . 255--267
             A. Zakinthinos and   
                      E. S. Lee   The Composability of Non-Interference    269--281
                    Matt Bishop   Theft of Information in the Take-Grant
                                  Protection Model . . . . . . . . . . . . 283--308
                  C. Blundo and   
       Luiz A. Frota Mattos and   
                  D. R. Stinson   Multiple Key Distribution Maintaining
                                  User Anonymity via Broadcast Channels    309--322
                      Anonymous   Call for Papers  . . . . . . . . . . . . 323--324
                      Anonymous   Author Index Volume 3  . . . . . . . . . 325--326


Journal of Computer Security
Volume 4, Number 1, 1996

              Elisa Bertino and   
    Gérard Eizenberg and   
               Roger M. Needham   Guest-editors' preface . . . . . . . . . 1--2
           Bruno d'Ausbourg and   
                 Christel Calas   Controlling causal dependencies over a
                                  secure network . . . . . . . . . . . . . 3--25
               A. W. Roscoe and   
          J. C. P. Woodcock and   
                        L. Wulf   Non-interference through determinism . . 27--53
             Ueli M. Maurer and   
               Pierre E. Schmid   A calculus for security boots trapping
                                  in distributed systems . . . . . . . . . 55--80
                  Azad Jiwa and   
            Thomas Hardjono and   
               Jennifer Seberry   Beacons for authentication in
                                  distributed systems  . . . . . . . . . . 81--96
                Ralf Hauser and   
            Philippe Janson and   
                Gene Tsudik and   
        Els Van Herreweghen and   
                    Refik Molva   Robust and secure password and key
                                  change method  . . . . . . . . . . . . . 97--111
                      Anonymous   Information for authors  . . . . . . . . 113--119

Journal of Computer Security
Volume 4, Number 2--3, 1996

             Sushil Jajodia and   
                Jonathan Millen   Editors' preface . . . . . . . . . . . . 121--121
           Shiuh-Pyng Shieh and   
               Virgil D. Gligor   Detecting illicit leakage of information
                                  in operating systems . . . . . . . . . . 123--148
                Paul Ammann and   
             Ravi S. Sandhu and   
                 Richard Lipton   The expressive power of multi-parent
                                  creation in monotonic access control
                                  models . . . . . . . . . . . . . . . . . 149--165
             Dennis Volpano and   
             Cynthia Irvine and   
                 Geoffrey Smith   A sound type system for secure flow
                                  analysis . . . . . . . . . . . . . . . . 167--187
             John McDermott and   
                 Ravi Mukkamala   Analytic performance comparison of
                                  transaction processing algorithms for
                                  the SINTRA replicated-architecture
                                  database system  . . . . . . . . . . . . 189--228
                Jonathan Millen   Editor's preface to the Bell--LaPadula
                                  model  . . . . . . . . . . . . . . . . . 229--231
            Leonard J. LaPadula   Foreword . . . . . . . . . . . . . . . . 233--238
        Leonard J. LaPadula and   
                D. Elliott Bell   MITRE Technical Report 2547, Volume II   239--263

Journal of Computer Security
Volume 4, Number 4, 1996

             Sushil Jajodia and   
                Jonathan Millen   Editors' preface . . . . . . . . . . . . 265--265
          Michael K. Reiter and   
        Matthew K. Franklin and   
               John B. Lacy and   
              Rebecca N. Wright   The $ \Omega $ key management service    267--287
              Shaw-Cheng Chuang   Securing ATM networks  . . . . . . . . . 289--329
                    Matt Bishop   Conspiracy and information flow in the
                                  Take-Grant Protection Model  . . . . . . 331--359
                      Anonymous   Author Index Volume 4 (1996) . . . . . . 361--362


Journal of Computer Security
Volume 5, Number 1, 1997

              Elisa Bertino and   
           Emilio Montolivo and   
                   Helmut Kurth   Guest editors' preface . . . . . . . . . 1--2
              P. A. Bonatti and   
               M. L. Sapino and   
             V. S. Subrahmanian   Merging heterogeneous security orderings 3--29
                   Volkmar Lotz   Threat scenarios as a means to formally
                                  develop secure systems . . . . . . . . . 31--67
              Jan Camenisch and   
                Ueli Maurer and   
                 Markus Stadler   Digital payment systems with passive
                                  anonymity-revoking trustees  . . . . . . 69--89
                  N. Asokan and   
                  G. Tsudik and   
                     M. Waidner   Server-supported signatures  . . . . . . 91--108

Journal of Computer Security
Volume 5, Number 2, 1997

             Sushil Jajodia and   
                Jonathan Millen   Editors' preface . . . . . . . . . . . . 109--109
                Michael Merritt   Guest editor's preface . . . . . . . . . 111--112
              Dahlia Malkhi and   
                 Michael Reiter   A high-throughput secure reliable
                                  multicast protocol . . . . . . . . . . . 113--127
                  Jane Sinclair   Action systems for security
                                  specification  . . . . . . . . . . . . . 129--154
Sabrina De Capitani di Vimercati and   
            Pierangela Samarati   Authorization specification and
                                  enforcement in federated database
                                  systems  . . . . . . . . . . . . . . . . 155--188

Journal of Computer Security
Volume 5, Number 3, 1997

              Elisa Bertino and   
        Pierangela Samarati and   
               Gian Paolo Rossi   Special issue on Security in the World
                                  Wide Web (WWW) . . . . . . . . . . . . . 189--190
               F. Bergadano and   
                  B. Crispo and   
                       M. Lomas   Strong authentication and privacy with
                                  standard browsers  . . . . . . . . . . . 191--212
    Jean-Jacques Quisquater and   
                      Marc Joye   Authentication of sequences with the
                                  SL$_2$ hash function: application to
                                  video sequences  . . . . . . . . . . . . 213--223
        Ciarán Bryce and   
   Winfried Kühnhauser and   
       Rémy Amouroux and   
      Mauricio López and   
                   Harry Rudnik   CWASAR: a European infrastructure for
                                  secure electronic commerce . . . . . . . 225--235
           Paul F. Syverson and   
            Michael G. Reed and   
            David M. Goldschlag   Private Web browsing . . . . . . . . . . 237--248
     Martin Röscheisen and   
                 Terry Winograd   A network-centric design for
                                  relationship-based security and access
                                  control  . . . . . . . . . . . . . . . . 249--254
                M. Winslett and   
                   N. Ching and   
                   V. Jones and   
                    I. Slepchin   Using digital credentials on the World
                                  Wide Web . . . . . . . . . . . . . . . . 255--267

Journal of Computer Security
Volume 5, Number 4, 1997

        Pierangela Samarati and   
                    Ravi Sandhu   Guest editors' preface . . . . . . . . . 269--270
                 S. Castano and   
S. De Capitani di Vimercati and   
                   M. G. Fugini   Automated derivation of global
                                  authorizations for database federations  271--301
       Vijayalakshmi Atluri and   
                Wei-Kuang Huang   Enforcing mandatory and discretionary
                                  security in workflow management systems  303--339
        S. A. Demurjian Sr. and   
                     T. C. Ting   Towards a definitive paradigm for
                                  security in object-oriented systems and
                                  applications . . . . . . . . . . . . . . 341--382
                      Anonymous   Author Index Volume 5 (1997) . . . . . . 383--384


Journal of Computer Security
Volume 6, Number 1--2, 1998

                 Simon N. Foley   Guest editors' preface . . . . . . . . . 1--1
            Martín Abadi   On SDSI's linked local name spaces . . . 3--21
          James W. Gray III and   
         Kin Fai Epsilon Ip and   
                  King-Shan Lui   Provable security for cryptographic
                                  protocols --- exact analysis and
                                  engineering applications . . . . . . . . 23--52
                     Gavin Lowe   Casper: A compiler for the analysis of
                                  security protocols . . . . . . . . . . . 53--84
            Lawrence C. Paulson   The inductive approach to verifying
                                  cryptographic protocols  . . . . . . . . 85--128

Journal of Computer Security
Volume 6, Number 3, 1998

              Tsutomu Matsumoto   Human--computer cryptography: An attempt 129--149
          Steven A. Hofmeyr and   
          Stephanie Forrest and   
                  Anil Somayaji   Intrusion detection using sequences of
                                  system calls . . . . . . . . . . . . . . 151--180
              Indrakshi Ray and   
                Paul Ammann and   
                 Sushil Jajodia   A semantic-based transaction processing
                                  model for multilevel transactions  . . . 181--217

Journal of Computer Security
Volume 6, Number 4, 1998

            Lars R. Knudsen and   
                Keith M. Martin   In search of multiple domain key
                                  recovery . . . . . . . . . . . . . . . . 219--235
        Matthew K. Franklin and   
                  Dahlia Malkhi   Auditable metering with lightweight
                                  security . . . . . . . . . . . . . . . . 237--255
               Fabio Casati and   
            Silvana Castano and   
            Maria Grazia Fugini   Enforcing workflow authorization
                                  constraints using triggers . . . . . . . 257--285
                      Anonymous   Author Index Volume 6 (1998) . . . . . . 287--287


Journal of Computer Security
Volume 7, Number 1, 1999

                Jonathan Millen   Special section on Intrusion Detection   1--1
          Thomas E. Daniels and   
             Eugene H. Spafford   Identification of host audit data to
                                  detect attacks on low-level IP
                                  vulnerabilities  . . . . . . . . . . . . 3--35
             Giovanni Vigna and   
            Richard A. Kemmerer   NetSTAT: A network-based intrusion
                                  detection system . . . . . . . . . . . . 37--71
               Carlo Blundo and   
                Barbara Masucci   A note on the randomness in dynamic
                                  threshold schemes  . . . . . . . . . . . 73--85

Journal of Computer Security
Volume 7, Number 2--3, 1999

                 Simon N. Foley   Guest editor's preface . . . . . . . . . 87--87
                     Gavin Lowe   Towards a completeness result for model
                                  checking of security protocols . . . . . 89--146
               A. W. Roscoe and   
                P. J. Broadfoot   Proving security protocols with model
                                  checkers by data independence techniques 147--190
F. Javier Thayer Fábrega and   
         Jonathan C. Herzog and   
              Joshua D. Guttman   Strand spaces: proving security
                                  protocols correct  . . . . . . . . . . . 191--230
             Dennis Volpano and   
                 Geoffrey Smith   Probabilistic noninterference in a
                                  concurrent language  . . . . . . . . . . 231--253

Journal of Computer Security
Volume 7, Number 4, 1999

                      T. Y. Lin   Guest editor's preface . . . . . . . . . 255--255
              Elisa Bertino and   
                  Elena Ferrari   Secure object deletion and garbage
                                  collection in multilevel object bases    257--285
                 Ehud Gudes and   
          Martin S. Olivier and   
           Reind P. van de Riet   Modelling, specifying and implementing
                                  workflow security in Cyberspace  . . . . 287--315
                Ravi Sandhu and   
            Venkata Bhamidipati   Role-based administration of user-role
                                  assignment: The URA97 model and its
                                  Oracle implementation  . . . . . . . . . 317--342


Journal of Computer Security
Volume 8, Number 1, 2000

                      T. Y. Lin   Guest editor's preface . . . . . . . . . 1--1
       Vijayalakshmi Atluri and   
            Wei-Kuang Huang and   
                  Elisa Bertino   A semantic-based execution model for
                                  multilevel secure workflows  . . . . . . 3--41
                  John Hale and   
                Jody Threet and   
                  Sujeet Shenoi   A ticket-based access control
                                  architecture for object systems  . . . . 43--65
              Adrian Spalka and   
               Armin B. Cremers   Structured name-spaces in secure
                                  databases  . . . . . . . . . . . . . . . 67--86

Journal of Computer Security
Volume 8, Number 2--3, 2000

              Yves Deswarte and   
              Catherine Meadows   Guest editors' preface . . . . . . . . . 87--87
            Günter Karjoth   Authorization in CORBA Security  . . . . 89--108
              Elisa Bertino and   
       Francesco Buccafurri and   
              Elena Ferrari and   
                 Pasquale Rullo   A logic-based approach for enforcing
                                  access control . . . . . . . . . . . . . 109--139
                John Kelsey and   
             Bruce Schneier and   
               David Wagner and   
                     Chris Hall   Side channel cryptanalysis of product
                                  ciphers  . . . . . . . . . . . . . . . . 141--158
              Andreas Wespi and   
         Hervé Debar and   
                Marc Dacier and   
                  Mehdi Nassehi   Fixed- vs. variable-length patterns for
                                  detecting suspicious process behavior    159--181
          Günther Horn and   
                   Bart Preneel   Authentication and payment in future
                                  mobile systems . . . . . . . . . . . . . 183--207
       Vijayalakshmi Atluri and   
                Wei-Kuang Huang   A Petri net based safety analysis of
                                  workflow authorization models  . . . . . 209--240

Journal of Computer Security
Volume 8, Number 4, 2000

               Vijay Atluri and   
                      John Hale   Guest Editor's preface . . . . . . . . . 241--242
                   Peng Liu and   
             Sushil Jajodia and   
          Catherine D. McCollum   Intrusion confinement by isolation in
                                  information systems  . . . . . . . . . . 243--279
                  Chris Clifton   Using sample size to limit exposure to
                                  data mining  . . . . . . . . . . . . . . 281--307
              Elisa Bertino and   
       Piero Andrea Bonatti and   
              Elena Ferrari and   
             Maria Luisa Sapino   Temporal authorization bases: From
                                  specification to integration . . . . . . 309--353


Journal of Computer Security
Volume 9, Number 1--2, 2001

               Paul F. Syverson   Guest Editor's preface . . . . . . . . . 1--2
                Mei Lin Hui and   
                     Gavin Lowe   Fault-preserving simplifying
                                  transformations for security protocols   3--46
         Dawn Xiaodong Song and   
             Sergey Berezin and   
                  Adrian Perrig   Athena: a novel approach to efficient
                                  automatic security protocol analysis . . 47--74
              P. Y. A. Ryan and   
                S. A. Schneider   Process algebra and non-interference . . 75--103
          Joseph Y. Halpern and   
             Ron van der Meyden   A logic for SDSI's linked local name
                                  spaces . . . . . . . . . . . . . . . . . 105--142
              Catherine Meadows   A cost-based framework for analysis of
                                  denial of service in networks  . . . . . 143--164

Journal of Computer Security
Volume 9, Number 3, 2001

             Sushil Jajodia and   
       Vijayalakshmi Atluri and   
            Thomas F. Keefe and   
      Catherine D. McCollum and   
                 Ravi Mukkamala   Multilevel secure transaction processing 165--195
            Lawrence C. Paulson   Relations between secrets: two formal
                                  analyses of the Yahalom protocol . . . . 197--216
Frédéric Besson and   
              Thomas Jensen and   
   Daniel Le Métayer and   
                    Tommy Thorn   Model checking security properties of
                                  control flow graphs  . . . . . . . . . . 217--250

Journal of Computer Security
Volume 9, Number 4, 2001

Sabrina De Capitani di Vimercati and   
            Patrick Lincoln and   
            Livio Ricciulli and   
            Pierangela Samarati   Global infrastructure protection system  251--283
              Dwaine Clarke and   
           Jean-Emile Elien and   
               Carl Ellison and   
              Matt Fredette and   
           Alexander Morcos and   
               Ronald L. Rivest   Certificate chain discovery in SPKI/SDSI 285--322
          Rebecca N. Wright and   
         Patrick D. Lincoln and   
             Jonathan K. Millen   Depender graphs: A method of
                                  fault-tolerant certificate distribution  323--338
                      Anonymous   Author Index Volume 9 (2001) . . . . . . 339--340


Journal of Computer Security
Volume 10, Number 1--2, 2002

                Deborah Frincke   Guest Editor's preface . . . . . . . . . 1--3
                  Wenke Lee and   
                    Wei Fan and   
             Matthew Miller and   
        Salvatore J. Stolfo and   
                     Erez Zadok   Toward cost-sensitive modeling for
                                  intrusion detection and response . . . . 5--22
         Florian Kerschbaum and   
         Eugene H. Spafford and   
                  Diego Zamboni   Using internal sensors and embedded
                                  detectors for intrusion detection  . . . 23--70
          Steven T. Eckmann and   
             Giovanni Vigna and   
            Richard A. Kemmerer   STATL: An attack language for
                                  state-based intrusion detection  . . . . 71--103
           Stuart Staniford and   
          James A. Hoagland and   
            Joseph M. McAlerney   Practical automated detection of
                                  stealthy portscans . . . . . . . . . . . 105--136
                 Yingjiu Li and   
                Ningning Wu and   
               X. Sean Wang and   
                 Sushil Jajodia   Enhancing profiles for anomaly detection
                                  using time granularities . . . . . . . . 137--157
         Diomidis Spinellis and   
             Dimitris Gritzalis   Panoptis: Intrusion detection using a
                                  domain-specific language . . . . . . . . 159--176
                  Alec Yasinsac   An environment for security protocol
                                  intrusion detection  . . . . . . . . . . 177--188
         C. R. Ramakrishnan and   
                       R. Sekar   Model-based analysis of configuration
                                  vulnerabilities  . . . . . . . . . . . . 189--209

Journal of Computer Security
Volume 10, Number 3, 2002

             Sushil Jajodia and   
             Dimitris Gritzalis   Guest Editors' preface . . . . . . . . . 211--211
          Brian Neil Levine and   
                   Clay Shields   Hordes: a multicast based protocol for
                                  anonymity  . . . . . . . . . . . . . . . 213--240
           Piero A. Bonatti and   
            Pierangela Samarati   A uniform framework for regulating
                                  service access and information release
                                  on the Web . . . . . . . . . . . . . . . 241--271
                Ahto Buldas and   
                Peeter Laud and   
                  Helger Lipmaa   Eliminating counterevidence with
                                  applications to accountable certificate
                                  management . . . . . . . . . . . . . . . 273--296
          Rebecca N. Wright and   
         Patrick D. Lincoln and   
             Jonathan K. Millen   Depender graphs: A method of
                                  fault-tolerant certificate distribution  297--297

Journal of Computer Security
Volume 10, Number 4, 2002

 Frédéric Cuppens   Guest Editor's preface . . . . . . . . . 299--300
                   Gerald Brose   Manageable access control for CORBA  . . 301--337
         Gerhard Schellhorn and   
              Wolfgang Reif and   
              Axel Schairer and   
                Paul Karger and   
              Vernon Austel and   
                     David Toll   Verified formal security models for
                                  multiapplicative smart cards . . . . . . 339--367
                  P. Bieber and   
                   J. Cazin and   
                  P. Girard and   
                J.-L. Lanet and   
                   V. Wiels and   
                       G. Zanon   Checking secure interactions of smart
                                  card applets: extended version . . . . . 369--398
                  Ian Welch and   
               Robert J. Stroud   Using reflection as a mechanism for
                                  enforcing security policies on compiled
                                  code . . . . . . . . . . . . . . . . . . 399--432
                      Anonymous   Author Index Volume 10 (2002)  . . . . . 433--434


Journal of Computer Security
Volume 11, Number 1, 2003

          Charles Iheagwara and   
               Andrew Blyth and   
                 Mukesh Singhal   A comparative experimental evaluation
                                  study of intrusion detection system
                                  performance in a gigabit environment . . 1--33
                 Ninghui Li and   
     William H. Winsborough and   
               John C. Mitchell   Distributed credential chain discovery
                                  in trust management  . . . . . . . . . . 35--86
                Giampaolo Bella   Inductive verification of smart card
                                  protocols  . . . . . . . . . . . . . . . 87--132

Journal of Computer Security
Volume 11, Number 2, 2003

               Paul F. Syverson   Guest Editor's preface . . . . . . . . . 133--133
               Peter Sewell and   
                      Jan Vitek   Secure composition of untrusted code:
                                  box $ \pi $, wrappers, and causality
                                  types  . . . . . . . . . . . . . . . . . 135--187
                    Ernie Cohen   First-order verification of
                                  cryptographic protocols  . . . . . . . . 189--216
              James Heather and   
                 Gavin Lowe and   
                Steve Schneider   How to prevent type flaw attacks on
                                  security protocols . . . . . . . . . . . 217--244
              Pankaj Kakkar and   
             Carl A. Gunter and   
            Martín Abadi   Reasoning about secrecy for active
                                  networks . . . . . . . . . . . . . . . . 245--287

Journal of Computer Security
Volume 11, Number 3, 2003

      Bhavani Thuraisingham and   
              Reind van de Riet   Guest Editors' preface . . . . . . . . . 289--289
          Premkumar Devanbu and   
              Michael Gertz and   
             Charles Martel and   
          Stuart G. Stubblebine   Authentic data publication over the
                                  Internet . . . . . . . . . . . . . . . . 291--314
      Daniel Barbará and   
                 Rajni Goel and   
                 Sushil Jajodia   A checksum-based corruption detection
                                  technique  . . . . . . . . . . . . . . . 315--329
                  John Hale and   
              Mauricio Papa and   
                  Sujeet Shenoi   Programmable access control  . . . . . . 331--351
               Wouter Teepe and   
          Reind van de Riet and   
                 Martin Olivier   WorkFlow analyzed for security and
                                  privacy in using databases . . . . . . . 353--363
            C. Altenschmidt and   
                  J. Biskup and   
                  U. Flegel and   
                   Y. Karabulut   Secure mediation: requirements, design,
                                  and architecture . . . . . . . . . . . . 365--398
               Steve Kremer and   
    Jean-François Raskin   A game-based verification of
                                  non-repudiation and fair exchange
                                  protocols  . . . . . . . . . . . . . . . 399--429
         Katherine Campbell and   
         Lawrence A. Gordon and   
             Martin P. Loeb and   
                       Lei Zhou   The economic cost of publicly announced
                                  information security breaches: empirical
                                  evidence from the stock market . . . . . 431--448

Journal of Computer Security
Volume 11, Number 4, 2003

                Steve Schneider   Guest Editor's preface . . . . . . . . . 449--450
           Andrew D. Gordon and   
                   Alan Jeffrey   Authenticity by typing for security
                                  protocols  . . . . . . . . . . . . . . . 451--519
               Eijiro Sumii and   
             Benjamin C. Pierce   Logical relations for encryption . . . . 521--554
            Olivier Pereira and   
        Jean-Jacques Quisquater   Some attacks upon authenticated group
                                  key agreement protocols  . . . . . . . . 555--580
          Joseph Y. Halpern and   
             Ron van der Meyden   A logical reconstruction of SPKI . . . . 581--613
               Heiko Mantel and   
               Andrei Sabelfeld   A unifying approach to the security of
                                  distributed and multi-threaded programs  615--676
               Nancy Durgin and   
              John Mitchell and   
                 Dusko Pavlovic   A compositional logic for proving
                                  security properties of protocols . . . . 677--721
                      Anonymous   Author Index Volume 11 (2003)  . . . . . 723--725


Journal of Computer Security
Volume 12, Number 1, 2004

                 Joshua Guttman   Guest Editor's preface . . . . . . . . . 1--1
             Dominic Hughes and   
               Vitaly Shmatikov   Information hiding, anonymity and
                                  privacy: a modular approach  . . . . . . 3--36
       Alessandra Di Pierro and   
               Chris Hankin and   
               Herbert Wiklicky   Approximate non-interference . . . . . . 37--81
                     Gavin Lowe   Analysing protocols subject to guessing
                                  attacks  . . . . . . . . . . . . . . . . 83--97
         Daniele Micciancio and   
               Bogdan Warinschi   Completeness theorems for the
                                  Abadi--Rogaway language of encrypted
                                  expressions  . . . . . . . . . . . . . . 99--129
               Ajay Chander and   
                  Drew Dean and   
               John C. Mitchell   Reconstructing trust management  . . . . 131--164

Journal of Computer Security
Volume 12, Number 2, 2004

               Dirk Ourston and   
               Sara Matzner and   
              William Stump and   
                  Bryan Hopkins   Coordinated Internet attacks: responding
                                  to attack complexity . . . . . . . . . . 165--190
          Alessandro Aldini and   
             Mario Bravetti and   
               Roberto Gorrieri   A process-algebraic approach for the
                                  analysis of probabilistic
                                  noninterference  . . . . . . . . . . . . 191--245
               Nancy Durgin and   
            Patrick Lincoln and   
              John Mitchell and   
                  Andre Scedrov   Multiset rewriting and the complexity of
                                  bounded security protocols . . . . . . . 247--311

Journal of Computer Security
Volume 12, Number 3--4, 2004

                Steve Schneider   Guest Editor's preface . . . . . . . . . 313--315
                     S. Jha and   
                        T. Reps   Model checking SPKI/SDSI . . . . . . . . 317--353
               Vitaly Shmatikov   Probabilistic analysis of an anonymity
                                  system . . . . . . . . . . . . . . . . . 355--377
            P. J. Broadfoot and   
                   A. W. Roscoe   Embedding agents within the intruder to
                                  detect parallel attacks  . . . . . . . . 379--408
              Joshua D. Guttman   Authentication tests and disjoint
                                  encryption: A design method for security
                                  protocols  . . . . . . . . . . . . . . . 409--433
           Andrew D. Gordon and   
                   Alan Jeffrey   Types and effects for asymmetric
                                  cryptographic protocols  . . . . . . . . 435--483
                 Dominic Duggan   Type-based cryptographic operations  . . 485--550
     Levente Buttyán and   
         Jean-Pierre Hubaux and   
                Srdjan \vCapkun   A formal model of rational exchange and
                                  its application to the analysis of
                                  Syverson's protocol  . . . . . . . . . . 551--587
             Michael Backes and   
           Birgit Pfitzmann and   
            Michael Waidner and   
                Michael Steiner   Polynomial liveness  . . . . . . . . . . 589--617
                     Gavin Lowe   Defining information flow quantity . . . 619--653

Journal of Computer Security
Volume 12, Number 5, 2004

                Lingyu Wang and   
         Duminda Wijesekera and   
                 Sushil Jajodia   Cardinality-based inference control in
                                  data cubes . . . . . . . . . . . . . . . 655--692
          Roberto Di Pietro and   
           Luigi V. Mancini and   
                 Alessandro Mei   Key management for high bandwidth secure
                                  multicast  . . . . . . . . . . . . . . . 693--709
                 Taenam Cho and   
                Sang-Ho Lee and   
                        Won Kim   A group key recovery mechanism based on
                                  logical key hierarchy  . . . . . . . . . 711--736
                 Jian Zhang and   
                  Jian Gong and   
                      Yong Ding   Research on automated rollbackability of
                                  intrusion response . . . . . . . . . . . 737--751
        Florian P. Buchholz and   
                   Clay Shields   Providing process origin information to
                                  aid in computer forensic investigations  753--776
          Charles Iheagwara and   
               Andrew Blyth and   
                 Mukesh Singhal   Cost effective management frameworks for
                                  intrusion detection systems  . . . . . . 777--798

Journal of Computer Security
Volume 12, Number 6, 2004

       Vijayalakshmi Atluri and   
               Soon Ae Chun and   
               Pietro Mazzoleni   Chinese wall security for decentralized
                                  workflow management systems  . . . . . . 799--840
          Premkumar Devanbu and   
              Michael Gertz and   
                April Kwong and   
             Charles Martel and   
              Glen Nuckolls and   
          Stuart G. Stubblebine   Flexible authentication of XML documents 841--864
          Joshua D. Guttman and   
           F. Javier Thayer and   
                 Lenore D. Zuck   The faithfulness of abstract protocol
                                  analysis: Message authentication . . . . 865--891
          Catherine Meadows and   
              Paul Syverson and   
               Iliano Cervesato   Formal specification and analysis of the
                                  Group Domain of Interpretation Protocol
                                  using NPATRL and the NRL Protocol
                                  Analyzer . . . . . . . . . . . . . . . . 893--931
                      Anonymous   Author Index Volume 12 (2004)  . . . . . 933--935


Journal of Computer Security
Volume 13, Number 1, 2005

               Roberto Gorrieri   Guest Editor's preface . . . . . . . . . 1--2
         Stefano Bistarelli and   
           Iliano Cervesato and   
           Gabriele Lenzini and   
               Fabio Martinelli   Relating multiset rewriting and process
                                  algebras for security protocol analysis  3--47
               Chiara Bodei and   
           Pierpaolo Degano and   
                 Corrado Priami   Checking security policies through an
                                  enhanced Control Flow Analysis . . . . . 49--85
           Michele Bugliesi and   
                   Sabina Rossi   Non-interference proof techniques for
                                  the analysis of cryptographic protocols  87--113
          Joshua D. Guttman and   
              Amy L. Herzog and   
           John D. Ramsdell and   
            Clement W. Skorupka   Verifying information flow goals in
                                  Security-Enhanced Linux  . . . . . . . . 115--134
               R. Ramanujam and   
                   S. P. Suresh   Decidability of context-explicit
                                  security protocols . . . . . . . . . . . 135--165
           Vitaly Shmatikov and   
                Carolyn Talcott   Reputation-based trust management  . . . 167--190

Journal of Computer Security
Volume 13, Number 2, 2005

                 E. Bertino and   
                 E. Ferrari and   
                       G. Mella   An approach to cooperative updates of
                                  XML documents in distributed systems . . 191--242
    André Zúquete   An efficient high quality random number
                                  generator for multi-programmed systems   243--263
           Iliano Cervesato and   
            Nancy A. Durgin and   
         Patrick D. Lincoln and   
           John C. Mitchell and   
                  Andre Scedrov   A comparison between strand spaces and
                                  multiset rewriting for security protocol
                                  analysis . . . . . . . . . . . . . . . . 265--316
              James Heather and   
                Steve Schneider   A decision procedure for the existence
                                  of a rank function . . . . . . . . . . . 317--344

Journal of Computer Security
Volume 13, Number 3, 2005

               Riccardo Focardi   Guest Editor's preface . . . . . . . . . 345--345
               Chiara Bodei and   
           Mikael Buchholtz and   
           Pierpaolo Degano and   
           Flemming Nielson and   
             Hanne Riis Nielson   Static validation of security protocols  347--390
             Annalisa Bossi and   
          Damiano Macedonio and   
               Carla Piazza and   
                   Sabina Rossi   Information flow in secure contexts  . . 391--422
               Anupam Datta and   
                 Ante Derek and   
           John C. Mitchell and   
                 Dusko Pavlovic   A derivation system and compositional
                                  logic for security protocols . . . . . . 423--482
          Joseph Y. Halpern and   
               Kevin R. O'Neill   Anonymity and information hiding in
                                  multiagent systems . . . . . . . . . . . 483--514
            Jonathan Millen and   
               Vitaly Shmatikov   Symbolic protocol analysis with an
                                  Abelian group operator or
                                  Diffie--Hellman exponentiation . . . . . 515--564
               Bogdan Warinschi   A computational analysis of the
                                  Needham--Schroeder--(Lowe) protocol  . . 565--591

Journal of Computer Security
Volume 13, Number 4, 2005

             Jaideep Vaidya and   
                  Chris Clifton   Secure set intersection cardinality with
                                  application to association rule mining   593--622
                    Meng Yu and   
                   Peng Liu and   
                     Wanyu Zang   Specifying and using intrusion masking
                                  models to process distributed operations 623--658
        Salvatore J. Stolfo and   
                 Frank Apap and   
              Eleazar Eskin and   
           Katherine Heller and   
            Shlomo Hershkop and   
               Andrew Honig and   
                   Krysta Svore   A comparative evaluation of two
                                  algorithms for Windows Registry Anomaly
                                  Detection  . . . . . . . . . . . . . . . 659--693
            Jonathan Millen and   
               Vitaly Shmatikov   Symbolic protocol analysis with an
                                  Abelian group operator or
                                  Diffie--Hellman exponentiation . . . . . 695--695

Journal of Computer Security
Volume 13, Number 5, 2005

            Giampaolo Bella and   
                     Peter Ryan   Guest Editors' preface . . . . . . . . . 697--697
         Stefano Bistarelli and   
             Simon N. Foley and   
               Barry O'Sullivan   A soft constraint-based approach to the
                                  cascade vulnerability problem  . . . . . 699--720
         Christian Collberg and   
             Tapas Ranjan Sahoo   Software watermarking in the frequency
                                  domain: Implementation, analysis, and
                                  attacks  . . . . . . . . . . . . . . . . 721--755
       Aleksandra Nenadi\'c and   
                 Ning Zhang and   
                         Qi Shi   RSA-based Verifiable and Recoverable
                                  Encryption of Signatures and its
                                  application in certified e-mail delivery 757--777
         Christos Siaterlis and   
               Vasilis Maglaris   One step ahead to multisensor data
                                  fusion for DDoS detection  . . . . . . . 779--806

Journal of Computer Security
Volume 13, Number 6, 2005

          Jarmo Mölsä   Mitigating denial of service attacks: A
                                  tutorial . . . . . . . . . . . . . . . . 807--837
               Rob Sherwood and   
        Bobby Bhattacharjee and   
             Aravind Srinivasan   P5: A protocol for scalable anonymous
                                  communication  . . . . . . . . . . . . . 839--876
          Antonio Pescap\`e and   
                 Giorgio Ventre   Experimental analysis of attacks against
                                  intradomain routing protocols  . . . . . 877--903
                      Anonymous   Author Index Volume 13 (2005)  . . . . . 905--907


Journal of Computer Security
Volume 14, Number 1, 2006

   Véronique Cortier and   
   Stéphanie Delaune and   
              Pascal Lafourcade   A survey of algebraic properties used in
                                  cryptographic protocols  . . . . . . . . 1--43
             Stelvio Cimato and   
           Antonella Cresti and   
                   Paolo D'Arco   A unified model for unconditionally
                                  secure key distribution  . . . . . . . . 45--64
           Riccardo Focardi and   
                   Sabina Rossi   Information flow security in dynamic
                                  contexts . . . . . . . . . . . . . . . . 65--110

Journal of Computer Security
Volume 14, Number 2, 2006

               Riccardo Focardi   Preface  . . . . . . . . . . . . . . . . 111--111
             Chiara Braghin and   
              Daniele Gorla and   
              Vladimiro Sassone   Role-based access control for a
                                  distributed calculus . . . . . . . . . . 113--155
            Andrew C. Myers and   
           Andrei Sabelfeld and   
                Steve Zdancewic   Enforcing Robust Declassification and
                                  Qualified Robustness . . . . . . . . . . 157--196
            Olivier Pereira and   
        Jean-Jacques Quisquater   On the impossibility of building secure
                                  Cliques-type authenticated group key
                                  agreement protocols  . . . . . . . . . . 197--246

Journal of Computer Security
Volume 14, Number 3, 2006

                  Atsuhiro Goto   Preface  . . . . . . . . . . . . . . . . 247--247
          Thibault Candebat and   
                     David Gray   Secure pseudonym management using
                                  mediated identity-based encryption . . . 249--267
 Abhilasha Bhargav-Spantzel and   
       Anna C. Squicciarini and   
                  Elisa Bertino   Establishing and protecting digital
                                  identity in federation systems . . . . . 269--300

Journal of Computer Security
Volume 14, Number 4, 2006

                 Sencun Zhu and   
              Sanjeev Setia and   
                Shouhuai Xu and   
                 Sushil Jajodia   GKMPAN: An Efficient Group Rekeying
                                  Scheme for Secure Multicast in Ad-Hoc
                                  Networks . . . . . . . . . . . . . . . . 301--325
             Arun K. Eamani and   
               A. Prasad Sistla   Language based policy analysis in a SPKI
                                  Trust Management System  . . . . . . . . 327--357
               Jianhong Xia and   
              Sarma Vangala and   
                   Jiang Wu and   
                  Lixin Gao and   
                    Kevin Kwiat   Effective worm detection for various
                                  scan techniques  . . . . . . . . . . . . 359--387

Journal of Computer Security
Volume 14, Number 5, 2006

              Jianying Zhou and   
                 Meng-Chow Kang   Preface  . . . . . . . . . . . . . . . . 389--390
                  Geraint Price   Public Key Infrastructures: A research
                                  agenda . . . . . . . . . . . . . . . . . 391--417
                 M. Lippert and   
             V. Karatsiolis and   
               A. Wiesmaier and   
                    J. Buchmann   Life-cycle management of X.509
                                  certificates based on LDAP directories   419--439
                    Guilin Wang   Generic non-repudiation protocols
                                  supporting transparent off-line TTP  . . 441--467
                   Javier Lopez   Unleashing public-key cryptography in
                                  wireless sensor networks . . . . . . . . 469--482

Journal of Computer Security
Volume 14, Number 6, 2006

           Patrick McDaniel and   
                   Atul Prakash   Enforcing provisioning and authorization
                                  policy in the Antigone system  . . . . . 483--511
               Andrew Blyth and   
                   Paula Thomas   Performing real-time threat assessment
                                  of security incidents using data fusion
                                  of IDS logs  . . . . . . . . . . . . . . 513--534
             Esma A\"\imeur and   
            Gilles Brassard and   
       Flavien Serge Mani Onana   Blind Electronic Commerce  . . . . . . . 535--559
              Gethin Norman and   
               Vitaly Shmatikov   Analysis of probabilistic contract
                                  signing  . . . . . . . . . . . . . . . . 561--589
                 Geoffrey Smith   Improved typings for probabilistic
                                  noninterference in a multi-threaded
                                  language . . . . . . . . . . . . . . . . 591--623
                      Anonymous   Author Index Volume 14 (2006)  . . . . . 625--626


Journal of Computer Security
Volume 15, Number 1, 2007

                      Anonymous   Message from the Guest Editors . . . . . 1--2
       Charikleia Zouridaki and   
              Brian L. Mark and   
                Marek Hejmo and   
               Roshan K. Thomas   Hermes: A quantitative trust
                                  establishment framework for reliable
                                  data packet delivery in MANETs . . . . . 3--38
                 Maxim Raya and   
             Jean-Pierre Hubaux   Securing vehicular ad hoc networks . . . 39--68
                Haowen Chan and   
              Adrian Perrig and   
          Bartosz Przydatek and   
                      Dawn Song   SIA: Secure information aggregation in
                                  sensor networks  . . . . . . . . . . . . 69--102
               S. Radosavac and   
  Alvaro A. Cárdenas and   
              John S. Baras and   
          George V. Moustakides   Detecting IEEE 802.11 MAC layer
                                  misbehavior in ad hoc networks: Robust
                                  strategies against individual and
                                  colluding attackers  . . . . . . . . . . 103--128
                    Shouhuai Xu   On the security of group communication
                                  schemes  . . . . . . . . . . . . . . . . 129--169
              Giorgio Zanin and   
          Roberto Di Pietro and   
               Luigi V. Mancini   Robust RSA distributed signatures for
                                  large-scale long-lived ad hoc networks   171--196

Journal of Computer Security
Volume 15, Number 2, 2007

           Valentina Casola and   
            Antonino Mazzeo and   
            Nicola Mazzocca and   
              Valeria Vittorini   A policy-based methodology for security
                                  evaluation: A Security Metric for Public
                                  Key Infrastructures  . . . . . . . . . . 197--229
      Mahesh V. Tripunitara and   
                     Ninghui Li   A theory for comparing the expressive
                                  power of access control models . . . . . 231--272
                 V. Skormin and   
                A. Volynkin and   
             D. Summerville and   
                    J. Moronski   Prevention of information attacks by
                                  run-time detection of self-replication
                                  in computer codes  . . . . . . . . . . . 273--302

Journal of Computer Security
Volume 15, Number 3, 2007

               Stephanie Wehner   Analyzing worms and network traffic
                                  using compression  . . . . . . . . . . . 303--320
                David Clark and   
             Sebastian Hunt and   
             Pasquale Malacaria   A static analysis for quantifying
                                  information flow in a simple imperative
                                  language . . . . . . . . . . . . . . . . 321--371
             Annalisa Bossi and   
               Carla Piazza and   
                   Sabina Rossi   Compositional information flow security
                                  for concurrent programs  . . . . . . . . 373--416

Journal of Computer Security
Volume 15, Number 4, 2007

                Lingyu Wang and   
                 Yingjiu Li and   
             Sushil Jajodia and   
             Duminda Wijesekera   Parity-based inference control for
                                  multi-dimensional range sum queries  . . 417--445
           Christian Skalka and   
               X. Sean Wang and   
                   Peter Chapin   Risk management for distributed
                                  authorization  . . . . . . . . . . . . . 447--489

Journal of Computer Security
Volume 15, Number 5, 2007

                  Atsuhiro Goto   Preface  . . . . . . . . . . . . . . . . 491--491
 Abhilasha Bhargav-Spantzel and   
              Jan Camenisch and   
               Thomas Gross and   
                  Dieter Sommer   User centricity: A taxonomy and open
                                  issues . . . . . . . . . . . . . . . . . 493--527
 Abhilasha Bhargav-Spantzel and   
       Anna C. Squicciarini and   
                Shimon Modi and   
              Matthew Young and   
              Elisa Bertino and   
             Stephen J. Elliott   Privacy preserving multi-factor
                                  authentication with biometrics . . . . . 529--560

Journal of Computer Security
Volume 15, Number 6, 2007

             Michael Backes and   
                David Basin and   
                Michael Waidner   Preface  . . . . . . . . . . . . . . . . 561--561
           Michele Bugliesi and   
           Riccardo Focardi and   
                  Matteo Maffei   Dynamic types for authentication . . . . 563--617
                   R. Corin and   
                  S. Etalle and   
               P. H. Hartel and   
                       A. Mader   Timed analysis of security protocols . . 619--645
              Gilles Barthe and   
            Leonor Prensa Nieto   Secure information flow for a concurrent
                                  language with scheduling . . . . . . . . 647--689
      Tomás E. Uribe and   
                  Steven Cheung   Automatic analysis of firewall and
                                  network intrusion detection system
                                  configurations . . . . . . . . . . . . . 691--715
                      Anonymous   Author Index Volume 15 (2007)  . . . . . 717--719


Journal of Computer Security
Volume 16, Number 1, 2008

                  Nan Zhang and   
                  Mark Ryan and   
              Dimitar P. Guelev   Synthesising verified access control
                                  systems through model checking . . . . . 1--61
                Karl Krukow and   
             Mogens Nielsen and   
              Vladimiro Sassone   A logical framework for history-based
                                  access control and reputation systems    63--101

Journal of Computer Security
Volume 16, Number 2, 2008

           George O. M. Yee and   
            Ali A. Ghorbani and   
             Patrick C. K. Hung   Guest Editors' Introduction  . . . . . . 103--106
                   Jie Zhou and   
                 Jim Alves-Foss   Security policy refinement and
                                  enforcement for the design of
                                  multi-level secure systems . . . . . . . 107--131
         Marco Casassa Mont and   
                   Robert Thyne   Privacy policy enforcement in
                                  enterprises with identity management
                                  solutions  . . . . . . . . . . . . . . . 133--163
             Harshit Nayyar and   
                Ali A. Ghorbani   Approximate autoregressive modeling for
                                  network attack detection . . . . . . . . 165--197
           Torsten Spindler and   
         Christoph Wartmann and   
           Ludger Hovestadt and   
                Daniel Roth and   
               Luc Van Gool and   
                Andreas Steffen   Privacy in video surveilled spaces . . . 199--222
              Muhammad Alam and   
             Michael Hafner and   
                      Ruth Breu   Constraint based role based access
                                  control in the SECTET-framework  . . . . 223--260

Journal of Computer Security
Volume 16, Number 3, 2008

           George O. M. Yee and   
              Chunming Rong and   
               Laurence T. Yang   Guest Editors' Introduction  . . . . . . 261--264
                   A. J. Elbirt   Accelerated AES implementations via
                                  generalized instruction set extensions   265--288
        Anne V. D. M. Kayem and   
               Selim G. Akl and   
                 Patrick Martin   On replacing cryptographic keys in
                                  hierarchical key management systems  . . 289--309
                  Lifu Wang and   
                Partha Dasgupta   Coprocessor-based hierarchical trust
                                  management for software integrity and
                                  digital identity protection  . . . . . . 311--339
         Janne Merete Hagen and   
   Tormod Kalberg Sivertsen and   
                  Chunming Rong   Protection against unauthorized access
                                  and computer crime in Norwegian
                                  enterprises  . . . . . . . . . . . . . . 341--366

Journal of Computer Security
Volume 16, Number 4, 2008

                Ernesto Damiani   Guest Editorial  . . . . . . . . . . . . 367--368
              C. A. Ardagna and   
               M. Cremonini and   
S. De Capitani di Vimercati and   
                    P. Samarati   A privacy-aware access control system    369--397
        Michael T. Goodrich and   
           Roberto Tamassia and   
           Danfeng (Daphne) Yao   Notarized federated ID management and
                                  authentication . . . . . . . . . . . . . 399--418
                Lingyu Wang and   
                   Chao Yao and   
              Anoop Singhal and   
                 Sushil Jajodia   Implementing interactive analysis of
                                  attack graphs using relational databases 419--437
       Vijayalakshmi Atluri and   
              Heechang Shin and   
                 Jaideep Vaidya   Efficient security policy enforcement
                                  for the mobile environment . . . . . . . 439--475
             Joachim Biskup and   
                     Lena Wiese   Preprocessing for controlled query
                                  evaluation with availability policy  . . 477--494

Journal of Computer Security
Volume 16, Number 5, 2008

               Andrei Sabelfeld   Preface  . . . . . . . . . . . . . . . . 495--495
             Michael Backes and   
           Birgit Pfitzmann and   
                  Andre Scedrov   Key-dependent message security under
                                  active attacks --- BRSIM/UC-soundness of
                                  Dolev--Yao-style encryption with key
                                  cycles . . . . . . . . . . . . . . . . . 497--530
Konstantinos Chatzikokolakis and   
       Catuscia Palamidessi and   
             Prakash Panangaden   On the Bayes risk in information-hiding
                                  protocols  . . . . . . . . . . . . . . . 531--571
              Ricardo Corin and   
Pierre-Malo Deniélou and   
      Cédric Fournet and   
      Karthikeyan Bhargavan and   
                   James Leifer   A secure compiler for session
                                  abstractions . . . . . . . . . . . . . . 573--636
            Paritosh Shroff and   
             Scott F. Smith and   
                    Mark Thober   Securing information flow via dynamic
                                  capture of dependencies  . . . . . . . . 637--688

Journal of Computer Security
Volume 16, Number 6, 2008

        Ferucio L. \cTiplea and   
C\uat\ualin V. B\^\irjoveanu and   
            Constantin Enea and   
                 Ioana Boureanu   Secrecy for bounded security protocols
                                  with freshness check is
                                  NEXPTIME-complete  . . . . . . . . . . . 689--712
            Patrick Traynor and   
               William Enck and   
           Patrick McDaniel and   
                Thomas La Porta   Exploiting open functionality in
                                  SMS-capable cellular networks  . . . . . 713--742
                Toby Murray and   
                   Duncan Grove   Non-delegatable authorities in
                                  capability systems . . . . . . . . . . . 743--759
              Petros Belsis and   
              Kostas Fragos and   
         Stefanos Gritzalis and   
              Christos Skourlas   Applying effective feature selection
                                  techniques with hierarchical mixtures of
                                  experts for spam classification  . . . . 761--790
                      Anonymous   Author Index Volume 16 (2008)  . . . . . 791--793


Journal of Computer Security
Volume 17, Number 1, 2009

           Milan Petkovi\'c and   
                  Willem Jonker   Preface  . . . . . . . . . . . . . . . . 1--3
                   Chao Yao and   
                Lingyu Wang and   
               X. Sean Wang and   
            Claudio Bettini and   
                 Sushil Jajodia   Evaluating privacy threats in released
                                  database views by symmetric
                                  indistinguishability . . . . . . . . . . 5--42
                Ji-Won Byun and   
               Tiancheng Li and   
              Elisa Bertino and   
                 Ninghui Li and   
                   Yonglak Sohn   Privacy-preserving incremental data
                                  dissemination  . . . . . . . . . . . . . 43--68
       Stefan Böttcher and   
                    Rita Hartel   Information disclosure by answers to
                                  XPath queries  . . . . . . . . . . . . . 69--99
               Weiwei Cheng and   
                   Kian-Lee Tan   Query assurance verification for
                                  outsourced multi-dimensional databases   101--126

Journal of Computer Security
Volume 17, Number 2, 2009

                     Nan Hu and   
               Giri K. Tayi and   
                 Chengyu Ma and   
                     Yingjiu Li   Certificate revocation release policies  127--157
                  Amir Herzberg   Folklore, practice and theory of robust
                                  combiners  . . . . . . . . . . . . . . . 159--189
              Benjamin Aziz and   
             Simon N. Foley and   
               John Herbert and   
                   Garret Swart   Configuring storage-area networks using
                                  mandatory security . . . . . . . . . . . 191--210
             Jaideep Vaidya and   
       Vijayalakshmi Atluri and   
                     Qi Guo and   
                     Haibing Lu   Edge-RMP: Minimizing administrative
                                  assignments for role-based access
                                  control  . . . . . . . . . . . . . . . . 211--235

Journal of Computer Security
Volume 17, Number 3, 2009

            Giampaolo Bella and   
               Peter Y. A. Ryan   \booktitleJournal of Computer Security   237--237
              Petros Belsis and   
              Kostas Fragos and   
         Stefanos Gritzalis and   
              Christos Skourlas   Applying effective feature selection
                                  techniques with hierarchical mixtures of
                                  experts for spam classification  . . . . 239--268
         Christian Grothoff and   
            Krista Grothoff and   
              Ryan Stutsman and   
          Ludmila Alkhutova and   
                Mikhail Atallah   Translation-based steganography  . . . . 269--303
             Giovanni Vigna and   
             Fredrik Valeur and   
          Davide Balzarotti and   
          William Robertson and   
        Christopher Kruegel and   
                    Engin Kirda   Reducing errors in the anomaly-based
                                  detection of web-based attacks through
                                  the combined analysis of web requests
                                  and SQL queries  . . . . . . . . . . . . 305--329
                  Haizhi Xu and   
                Steve J. Chapin   Address-space layout randomization using
                                  code islands . . . . . . . . . . . . . . 331--362

Journal of Computer Security
Volume 17, Number 4, 2009

                 Bruno Blanchet   Automatic verification of
                                  correspondences for security protocols   363--434
   Stéphanie Delaune and   
               Steve Kremer and   
                      Mark Ryan   Verifying privacy-type properties of
                                  electronic voting protocols  . . . . . . 435--487
                 Xuhua Ding and   
                Gene Tsudik and   
                    Shouhuai Xu   Leak-free mediated group signatures  . . 489--514

Journal of Computer Security
Volume 17, Number 5, 2009

              Joshua D. Guttman   Introduction . . . . . . . . . . . . . . 515--515
           Andrei Sabelfeld and   
                    David Sands   Declassification: Dimensions and
                                  principles . . . . . . . . . . . . . . . 517--548
          Ana Almeida Matos and   
           Gérard Boudol   On declassification and the
                                  non-disclosure policy  . . . . . . . . . 549--597
        William L. Harrison and   
                     James Hook   Achieving information flow security
                                  through monadic control of effects . . . 599--653
        Michael R. Clarkson and   
            Andrew C. Myers and   
              Fred B. Schneider   Quantifying information flow with
                                  beliefs  . . . . . . . . . . . . . . . . 655--701
            Dennis Hofheinz and   
Jörn Müller-Quade and   
                Dominique Unruh   Polynomial runtime in simulatability
                                  definitions  . . . . . . . . . . . . . . 703--735
          Pedro Adão and   
                Gergei Bana and   
            Jonathan Herzog and   
                  Andre Scedrov   Soundness and completeness of formal
                                  encryption: The cases of key cycles and
                                  partial information leakage  . . . . . . 737--797
         Massimo Bartoletti and   
           Pierpaolo Degano and   
             Gian Luigi Ferrari   Planning and verifying service
                                  composition  . . . . . . . . . . . . . . 799--837

Journal of Computer Security
Volume 17, Number 6, 2009

                  Gilles Guette   Automating trusted key rollover in
                                  DNSSEC . . . . . . . . . . . . . . . . . 839--854
           Mila Dalla Preda and   
             Roberto Giacobazzi   Semantics-based code obfuscation by
                                  abstract interpretation  . . . . . . . . 855--908
                Bart Jacobs and   
                   Ichiro Hasuo   Semantics and logic for security
                                  protocols  . . . . . . . . . . . . . . . 909--944
           Alberto Dainotti and   
     Antonio Pescapé and   
                 Giorgio Ventre   A cascade architecture for DoS attacks
                                  detection based on the wavelet transform 945--968
                      Anonymous   Author Index Volume 17 (2009)  . . . . . 969--971


Journal of Computer Security
Volume 18, Number 1, 2010

        Mário Campolargo   JCS special issue on EU-funded ICT
                                  research on Trust and Security: Foreword ??
              Jan Camenisch and   
               Javier Lopez and   
             Fabio Massacci and   
            Massimo Ciscato and   
                 Thomas Skordas   JCS special issue on EU-funded ICT
                                  research on Trust and Security . . . . . 1--5
      André Bergholz and   
                Jan De Beer and   
            Sebastian Glahn and   
       Marie-Francine Moens and   
         Gerhard Paaß and   
                Siehyun Strobel   New filtering approaches for phishing
                                  email  . . . . . . . . . . . . . . . . . 7--35
                   Mads Dam and   
                Bart Jacobs and   
           Andreas Lundblad and   
                 Frank Piessens   Provably correct inline monitoring for
                                  multithreaded Java-like programs . . . . 37--59
              Louis Salvail and   
              Momtchil Peev and   
             Eleni Diamanti and   
     Romain Alléaume and   
    Norbert Lütkenhaus and   
             Thomas Länger   Security of trusted repeater quantum key
                                  distribution networks  . . . . . . . . . 61--87
               Serdar Cabuk and   
            Chris I. Dalton and   
            Konrad Eriksson and   
              Dirk Kuhlmann and   
     HariGovind V. Ramasamy and   
           Gianluca Ramunno and   
         Ahmad-Reza Sadeghi and   
          Matthias Schunter and   
          Christian Stüble   Towards automated security policy
                                  enforcement in multi-tenant virtual data
                                  centers  . . . . . . . . . . . . . . . . 89--121
         Claudio A. Ardagna and   
              Jan Camenisch and   
          Markulf Kohlweiss and   
              Ronald Leenes and   
              Gregory Neven and   
                 Bart Priem and   
        Pierangela Samarati and   
              Dieter Sommer and   
               Mario Verdicchio   Exploiting cryptography for
                                  privacy-enhanced access control: A
                                  result of the PRIME Project  . . . . . . 123--160
        Savvas Argyropoulos and   
         Dimitrios Tzovaras and   
      Dimosthenis Ioannidis and   
            Yannis Damousis and   
       Michael G. Strintzis and   
               Martin Braun and   
                  Serge Boverie   Biometric template protection in
                                  multimodal authentication systems based
                                  on error correcting codes  . . . . . . . 161--185

Journal of Computer Security
Volume 18, Number 2, 2010

             Sushil Jajodia and   
                     Jon Millen   Editorial  . . . . . . . . . . . . . . . 187--187
              Daniele Gorla and   
           Catuscia Palamidessi   Preface  . . . . . . . . . . . . . . . . 189--189
             Pasquale Malacaria   Risk assessment of security threats for
                                  looping constructs . . . . . . . . . . . 191--228
               Chiara Bodei and   
                Linda Brodo and   
           Pierpaolo Degano and   
                        Han Gao   Detecting and preventing type flaws at
                                  static time  . . . . . . . . . . . . . . 229--264
          Sardaouna Hamadou and   
                   John Mullins   Calibrating the power of schedulers for
                                  probabilistic polynomial-time calculus   265--316
   Stéphanie Delaune and   
               Steve Kremer and   
                   Mark D. Ryan   Symbolic bisimulation for the applied pi
                                  calculus . . . . . . . . . . . . . . . . 317--377

Journal of Computer Security
Volume 18, Number 3, 2010

           Dimitrios Lekkas and   
             Dimitris Gritzalis   e-Passports as a means towards a
                                  Globally Interoperable Public Key
                                  Infrastructure . . . . . . . . . . . . . 379--396
          Massimiliano Pala and   
                  Sean W. Smith   Finding the PKI needles in the Internet
                                  haystack . . . . . . . . . . . . . . . . 397--420
                   Jiguo Li and   
                Xinyi Huang and   
                      Yi Mu and   
               Willy Susilo and   
                    Qianhong Wu   Constructions of certificate-based
                                  signature secure against key replacement
                                  attacks  . . . . . . . . . . . . . . . . 421--449
                Chung Ki Li and   
                Guomin Yang and   
             Duncan S. Wong and   
               Xiaotie Deng and   
             Sherman S. M. Chow   An efficient signcryption scheme with
                                  key privacy and its extension to ring
                                  signcryption . . . . . . . . . . . . . . 451--473
          David W. Chadwick and   
                Sean Antony and   
                     Rune Bjerk   Instant certificate revocation and
                                  publication using WebDAV . . . . . . . . 475--496

Journal of Computer Security
Volume 18, Number 4, 2010

                  Atsuhiro Goto   Preface  . . . . . . . . . . . . . . . . 497--497
             Samir Saklikar and   
                     Subir Saha   Identity Federation for VoIP systems . . 499--540
             Adrian Baldwin and   
         Marco Casassa Mont and   
              Yolanta Beres and   
                     Simon Shiu   Assurance for federated identity
                                  management . . . . . . . . . . . . . . . 541--572
  Sebastian Mödersheim and   
              Luca Vigan\`o and   
                    David Basin   Constraint differentiation: Search-space
                                  reduction for the constraint-based
                                  analysis of security protocols . . . . . 575--618
           Moritz Y. Becker and   
      Cédric Fournet and   
               Andrew D. Gordon   SecPAL: Design and semantics of a
                                  decentralized authorization language . . 619--665

Journal of Computer Security
Volume 18, Number 5, 2010

            James R. Conrad and   
             Jim Alves-Foss and   
             Sauchi Stephen Lee   Analyzing uncertainty in TG protection
                                  graphs with TG/MC  . . . . . . . . . . . 667--699
           Riccardo Pucella and   
              Fred B. Schneider   Independence from obfuscation: A
                                  semantic framework for diversity . . . . 701--749
         Roberto Giacobazzi and   
             Isabella Mastroeni   Adjoining classified and unclassified
                                  information by abstract interpretation   751--797
           Matthew Pirretti and   
            Patrick Traynor and   
           Patrick McDaniel and   
                   Brent Waters   Secure attribute-based systems . . . . . 799--837
          Roberto Di Pietro and   
           Luigi V. Mancini and   
                 Alessandro Mei   Hierarchies of keys in secure multicast
                                  communications . . . . . . . . . . . . . 839--860
            Nenad Jovanovic and   
        Christopher Kruegel and   
                    Engin Kirda   Static analysis for detecting
                                  taint-style vulnerabilities in web
                                  applications . . . . . . . . . . . . . . 861--907
             Mathieu Baudet and   
           Bogdan Warinschi and   
            Martín Abadi   Guessing attacks and the computational
                                  soundness of static equivalence  . . . . 909--968

Journal of Computer Security
Volume 18, Number 6, 2010

               Riccardo Focardi   Editorial  . . . . . . . . . . . . . . . 969--969
Frédéric Besson and   
            Guillaume Dufay and   
              Thomas Jensen and   
                David Pichardie   Verifying resource access control on
                                  mobile interactive devices . . . . . . . 971--998
               Steve Kremer and   
          Laurent Mazaré   Computationally sound analysis of
                                  protocols using bilinear pairings  . . . 999--1033
                  Arnab Roy and   
               Anupam Datta and   
                 Ante Derek and   
               John C. Mitchell   Inductive trace properties for
                                  computational security . . . . . . . . . 1035--1073
               Andrei Sabelfeld   Preface  . . . . . . . . . . . . . . . . 1075--1075
             Michael Backes and   
                Dominique Unruh   Computational soundness of symbolic
                                  zero-knowledge proofs  . . . . . . . . . 1077--1155
        Michael R. Clarkson and   
              Fred B. Schneider   Hyperproperties  . . . . . . . . . . . . 1157--1210
   Stéphanie Delaune and   
               Steve Kremer and   
                   Graham Steel   Formal security analysis of PKCS#11 and
                                  proprietary extensions . . . . . . . . . 1211--1245
          Jean Goubault-Larrecq   Finite models for formal security proofs 1247--1299
                      Anonymous   Author Index Volume 18 (2010)  . . . . . 1301--1305


Journal of Computer Security
Volume 19, Number 1, 2011

            Boris Köpf and   
                    David Basin   Automatically deriving
                                  information-theoretic bounds for
                                  adaptive side-channel attacks  . . . . . 1--31
         Lawrence A. Gordon and   
             Martin P. Loeb and   
                       Lei Zhou   The impact of information security
                                  breaches: Has there been a downward
                                  shift in costs?  . . . . . . . . . . . . 33--56
            David DeAngelis and   
              K. Suzanne Barber   Security applications of trust in
                                  multi-agent systems  . . . . . . . . . . 57--99
             Deepak D'Souza and   
            Raveendra Holla and   
          K. R. Raghavendra and   
                 Barbara Sprick   Model-checking trace-based information
                                  flow properties  . . . . . . . . . . . . 101--138
               L. H. Nguyen and   
                   A. W. Roscoe   Authentication protocols based on
                                  low-bandwidth unspoofable channels: A
                                  comparative survey . . . . . . . . . . . 139--201
                 Anshuman Sinha   A survey of system security in
                                  contactless electronic passports . . . . 203--226

Journal of Computer Security
Volume 19, Number 2, 2011

                 Yingjiu Li and   
                  Jianying Zhou   Guest Editors' preface . . . . . . . . . 227--228
              Basel Alomair and   
               Loukas Lazos and   
               Radha Poovendran   Securing low-cost RFID systems: An
                                  unconditionally secure approach  . . . . 229--257
              Gerhard P. Hancke   Practical eavesdropping and skimming
                                  attacks on high-frequency RFID tokens    259--288
              Gildas Avoine and   
   Muhammed Ali Bingöl and   
     Süleyman Karda\cs and   
    Cédric Lauradoux and   
                Benjamin Martin   A framework for analyzing RFID distance
                                  bounding protocols . . . . . . . . . . . 289--317
                Ching Yu Ng and   
               Willy Susilo and   
                      Yi Mu and   
               Rei Safavi-Naini   Practical RFID ownership transfer scheme 319--341
             Tzipora Halevi and   
              Nitesh Saxena and   
                    Shai Halevi   Tree-based HB protocols for
                                  privacy-preserving authentication of
                                  RFID tags  . . . . . . . . . . . . . . . 343--363

Journal of Computer Security
Volume 19, Number 3, 2011

                   Vijay Atluri   Preface  . . . . . . . . . . . . . . . . 365--365
               Changyu Dong and   
          Giovanni Russello and   
                 Naranker Dulay   Shared and searchable encrypted data for
                                  untrusted servers  . . . . . . . . . . . 367--397
       Manachai Toahchoodee and   
                  Indrakshi Ray   On the formalization and analysis of a
                                  spatio-temporal role-based access
                                  control model  . . . . . . . . . . . . . 399--452
                 Xiaoyun He and   
                 Haibing Lu and   
             Jaideep Vaidya and   
                     Nabil Adam   Secure construction and publication of
                                  contingency tables from distributed data 453--484
             Jaideep Vaidya and   
                     Ehud Gudes   Introduction . . . . . . . . . . . . . . 485--486
             Joachim Biskup and   
          Christian Gogolin and   
                Jens Seiler and   
                 Torben Weibert   Inference-proof view update transactions
                                  with forwarded refreshments  . . . . . . 487--529
          Valentina Ciriani and   
Sabrina De Capitani di Vimercati and   
               Sara Foresti and   
             Sushil Jajodia and   
         Stefano Paraboschi and   
            Pierangela Samarati   Selective data outsourcing for enforcing
                                  privacy  . . . . . . . . . . . . . . . . 531--566
             Simon N. Foley and   
          William M. Fitzgerald   Management of security policy
                                  configuration using a Semantic Threat
                                  Graph approach . . . . . . . . . . . . . 567--605
              Heechang Shin and   
       Vijayalakshmi Atluri and   
                   June-suh Cho   Efficiently enforcing spatiotemporal
                                  access control under uncertain location
                                  information  . . . . . . . . . . . . . . 607--637

Journal of Computer Security
Volume 19, Number 4, 2011

               Konrad Rieck and   
            Philipp Trinius and   
            Carsten Willems and   
                  Thorsten Holz   Automatic analysis of malware behavior
                                  using machine learning . . . . . . . . . 639--668
         P. C. van Oorschot and   
                   Julie Thorpe   Exploiting predictability in click-based
                                  graphical passwords  . . . . . . . . . . 669--702
            Mohammad Mannan and   
             P. C. van Oorschot   Leveraging personal devices for stronger
                                  password authentication from untrusted
                                  computers  . . . . . . . . . . . . . . . 703--750
Sabrina De Capitani di Vimercati and   
               Sara Foresti and   
             Sushil Jajodia and   
         Stefano Paraboschi and   
            Pierangela Samarati   Authorization enforcement in distributed
                                  query evaluation . . . . . . . . . . . . 751--794

Journal of Computer Security
Volume 19, Number 5, 2011

              Heechang Shin and   
             Jaideep Vaidya and   
           Vijayalakshmi Atluri   A profile anonymization model for
                                  location-based services  . . . . . . . . 795--833
         Dimitris Gritzalis and   
             Giannis Marias and   
              Yacine Rebahi and   
           Yannis Soupionis and   
                    Sven Ehlert   SPIDER: A platform for managing
                                  SIP-based Spam over Internet Telephony
                                  (SPIT) . . . . . . . . . . . . . . . . . 835--867
                Francis Hsu and   
                   Hao Chen and   
              Sridhar Machiraju   WebCallerID: Leveraging cellular
                                  networks for Web authentication  . . . . 869--893
              Reza Curtmola and   
                 Juan Garay and   
                Seny Kamara and   
               Rafail Ostrovsky   Searchable symmetric encryption:
                                  Improved definitions and efficient
                                  constructions  . . . . . . . . . . . . . 895--934
                Rinku Dewri and   
               Indrajit Ray and   
              Indrakshi Ray and   
                Darrell Whitley   Exploring privacy versus data quality
                                  trade-offs in anonymization techniques
                                  using multi-objective optimization . . . 935--974
                Allaa Kamil and   
                     Gavin Lowe   Analysing TLS in the strand spaces model 975--1025

Journal of Computer Security
Volume 19, Number 6, 2011

             Dimitris Gritzalis   Guest Editor's Preface . . . . . . . . . 1027--1028
          Hirotoshi Yasuoka and   
                Tachio Terauchi   On bounding problems of quantitative
                                  information flow . . . . . . . . . . . . 1029--1082
                 Chao Zhang and   
                    Wei Zou and   
                Tielei Wang and   
                    Yu Chen and   
                        Tao Wei   Using type analysis in compiler to
                                  mitigate
                                  integer-overflow-to-buffer-overflow
                                  threat . . . . . . . . . . . . . . . . . 1083--1107
             Robert H. Deng and   
                 Yingjiu Li and   
                  Moti Yung and   
                    Yunlei Zhao   A zero-knowledge based framework for
                                  RFID privacy . . . . . . . . . . . . . . 1109--1146
          Rishab Nithyanand and   
                Gene Tsudik and   
                     Ersin Uzun   User-aided reader revocation in
                                  PKI-based RFID systems . . . . . . . . . 1147--1172
                      Anonymous   Author Index Volume 19 (2011)  . . . . . 1173--1176


Journal of Computer Security
Volume 20, Number 1, 2012

         Alessandro Armando and   
                     Gavin Lowe   Preface  . . . . . . . . . . . . . . . . 1--1
      Mário S. Alvim and   
    Miguel E. Andrés and   
           Catuscia Palamidessi   Quantitative information flow in
                                  interactive systems  . . . . . . . . . . 3--50
           Nataliia Bielova and   
                 Fabio Massacci   Iterative enforcement by suppression:
                                  Towards practical enforcement theories   51--79
             Gabriele Costa and   
           Pierpaolo Degano and   
               Fabio Martinelli   Modular plans for secure service
                                  composition  . . . . . . . . . . . . . . 81--117

Journal of Computer Security
Volume 20, Number 2--3, 2012

               Hongbin Zhou and   
                 Simon N. Foley   Fast automatic security protocol
                                  generation . . . . . . . . . . . . . . . 119--167
         Natalia Stakhanova and   
            Chris Strasburg and   
                 Samik Basu and   
                 Johnny S. Wong   Towards cost-sensitive assessment of
                                  intrusion response selection . . . . . . 169--198
             Brian M. Bowen and   
      Vasileios P. Kemerlis and   
              Pratap Prabhu and   
       Angelos D. Keromytis and   
            Salvatore J. Stolfo   A system for generating and injecting
                                  indistinguishable network decoys . . . . 199--221
              Gail-Joon Ahn and   
                   Jing Jin and   
                 Mohamed Shehab   Policy-driven role-based access
                                  management for ad-hoc collaboration  . . 223--257
             Marina Blanton and   
              Mehrdad Aliasgari   Secure outsourced computation of iris
                                  matching . . . . . . . . . . . . . . . . 259--305

Journal of Computer Security
Volume 20, Number 4, 2012

              Gilles Barthe and   
              Jorge Cuellar and   
               Javier Lopez and   
           Alexander Pretschner   Preface  . . . . . . . . . . . . . . . . 307--308
         Alessandro Armando and   
                  Silvio Ranise   Scalable automated symbolic analysis of
                                  administrative role-based access control
                                  policies by SMT solving  . . . . . . . . 309--352
                Deepak Garg and   
                 Frank Pfenning   Stateful authorization logic --- Proof
                                  theory and a case study  . . . . . . . . 353--391
              Michele Bezzi and   
Sabrina De Capitani di Vimercati and   
               Sara Foresti and   
           Giovanni Livraga and   
        Pierangela Samarati and   
                  Roberto Sassi   Modeling and preventing inferences from
                                  sensitive value distributions in data
                                  release  . . . . . . . . . . . . . . . . 393--436
                 Yanjie Sun and   
               Chenyi Zhang and   
                   Jun Pang and   
           Baptiste Alcalde and   
                    Sjouke Mauw   A trust-augmented voting scheme for
                                  collaborative privacy management . . . . 437--459

Journal of Computer Security
Volume 20, Number 5, 2012

                     Yingjiu Li   Guest Editor's Preface . . . . . . . . . 461--462
          Valentina Ciriani and   
Sabrina De Capitani di Vimercati and   
               Sara Foresti and   
           Giovanni Livraga and   
            Pierangela Samarati   An OBDD approach to enforce
                                  confidentiality and visibility
                                  constraints in data publishing . . . . . 463--508
                 Joachim Biskup   Dynamic policy adaptation for inference
                                  control of queries to a propositional
                                  information system . . . . . . . . . . . 509--546
         Raman Adaikkalavan and   
                   Xing Xie and   
                  Indrakshi Ray   Multilevel secure data stream
                                  processing: Architecture and
                                  implementation . . . . . . . . . . . . . 547--581
                  Yuan Hong and   
             Jaideep Vaidya and   
                     Haibing Lu   Secure and efficient distributed linear
                                  programming  . . . . . . . . . . . . . . 583--634

Journal of Computer Security
Volume 20, Number 6, 2012

               Andrew Myers and   
                 Michael Backes   Preface  . . . . . . . . . . . . . . . . 635--636
                  Stephen Chong   Required information release . . . . . . 637--676
               Moritz Y. Becker   Information flow in trust management
                                  systems  . . . . . . . . . . . . . . . . 677--708
          Ralf Küsters and   
           Tomasz Truderung and   
                   Andreas Vogt   A game-based definition of coercion
                                  resistance and its applications  . . . . 709--764
                      Anonymous   Author Index Volume 20 (2012)  . . . . . 765--767


Journal of Computer Security
Volume 21, Number 1, 2013

        Mohammad H. Yarmand and   
             Kamran Sartipi and   
                Douglas G. Down   Behavior-based access control for
                                  distributed healthcare systems . . . . . 1--39
                Simon Meier and   
                Cas Cremers and   
                    David Basin   Efficient construction of
                                  machine-checked symbolic protocol
                                  security proofs  . . . . . . . . . . . . 41--87
   Véronique Cortier and   
                      Ben Smyth   Attacking and fixing Helios: An analysis
                                  of ballot secrecy  . . . . . . . . . . . 89--148
Frédéric Cuppens and   
      Nora Cuppens-Boulahia and   
                Yehia Elrakaiby   Formal specification and management of
                                  security policies with collective group
                                  obligations  . . . . . . . . . . . . . . 149--190

Journal of Computer Security
Volume 21, Number 2, 2013

                  Arturo Geigel   Neural network Trojan  . . . . . . . . . 191--232
           Dhananjay Phatak and   
            Alan T. Sherman and   
               Nikhil Joshi and   
           Bhushan Sonawane and   
             Vivek G. Relan and   
               Amol Dawalbhakta   Spread Identity: A new dynamic address
                                  remapping mechanism for anonymity and
                                  DDoS defense . . . . . . . . . . . . . . 233--281
        Vladimir Kolesnikov and   
         Ahmad-Reza Sadeghi and   
               Thomas Schneider   A systematic approach to practically
                                  efficient general two-party secure
                                  function evaluation protocols and their
                                  modular design . . . . . . . . . . . . . 283--315

Journal of Computer Security
Volume 21, Number 3, 2013

          Murtuza Jadliwala and   
            Igor Bilogrevic and   
             Jean-Pierre Hubaux   Optimizing mix-zone coverage in
                                  pervasive wireless networks  . . . . . . 317--346
               Alfred Kobsa and   
          Rishab Nithyanand and   
                Gene Tsudik and   
                     Ersin Uzun   Can Jannie verify? Usability of
                                  display-equipped RFID tags for security
                                  purposes . . . . . . . . . . . . . . . . 347--370
                  Gunnar Kreitz   Flow stealing: A well-timed redirection
                                  attack . . . . . . . . . . . . . . . . . 371--391
              Amir Herzberg and   
                Ronen Margulies   Forcing Johnny to login safely . . . . . 393--424
Sabrina De Capitani di Vimercati and   
               Sara Foresti and   
         Stefano Paraboschi and   
             Gerardo Pelosi and   
            Pierangela Samarati   Supporting concurrency and multiple
                                  indexes in private access to outsourced
                                  data . . . . . . . . . . . . . . . . . . 425--461

Journal of Computer Security
Volume 21, Number 4, 2013

             Piotr Mardziel and   
             Stephen Magill and   
              Michael Hicks and   
              Mudhakar Srivatsa   Dynamic enforcement of knowledge-based
                                  security policies using probabilistic
                                  abstract interpretation  . . . . . . . . 463--532
               Fangfei Zhou and   
                Manish Goel and   
            Peter Desnoyers and   
                  Ravi Sundaram   Scheduler vulnerabilities and
                                  coordinated attacks in cloud computing   533--559
                 John Homer and   
                   Su Zhang and   
                 Xinming Ou and   
              David Schmidt and   
                  Yanhui Du and   
         S. Raj Rajagopalan and   
                  Anoop Singhal   Aggregating vulnerability metrics in
                                  enterprise networks using attack graphs  561--597

Journal of Computer Security
Volume 21, Number 5, 2013

                  Ivan Visconti   Special Issue: Advances in Security for
                                  Communication Networks . . . . . . . . . 599--600
               Joshua Baron and   
           Karim El Defrawy and   
           Kirill Minkovich and   
           Rafail Ostrovsky and   
                  Eric Tressler   5PM: Secure pattern matching . . . . . . 601--625
              Olivier Blazy and   
           Georg Fuchsbauer and   
          David Pointcheval and   
                Damien Vergnaud   Short blind signatures . . . . . . . . . 627--661
               Craig Gentry and   
                Shai Halevi and   
              Chris Peikert and   
                 Nigel P. Smart   Field switching in BGV-style homomorphic
                                  encryption . . . . . . . . . . . . . . . 663--684
              Helger Lipmaa and   
                Bingsheng Zhang   A more efficient computationally sound
                                  non-interactive zero-knowledge shuffle
                                  argument . . . . . . . . . . . . . . . . 685--719
               Steven Myers and   
                 Mona Sergi and   
                    abhi shelat   Black-box construction of a more than
                                  non-malleable CCA1 encryption scheme
                                  from plaintext awareness . . . . . . . . 721--748
 Juan González Nieto and   
               Mark Manulis and   
         Bertram Poettering and   
            Jothi Rangasamy and   
                Douglas Stebila   Publicly verifiable ciphertexts  . . . . 749--778

Journal of Computer Security
Volume 21, Number 6, 2013

           Pierpaolo Degano and   
              Joshua D. Guttman   Preface  . . . . . . . . . . . . . . . . 779--780
              Miriam Paiola and   
                 Bruno Blanchet   Verification of security protocols with
                                  lists: From length one to unbounded
                                  length . . . . . . . . . . . . . . . . . 781--816
                David Basin and   
                Cas Cremers and   
                    Simon Meier   Provably repairing the ISO/IEC 9798
                                  standard for entity authentication . . . 817--846
             Myrto Arapinis and   
              Sergiu Bursuc and   
                      Mark Ryan   Privacy-supporting cloud computing by
                                  in-browser key translation . . . . . . . 847--880
              Gilles Barthe and   
   Benjamin Grégoire and   
             Sylvain Heraud and   
            Federico Olmedo and   
Santiago Zanella-Béguelin   Verified indifferentiable hashing into
                                  elliptic curves  . . . . . . . . . . . . 881--917
               Umut A. Acar and   
                 Amal Ahmed and   
               James Cheney and   
                    Roly Perera   A core calculus for provenance . . . . . 919--969
           Matteo Centenaro and   
           Riccardo Focardi and   
             Flaminia L. Luccio   Type-based analysis of key management in
                                  PKCS#11 cryptographic devices  . . . . . 971--1007
                      Anonymous   Author Index Volume 21 (2013)  . . . . . 1009--1012


Journal of Computer Security
Volume 22, Number 1, 2014

                 Haibing Lu and   
             Jaideep Vaidya and   
           Vijayalakshmi Atluri   An optimization framework for role
                                  mining . . . . . . . . . . . . . . . . . 1--31
               Tsz Hon Yuen and   
               Willy Susilo and   
                          Yi Mu   Towards a cryptographic treatment of
                                  publish/subscribe systems  . . . . . . . 33--67
                Jianwei Niu and   
                 Mark Reith and   
         William H. Winsborough   Formal verification of security
                                  properties in trust management policy    69--153
          Sai Teja Peddinti and   
                  Nitesh Saxena   Web search query privacy: Evaluating
                                  query obfuscation and anonymizing
                                  networks . . . . . . . . . . . . . . . . 155--199

Journal of Computer Security
Volume 22, Number 2, 2014

Konstantinos Chatzikokolakis and   
Sebastian Alexander Mödersheim and   
       Catuscia Palamidessi and   
                       Jun Pang   Foundational aspects of security . . . . 201--202
              Joshua D. Guttman   Establishing and preserving protocol
                                  security goals . . . . . . . . . . . . . 203--267
               Tri Minh Ngo and   
    Mariëlle Stoelinga and   
                Marieke Huisman   Effective verification of
                                  confidentiality for multi-threaded
                                  programs . . . . . . . . . . . . . . . . 269--300
             Michael Backes and   
       C\uat\ualin Hri\ctcu and   
                  Matteo Maffei   Union, intersection and refinement types
                                  and reasoning about type disjointness
                                  for secure protocol implementations  . . 301--353

Journal of Computer Security
Volume 22, Number 3, 2014

               Carlo Blundo and   
     Emiliano De Cristofaro and   
                    Paolo Gasti   EsPRESSO: Efficient privacy-preserving
                                  evaluation of sample set similarity  . . 355--381
           Yannis Soupionis and   
   Remous-Aris Koutsiamanis and   
          Pavlos Efraimidis and   
             Dimitris Gritzalis   A game-theoretic analysis of preventing
                                  spam over Internet Telephony via audio
                                  CAPTCHA-based authentication . . . . . . 383--413
              Prithvi Bisht and   
           Timothy Hinrichs and   
            Nazari Skrupsky and   
          V. N. Venkatakrishnan   Automated detection of parameter
                                  tampering opportunities and
                                  vulnerabilities in web applications  . . 415--465

Journal of Computer Security
Volume 22, Number 4, 2014

              Lieven Desmet and   
               Martin Johns and   
          Benjamin Livshits and   
               Andrei Sabelfeld   Preface  . . . . . . . . . . . . . . . . 467--468
            Willem De Groef and   
         Dominique Devriese and   
           Nick Nikiforakis and   
                 Frank Piessens   Secure multi-execution of web scripts:
                                  Theory and practice  . . . . . . . . . . 469--509
           Joe Gibbs Politz and   
                 Arjun Guha and   
          Shriram Krishnamurthi   Typed-based verification of Web
                                  sandboxes  . . . . . . . . . . . . . . . 511--565
               M. Heiderich and   
                M. Niemietz and   
                F. Schuster and   
                    T. Holz and   
                     J. Schwenk   Scriptless attacks: Stealing more pie
                                  without touching the sill  . . . . . . . 567--599
              Chetan Bansal and   
      Karthikeyan Bhargavan and   
    Antoine Delignat-Lavaud and   
                 Sergio Maffeis   Discovering concrete attacks on website
                                  authorization by formal analysis . . . . 601--657

Journal of Computer Security
Volume 22, Number 5, 2014

             Michael Backes and   
                Steve Zdancewic   Message from the Guest Editors . . . . . 659--660
                David Basin and   
            Samuel J. Burri and   
            Günter Karjoth   Obstruction-free authorization
                                  enforcement: Aligning security and
                                  business objectives  . . . . . . . . . . 661--698
           Cole Schlesinger and   
       Karthik Pattabiraman and   
               Nikhil Swamy and   
               David Walker and   
                  Benjamin Zorn   Modular protections against non-control
                                  data attacks . . . . . . . . . . . . . . 699--742
             Myrto Arapinis and   
            Joshua Phillips and   
                Eike Ritter and   
                   Mark D. Ryan   StatVerif: Verification of stateful
                                  processes  . . . . . . . . . . . . . . . 743--821
 François Dupressoir and   
           Andrew D. Gordon and   
           Jan Jürjens and   
               David A. Naumann   Guiding a general-purpose C verifier to
                                  prove cryptographic protocols  . . . . . 823--866

Journal of Computer Security
Volume 22, Number 6, 2014

         Joseph A. Akinyele and   
              Matthew Green and   
          Susan Hohenberger and   
                 Matthew Pagano   Machine-generated algorithms, proofs and
                                  software for the batch verification of
                                  digital signature schemes  . . . . . . . 867--912
             Johannes Braun and   
               Florian Volk and   
              Jiska Classen and   
          Johannes Buchmann and   
       Max Mühlhäuser   CA trust management for the Web PKI  . . 913--959
                  Emre Uzun and   
       Vijayalakshmi Atluri and   
             Jaideep Vaidya and   
               Shamik Sural and   
          Anna Lisa Ferrara and   
            Gennaro Parlato and   
                  P. Madhusudan   Security analysis for temporal role
                                  based access control . . . . . . . . . . 961--996
             Yen-Chung Chen and   
                 Yu-Sung Wu and   
                 Wen-Guey Tzeng   Preserving user query privacy in
                                  cloud-based security services  . . . . . 997--1024
           Nicolas Buchmann and   
                   Harald Baier   Towards a more secure and scalable
                                  verifying PKI of eMRTD . . . . . . . . . 1025--1049
                      Anonymous   Author Index Volume 22 (2014)  . . . . . 1051--1054


Journal of Computer Security
Volume 23, Number 1, 2015

                  Ping Yang and   
          Mikhail I. Gofman and   
           Scott D. Stoller and   
                   Zijiang Yang   Policy analysis for administrative role
                                  based access control without separate
                                  administration . . . . . . . . . . . . . 1--29
               Barsha Mitra and   
               Shamik Sural and   
       Vijayalakshmi Atluri and   
                 Jaideep Vaidya   The generalized temporal role mining
                                  problem  . . . . . . . . . . . . . . . . 31--58
Sabrina De Capitani di Vimercati and   
               Sara Foresti and   
             Sushil Jajodia and   
           Giovanni Livraga and   
         Stefano Paraboschi and   
            Pierangela Samarati   Loose associations to increase utility
                                  in data publishing . . . . . . . . . . . 59--88
           Bechara Al Bouna and   
              Chris Clifton and   
               Qutaibah Malluhi   Anonymizing transactional datasets . . . 89--106
                 Haibing Lu and   
                  Yuan Hong and   
              Yanjiang Yang and   
                  Lian Duan and   
                    Nazia Badar   Towards user-oriented RBAC model . . . . 107--129

Journal of Computer Security
Volume 23, Number 2, 2015

               Wen Ming Liu and   
                Lingyu Wang and   
                  Lei Zhang and   
                    Shunzhi Zhu   $k$-jump: A strategy to design
                                  publicly-known algorithms for privacy
                                  preserving micro-data disclosure . . . . 131--165
                 Adam Bates and   
         Kevin R. B. Butler and   
                Micah Sherr and   
               Clay Shields and   
            Patrick Traynor and   
                    Dan Wallach   Accountable wiretapping --- or --- I
                                  know they can hear you now . . . . . . . 167--195
             Ron van der Meyden   What, indeed, is intransitive
                                  noninterference? . . . . . . . . . . . . 197--228
             Ioana Boureanu and   
      Aikaterini Mitrokotsa and   
                 Serge Vaudenay   Practical and provably secure
                                  distance-bounding  . . . . . . . . . . . 229--257

Journal of Computer Security
Volume 23, Number 3, 2015

     Thomas Gibson-Robinson and   
                Allaa Kamil and   
                     Gavin Lowe   Verifying layered security protocols . . 259--307
      Christos Dimitrakakis and   
      Aikaterini Mitrokotsa and   
                 Serge Vaudenay   Expected loss analysis for
                                  authentication in constrained channels   309--329
          David Cadé and   
                 Bruno Blanchet   Proved generation of implementations
                                  from computationally secure protocol
                                  specifications . . . . . . . . . . . . . 331--402
                Jiawei Yuan and   
                    Shucheng Yu   PCPOR: Public and constant-cost proofs
                                  of retrievability in cloud1  . . . . . . 403--425

Journal of Computer Security
Volume 23, Number 4, 2015

      Mário S. Alvim and   
    Miguel E. Andrés and   
Konstantinos Chatzikokolakis and   
           Pierpaolo Degano and   
           Catuscia Palamidessi   On the information leakage of
                                  differentially-private mechanisms  . . . 427--469
           Shiuan-Tzuo Shen and   
                 Wen-Guey Tzeng   Delegated integrity check for
                                  hierarchical cloud data  . . . . . . . . 471--508
           Michele Bugliesi and   
          Stefano Calzavara and   
           Riccardo Focardi and   
                   Wilayat Khan   CookiExt: Patching the browser against
                                  session hijacking attacks  . . . . . . . 509--537

Journal of Computer Security
Volume 23, Number 5, 2015

              Luca Spalazzi and   
                  Luca Vigan\`o   Special issue on security and high
                                  performance computing systems  . . . . . 539--540
               Jason Lowden and   
           Marcin \Lukowiak and   
            Sonia Lopez Alarcon   Design and performance analysis of
                                  efficient Keccak tree hashing on GPU
                                  architectures  . . . . . . . . . . . . . 541--562
            Giampaolo Bella and   
                Paul Curzon and   
               Gabriele Lenzini   Service security and privacy as a
                                  socio-technical problem  . . . . . . . . 563--585
              Jannik Dreier and   
       Jean-Guillaume Dumas and   
              Pascal Lafourcade   Brandt's fully private auction protocol
                                  revisited  . . . . . . . . . . . . . . . 587--610
              Alessio Merlo and   
            Mauro Migliardi and   
               Paolo Fontanelli   Measuring and estimating power
                                  consumption in Android to support
                                  energy-based intrusion detection . . . . 611--637
                      Anonymous   Regular Paper Section  . . . . . . . . . 639--639
               Sergey Belim and   
         Nadezda Bogachenko and   
            Evgeniy Ilushechkin   An analysis of graphs that represent a
                                  role-based security policy hierarchy . . 641--657

Journal of Computer Security
Volume 23, Number 6, 2015

                     Jin Li and   
              Xiaofeng Chen and   
                 Jingwei Li and   
                 Chunfu Jia and   
                Jianfeng Ma and   
                    Wenjing Lou   New access control systems based on
                                  outsourced attribute-based encryption    659--683
               Ali Alshehri and   
                Steve Schneider   A formal framework for security analysis
                                  of NFC mobile coupon protocols . . . . . 685--707
              Piero Bonatti and   
             Clemente Galdi and   
                  Davide Torres   Event-driven RBAC  . . . . . . . . . . . 709--757
             Yannis Mallios and   
                 Lujo Bauer and   
              Dilsun Kaynar and   
           Fabio Martinelli and   
               Charles Morisset   Probabilistic cost enforcement of
                                  security policies  . . . . . . . . . . . 759--787
                      Anonymous   Author Index Volume 23 (2015)  . . . . . 789--791


Journal of Computer Security
Volume 24, Number 1, 2016

          Florian Böhl and   
                Dominique Unruh   Symbolic universal composability . . . . 1--38
           Willard Rafnsson and   
               Andrei Sabelfeld   Secure multi-execution: Fine-grained,
                                  declassification-aware, and transparent  39--90
               Zhengqin Luo and   
 José Fragoso Santos and   
          Ana Almeida Matos and   
                    Tamara Rezk   Mashic compiler: Mashup sandboxing based
                                  on inter-frame communication . . . . . . 91--136

Journal of Computer Security
Volume 24, Number 2, 2016

               Henry Carter and   
              Benjamin Mood and   
            Patrick Traynor and   
                   Kevin Butler   Secure outsourced garbled circuit
                                  evaluation for mobile devices  . . . . . 137--180
               Daniel Hedin and   
              Luciano Bello and   
               Andrei Sabelfeld   Information-flow security for JavaScript
                                  and its APIs . . . . . . . . . . . . . . 181--234
          Claudio Taglienti and   
                  James Cannady   The user attribution problem and the
                                  challenge of persistent surveillance of
                                  user activity in complex networks  . . . 235--288
                    Yu Chen and   
                 Zongyang Zhang   Publicly evaluable pseudorandom
                                  functions and their applications . . . . 289--320

Journal of Computer Security
Volume 24, Number 3, 2016

           Sokratis Vavilis and   
           Milan Petkovi\'c and   
                 Nicola Zannone   A severity-based quantification of data
                                  leakages in database systems . . . . . . 321--345
Sabrina De Capitani di Vimercati and   
               Sara Foresti and   
             Sushil Jajodia and   
         Stefano Paraboschi and   
            Pierangela Samarati   Efficient integrity checks for join
                                  queries in the cloud . . . . . . . . . . 347--378
                 Meixing Le and   
               Krishna Kant and   
             Malek Athamnah and   
                 Sushil Jajodia   Minimum cost rule enforcement for
                                  cooperative database access  . . . . . . 379--403

Journal of Computer Security
Volume 24, Number 4, 2016

                Yiming Jing and   
              Gail-Joon Ahn and   
                 Hongxin Hu and   
                Haehyun Cho and   
                    Ziming Zhao   TripleMon: A multi-layer security
                                  framework for mediating inter-process
                                  communication on Android . . . . . . . . 405--426
               Chiara Bodei and   
           Pierpaolo Degano and   
          Letterio Galletta and   
            Francesco Salvatori   Context-aware security: Linguistic
                                  mechanisms and static analysis . . . . . 427--477
      Giovanni Di Crescenzo and   
              Debra L. Cook and   
             Allen McIntosh and   
              Euthimios Panagos   Practical and privacy-preserving
                                  information retrieval from a database
                                  table  . . . . . . . . . . . . . . . . . 479--506
              Debabrata Kar and   
         Suvasini Panigrahi and   
          Srikanth Sundararajan   SQLiDDS: SQL injection detection using
                                  document similarity measure  . . . . . . 507--539

Journal of Computer Security
Volume 24, Number 5, 2016

              Martin Lester and   
                   Luke Ong and   
               Max Schäfer   Information flow analysis for a
                                  dynamically typed language with staged
                                  metaprogramming  . . . . . . . . . . . . 541--582
               Steve Kremer and   
          Robert Künnemann   Automated analysis of security protocols
                                  with global state  . . . . . . . . . . . 583--616
             Deepak D'Souza and   
              K. R. Raghavendra   Model-checking trace-based information
                                  flow properties for infinite-state
                                  systems  . . . . . . . . . . . . . . . . 617--643
              John Sonchack and   
                   Adam J. Aviv   Exploring large scale security system
                                  reproducibility with the LESS simulator  645--665

Journal of Computer Security
Volume 24, Number 6, 2016

            Michal Davidson and   
                Tamir Tassa and   
                     Ehud Gudes   Content sharing schemes in DRM systems
                                  with enhanced performance and privacy
                                  preservation . . . . . . . . . . . . . . 667--688
   Arthur Azevedo de Amorim and   
             Nathan Collins and   
         André DeHon and   
           Delphine Demange and   
       C\uat\ualin Hri\ctcu and   
            David Pichardie and   
         Benjamin C. Pierce and   
              Randy Pollack and   
                 Andrew Tolmach   A verified information-flow architecture 689--734
             Sushil Jajodia and   
               Noseong Park and   
              Edoardo Serra and   
             V. S. Subrahmanian   Using temporal probabilistic logic for
                                  optimal monitoring of security events
                                  with limited resources . . . . . . . . . 735--791
          Roberto Guanciale and   
               Hamed Nemati and   
                   Mads Dam and   
              Christoph Baumann   Provably secure memory isolation for
                                  Linux on ARM . . . . . . . . . . . . . . 793--837
                      Anonymous   Author Index Volume 24 (2016)  . . . . . 839--841


Journal of Computer Security
Volume 25, Number 1, 2017

              Joseph Y. Halpern   From qualitative to quantitative proofs
                                  of security properties using first-order
                                  conditional logic  . . . . . . . . . . . 1--19
   Véronique Cortier and   
               Cyrille Wiedling   A formal analysis of the Norwegian
                                  E-voting protocol  . . . . . . . . . . . 21--57
         Stefan Wüller and   
               Daniel Mayer and   
           Fabian Förg and   
       Samuel Schüppen and   
     Benjamin Assadsolimani and   
               Ulrike Meyer and   
                 Susanne Wetzel   Designing privacy-preserving interval
                                  operations based on homomorphic
                                  encryption and secret sharing techniques 59--81
             Jason Crampton and   
              Gregory Gutin and   
          Daniel Karapetyan and   
          Rémi Watrigant   The bi-objective workflow satisfiability
                                  problem and workflow resiliency  . . . . 83--115

Journal of Computer Security
Volume 25, Number 2, 2017

          Andrea Continella and   
          Michele Carminati and   
               Mario Polino and   
               Andrea Lanzi and   
             Stefano Zanero and   
                 Federico Maggi   Prometheus: Analyzing WebInject-based
                                  information stealers . . . . . . . . . . 117--137
                Albert Guan and   
                 Wen-Guey Tzeng   A secret key establishment protocol for
                                  wireless networks using noisy channels   139--151
               Chung-Yi Lin and   
                 Wen-Guey Tzeng   Strategy analysis for cloud storage
                                  reliability management based on game
                                  theory . . . . . . . . . . . . . . . . . 153--171
             Daniel Migault and   
            Tobias Guggemos and   
            Sylvain Killian and   
           Maryline Laurent and   
                Guy Pujolle and   
             Jean Philippe Wary   Diet-ESP: IP layer security for IoT  . . 173--203

Journal of Computer Security
Volume 25, Number 3, 2017

              Manar Mohamed and   
                   Song Gao and   
          Niharika Sachdeva and   
              Nitesh Saxena and   
             Chengcui Zhang and   
     Ponnurangam Kumaraguru and   
           Paul C. Van Oorschot   On the security and usability of dynamic
                                  cognitive game CAPTCHAs  . . . . . . . . 205--230
                  Yao Cheng and   
                 Yingjiu Li and   
                Robert Deng and   
               Lingyun Ying and   
                         Wei He   A study on a feasible no-root approach
                                  on Android . . . . . . . . . . . . . . . 231--253
  Daniel Ricardo dos Santos and   
              Silvio Ranise and   
              Luca Compagna and   
             Serena Elisa Ponta   Automatically finding execution
                                  scenarios to deploy security-sensitive
                                  workflows  . . . . . . . . . . . . . . . 255--282
                Euijin Choo and   
                    Ting Yu and   
                        Min Chi   Detecting opinion spammer groups and
                                  spam targets through community discovery
                                  and sentiment analysis . . . . . . . . . 283--318

Journal of Computer Security
Volume 25, Number 4--5, 2017

                Toby Murray and   
           Andrei Sabelfeld and   
                     Lujo Bauer   Special issue on verified information
                                  flow security  . . . . . . . . . . . . . 319--321
             Niklas Broberg and   
             Bart van Delft and   
                    David Sands   Paragon --- Practical programming with
                                  information flow control . . . . . . . . 323--365
                    Jed Liu and   
                 Owen Arden and   
          Michael D. George and   
                Andrew C. Myers   Fabric: Building open distributed
                                  systems securely by construction . . . . 367--426
              Daniel Giffin and   
                  Amit Levy and   
               Deian Stefan and   
                David Terei and   
           David Mazi\`eres and   
              John Mitchell and   
                Alejandro Russo   Hails: Protecting data privacy in
                                  untrusted web applications . . . . . . . 427--461

Journal of Computer Security
Volume 25, Number 6, 2017

            Marco Rocchetto and   
              Luca Vigan\`o and   
                    Marco Volpe   An interpolation-based method for the
                                  verification of security protocols . . . 463--510
             Jason Crampton and   
               Naomi Farley and   
              Gregory Gutin and   
                 Mark Jones and   
             Bertram Poettering   Cryptographic enforcement of information
                                  flow policies without public information
                                  via tree partitions  . . . . . . . . . . 511--535
                    Bo Chen and   
                  Reza Curtmola   Remote data integrity checking with
                                  server-side repair . . . . . . . . . . . 537--584
               Max Kanovich and   
         Tajana Ban Kirigin and   
                Vivek Nigam and   
              Andre Scedrov and   
                Carolyn Talcott   Time, computational complexity, and
                                  probability in the analysis of
                                  distance-bounding protocols  . . . . . . 585--630
                      Anonymous   Author Index Volume 25 (2017)  . . . . . 631--633


Journal of Computer Security
Volume 26, Number 1, 2018

               Tarik Moataz and   
               Indrajit Ray and   
              Indrakshi Ray and   
          Abdullatif Shikfa and   
Frédéric Cuppens and   
                   Nora Cuppens   Substring search over encrypted data . . 1--30
           Mila Dalla Preda and   
             Isabella Mastroeni   Characterizing a property-driven
                                  obfuscation strategy . . . . . . . . . . 31--69
         Christoph Sprenger and   
                    David Basin   Refining security protocols  . . . . . . 71--120
           Scott D. Stoller and   
                      Thang Bui   Mining hierarchical temporal roles with
                                  multiple metrics . . . . . . . . . . . . 121--142

Journal of Computer Security
Volume 26, Number 2, 2018

Sabrina De Capitani di Vimercati and   
               Sara Foresti and   
         Stefano Paraboschi and   
             Gerardo Pelosi and   
            Pierangela Samarati   Enforcing authorizations while
                                  protecting access confidentiality  . . . 143--175
                Silvie Levy and   
                 Ehud Gudes and   
                   Nurit Gal-Oz   Sharing-habits based privacy control in
                                  social networks  . . . . . . . . . . . . 177--205
              Ultan Neville and   
                 Simon N. Foley   Reasoning about firewall policies
                                  through refinement and composition . . . 207--254
             Haritabh Gupta and   
               Shamik Sural and   
       Vijayalakshmi Atluri and   
                 Jaideep Vaidya   A side-channel attack on smartphones:
                                  Deciphering key taps using built-in
                                  microphones  . . . . . . . . . . . . . . 255--281

Journal of Computer Security
Volume 26, Number 3, 2018

                Wenrui Diao and   
                    Rui Liu and   
                Xiangyu Liu and   
                   Zhe Zhou and   
                    Zhou Li and   
                   Kehuan Zhang   Accessing mobile user's privacy based on
                                  IME personalization: Understanding and
                                  practical attacks  . . . . . . . . . . . 283--309
         Maliheh Shirvanian and   
              Nitesh Saxena and   
             Dibya Mukhopadhyay   Short voice imitation man-in-the-middle
                                  attacks on Crypto Phones: Defeating
                                  humans and machines  . . . . . . . . . . 311--333
              Simon Bischof and   
           Joachim Breitner and   
           Jürgen Graf and   
              Martin Hecker and   
                Martin Mohr and   
                Gregor Snelting   Low-deterministic security for
                                  low-nondeterministic programs  . . . . . 335--366
             Bruno Blanchet and   
                      Ben Smyth   Automated reasoning for equivalences in
                                  the applied pi calculus with barriers    367--422

Journal of Computer Security
Volume 26, Number 4, 2018

              Silvio Ranise and   
                 Anh Truong and   
                  Luca Vigan\`o   Automated and efficient analysis of
                                  administrative temporal RBAC policies
                                  with role hierarchies  . . . . . . . . . 423--458
          Binh Thanh Nguyen and   
         Christoph Sprenger and   
                    Cas Cremers   Abstractions for security protocol
                                  verification . . . . . . . . . . . . . . 459--508
         Rosario Giustolisi and   
            Giampaolo Bella and   
               Gabriele Lenzini   Invalid certificates in modern browsers:
                                  a socio-technical analysis . . . . . . . 509--541
          Kiran S. Balagani and   
                Paolo Gasti and   
              Aaron Elliott and   
          Azriel Richardson and   
                    Mike O'Neal   The impact of application context on
                                  privacy and performance of keystroke
                                  authentication systems . . . . . . . . . 543--556
               Per Hallgren and   
               Ravi Kishore and   
        Martín Ochoa and   
               Andrei Sabelfeld   Assuring BetterTimes . . . . . . . . . . 557--587

Journal of Computer Security
Volume 26, Number 5, 2018

            Patrick Luckett and   
           J. Todd McDonald and   
         William B. Glisson and   
                Ryan Benton and   
                Joel Dawson and   
                 Blair A. Doyle   Identifying stealth malware using CPU
                                  power consumption and learning
                                  algorithms . . . . . . . . . . . . . . . 589--613
         Tanmoy Chakraborty and   
             Sushil Jajodia and   
               Noseong Park and   
            Andrea Pugliese and   
              Edoardo Serra and   
             V. S. Subrahmanian   Hybrid adversarial defense: Merging
                                  honeypots and traditional security
                                  methods  . . . . . . . . . . . . . . . . 615--645
                  Ling Chen and   
                    Ting Yu and   
                  Rada Chirkova   $k$-Skyband query answering with
                                  differential privacy . . . . . . . . . . 647--676
                Benny Fuhry and   
               Raad Bahmani and   
          Ferdinand Brasser and   
               Florian Hahn and   
         Florian Kerschbaum and   
             Ahmad-Reza Sadeghi   HardIDX: Practical and secure index with
                                  SGX in a malicious environment . . . . . 677--706
                    Jin Han and   
                Wangyu Zang and   
                     Li Liu and   
              Songqing Chen and   
                        Meng Yu   Risk-aware multi-objective optimized
                                  virtual machine placement in the cloud   707--730

Journal of Computer Security
Volume 26, Number 6, 2018

              David Lorenzi and   
                  Emre Uzun and   
             Jaideep Vaidya and   
               Shamik Sural and   
           Vijayalakshmi Atluri   Towards designing robust CAPTCHAs  . . . 731--760
              Daniel Borbor and   
                Lingyu Wang and   
             Sushil Jajodia and   
                  Anoop Singhal   Surviving unpatchable vulnerabilities
                                  through heterogeneous network hardening
                                  options  . . . . . . . . . . . . . . . . 761--789
                  Jun Zhang and   
                   Meiqi He and   
              Gongxian Zeng and   
                   Siu-Ming Yiu   Privacy-preserving verifiable elastic
                                  net among multiple institutions in the
                                  cloud  . . . . . . . . . . . . . . . . . 791--815
        Alessandro Barenghi and   
          Nicholas Mainardi and   
                 Gerardo Pelosi   Systematic parsing of X.509: Eradicating
                                  security issues with a parse tree  . . . 817--849


Journal of Computer Security
Volume 27, Number 1, 2019

              Matteo Maffei and   
           Giulio Malavolta and   
             Manuel Reinert and   
        Dominique Schröder   Group ORAM for privacy and access
                                  control in outsourced personal records   1--47
     Sébastien Salva and   
               Loukmen Regainia   A catalogue associating security
                                  patterns and attack steps to design
                                  secure applications  . . . . . . . . . . 49--74
       Grégory Demay and   
               Peter Ga\vzi and   
                Ueli Maurer and   
            Björn Tackmann   Per-session security: Password-based
                                  cryptography revisited . . . . . . . . . 75--111
         Frederik Armknecht and   
           Zinaida Benenson and   
            Philipp Morgner and   
      Christian Müller and   
                Christian Riess   Privacy implications of room climate
                                  data . . . . . . . . . . . . . . . . . . 113--136
             Sandrine Blazy and   
            David Pichardie and   
                     Alix Trieu   Verifying constant-time implementations
                                  by abstract interpretation . . . . . . . 137--163

Journal of Computer Security
Volume 27, Number 2, 2019

        Suryadipta Majumdar and   
             Azadeh Tabiban and   
               Yosr Jarraya and   
               Momen Oqaily and   
       Amir Alimohammadifar and   
            Makan Pourzandi and   
                Lingyu Wang and   
                 Mourad Debbabi   Learning probabilistic dependencies
                                  among events for proactive security
                                  auditing in clouds . . . . . . . . . . . 165--202
                Cas Cremers and   
         Martin Dehnel-Wild and   
                   Kevin Milner   Secure authentication in the grid: a
                                  formal analysis of DNP3 SAv5 . . . . . . 203--232
          Stefano Calzavara and   
             Alvise Rabitti and   
               Michele Bugliesi   Sub-session hijacking on the web: Root
                                  causes and prevention  . . . . . . . . . 233--257
             Yangguang Tian and   
                 Yingjiu Li and   
                Guomin Yang and   
               Willy Susilo and   
                      Yi Mu and   
                    Hui Cui and   
                  Yinghui Zhang   DABKE: Secure deniable attribute-based
                                  key exchange framework . . . . . . . . . 259--275

Journal of Computer Security
Volume 27, Number 3, 2019

              Lucca Hirschi and   
               David Baelde and   
       Stéphanie Delaune   A method for unbounded verification of
                                  privacy-type properties  . . . . . . . . 277--342
           Matteo Zavatteri and   
                  Luca Vigan\`o   Last man standing: Static, decremental
                                  and dynamic resiliency via controller
                                  synthesis  . . . . . . . . . . . . . . . 343--373
                 Xingjie Yu and   
       Michael Shiwen Thang and   
                 Yingjiu Li and   
             Robert Huijie Deng   Collusion attacks and fair time-locked
                                  deposits for fast-payment transactions
                                  in Bitcoin . . . . . . . . . . . . . . . 375--403

Journal of Computer Security
Volume 27, Number 4, 2019

             Kiran Balagani and   
           Matteo Cardaioli and   
                Mauro Conti and   
                Paolo Gasti and   
            Martin Georgiev and   
            Tristan Gurtler and   
               Daniele Lain and   
            Charissa Miller and   
              Kendall Molas and   
             Nikita Samarin and   
               Eugen Saraci and   
                Gene Tsudik and   
                        Lynn Wu   PILOT: Password and PIN information
                                  leakage from obfuscated typing videos    405--425
           Nawaf Alhebaishi and   
                Lingyu Wang and   
             Sushil Jajodia and   
                  Anoop Singhal   Mitigating the insider threat of remote
                                  administrators in clouds through
                                  maintenance task assignments . . . . . . 427--458
               Tobias Urban and   
              Dennis Tatang and   
              Thorsten Holz and   
               Norbert Pohlmann   Analyzing leakage of personal
                                  information by malware . . . . . . . . . 459--481
               Gunjan Batra and   
       Vijayalakshmi Atluri and   
             Jaideep Vaidya and   
                   Shamik Sural   Deploying ABAC policies using RBAC
                                  systems  . . . . . . . . . . . . . . . . 483--506

Journal of Computer Security
Volume 27, Number 5, 2019

       George Stergiopoulos and   
       Georgia Chronopoulou and   
         Evangelos Bitsikas and   
            Nikolaos Tsalis and   
             Dimitris Gritzalis   Using side channel TCP features for
                                  real-time detection of malware
                                  connections  . . . . . . . . . . . . . . 507--520
              Juan E. Rubio and   
              Rodrigo Roman and   
           Cristina Alcaraz and   
                      Yan Zhang   Tracking APTs in industrial ecosystems:
                                  a proof of concept . . . . . . . . . . . 521--546
                 Ziqiang Ma and   
                Quanwei Cai and   
              Jingqiang Lin and   
                     Bo Luo and   
                      Jiwu Jing   Towards the optimal performance of
                                  integrating Warm and Delay against
                                  remote cache timing side channels on
                                  block ciphers  . . . . . . . . . . . . . 547--580