Last update:
Fri Sep 29 09:39:51 MDT 2023
Sushil Jajodia and
Jonathan Millen Editors' Preface . . . . . . . . . . . . 1--3
Catherine Meadows Applying Formal Methods to the Analysis
of a Key Management Protocol . . . . . . 5--35
John McLean Proving Noninterference and Functional
Correctness Using Traces . . . . . . . . 37--57
Ravi S. Sandhu Expressive Power of the Schematic
Protection Model . . . . . . . . . . . . 59--98
Pierre Bieber and
Frédéric Cuppens A Logical View of Secure Dependencies 99--129
Anonymous Call for Papers: European Symposium on
Research in Computer Security . . . . . 131--131
Ravi Sandhu Guest Editor's Preface . . . . . . . . . 131--132
Sarbari Gupta and
Virgil D. Gligor Towards a Theory of
Penetration-Resistant Systems and Its
Applications . . . . . . . . . . . . . . 133--158
Simon N. Foley Aggregation and Separation as
Noninterference Properties . . . . . . . 159--188
Amihai Motro A Unified Model for Security and
Integrity in Relational Databases . . . 189--213
Sushil Jajodia and
Jonathan Millen Editors' Preface . . . . . . . . . . . . 215--215
Teresa F. Lunt and
John McLean Guest Editors' Preface . . . . . . . . . 217--218
John C. Wray An Analysis of Covert Timing Channels 219--232
Wei-Ming Hu Reducing Timing Channels with Fuzzy Time 233--254
James W. Gray III Toward a Mathematical Foundation for
Information Flow Security . . . . . . . 255--294
Joseph J. Tardo and
Kannan Alagappan SPX: Global Authentication Using Public
Key Certificates . . . . . . . . . . . . 295--316
Paul F. Syverson Knowledge, Belief, and Semantics in the
Analysis of Cryptographic Protocols . . 317--334
Paul E. Ammann and
Ravi S. Sandhu The Extended Schematic Protection Model 335--383
Jeremy Jacob Basic Theorems about Security . . . . . 385--411
Anonymous Author Index . . . . . . . . . . . . . . 413--413
Sushil Jajodia and
Jonathan Millen Editors' Preface . . . . . . . . . . . . 85--85
John McLean and
Richard Kemmerer Guest Editors' Preface . . . . . . . . . 87--88
Jonathan K. Millen A Resource Allocation Model for Denial
of Service Protection . . . . . . . . . 89--106
Thomas Y. C. Woo and
Simon S. Lam Authorization in Distributed Systems: A
New Approach . . . . . . . . . . . . . . 107--136
Virgil D. Gligor and
Shyh-Wei Luan and
Joseph N. Pato On Inter-Realm Authentication in Large
Distributed Systems . . . . . . . . . . 137--157
Jeremy Epstein and
John McHugh and
Hilarie Orman and
Rita Pascale and
Ann Marmor-Squires and
Bonnie Danner and
Charles R. Martin and
Martha Branstad and
Glenn Benson and
Doug Rothnie A High Assurance Window System Prototype 159--190
Raphael Yahalom Optimality of Asynchronous Two-Party
Secure Data-Exchange Protocols . . . . . 191--209
Bev Littlewood and
Sarah Brocklehurst and
Norman Fenton and
Peter Mellor and
Stella Page and
David Wright and
John Dobson and
John McDermid and
Dieter Gollmann Towards Operational Measures of Computer
Security . . . . . . . . . . . . . . . . 211--229
Roshan K. Thomas and
Ravi S. Sandhu A Kernelized Architecture for Multilevel
Secure Object-Oriented Databases
Supporting Write-Up . . . . . . . . . . 231--275
Jonathan Millen Editor's Preface . . . . . . . . . . . . 277--277
J. D. Horton and
R. H. Cooper and
W. F. Hyslop and
B. G. Nickerson and
O. K. Ward and
Robert Harland and
Elton Ashby and
W. M. Stewart The Cascade Vulnerability Problem . . . 279--290
Jonathan T. Trostle Modelling a Fuzzy Time System . . . . . 291--309
Vijayalakshmi Atluri and
Sushil Jajodia and
Elisa Bertino Achieving Stricter Correctness
Requirements in Multilevel Secure
Database Management Systems . . . . . . 311--351
Anonymous Author Index . . . . . . . . . . . . . . 353--354
Sushil Jajodia and
Jonathan Millen Editors' Preface . . . . . . . . . . . . 1--1
Li Gong Guest Editor's Preface . . . . . . . . . 3--3
Riccardo Focardi and
Roberto Gorrieri A Classification of Security Properties
for Process Algebras . . . . . . . . . . 5--33
Jonathan K. Millen Unwinding Forward Correctability . . . . 35--54
William R. Bevier and
William D. Young A State-based Approach to
Noninterference . . . . . . . . . . . . 55--70
G. J. Simmons and
Catherine Meadows The Role of Trust in Information
Integrity Protocols . . . . . . . . . . 71--84
Jonathan K. Millen Editor's Preface . . . . . . . . . . . . 85--85
Paul Ammann and
Frank Jaeckle and
Sushil Jajodia Concurrency Control in a Secure
Multilevel Database via a Two-Snapshot
Algorithm . . . . . . . . . . . . . . . 87--113
I. E. Kang and
T. F. Keefe Transaction Management for Multilevel
Secure Replicated Databases . . . . . . 115--145
Thomas H. Hinke and
Harry S. Delugach and
Asha Chandrasekhar A Fast Algorithm for Detecting Second
Paths in Database Inference Analysis . . 147--168
Elisa Bertino and
Fabio Origgi and
Pierangela Samarati An Extended Authorization Model for
Object Databases . . . . . . . . . . . . 169--206
LouAnna Notargiacomo and
Barbara T. Blaustein and
Catherine D. McCollum Merging Models: Integrity, Dynamic
Separation of Duty and Trusted Data
Management . . . . . . . . . . . . . . . 207--230
Sushil Jajodia and
Jonathan Millen Editors' Preface . . . . . . . . . . . . 231--231
Simon N. Foley and
Jeremy L. Jacob Specifying Security for Computer
Supported Collaborative Working . . . . 233--253
Liqun Chen and
Dieter Gollmann and
Christopher J. Mitchell Distributing Trust Amongst Multiple
Authentication Servers . . . . . . . . . 255--267
A. Zakinthinos and
E. S. Lee The Composability of Non-Interference 269--281
Matt Bishop Theft of Information in the Take-Grant
Protection Model . . . . . . . . . . . . 283--308
C. Blundo and
Luiz A. Frota Mattos and
D. R. Stinson Multiple Key Distribution Maintaining
User Anonymity via Broadcast Channels 309--322
Anonymous Call for Papers . . . . . . . . . . . . 323--324
Anonymous Author Index Volume 3 . . . . . . . . . 325--326
Elisa Bertino and
Gérard Eizenberg and
Roger M. Needham Guest-editors' preface . . . . . . . . . 1--2
Bruno d'Ausbourg and
Christel Calas Controlling causal dependencies over a
secure network . . . . . . . . . . . . . 3--25
A. W. Roscoe and
J. C. P. Woodcock and
L. Wulf Non-interference through determinism . . 27--53
Ueli M. Maurer and
Pierre E. Schmid A calculus for security boots trapping
in distributed systems . . . . . . . . . 55--80
Azad Jiwa and
Thomas Hardjono and
Jennifer Seberry Beacons for authentication in
distributed systems . . . . . . . . . . 81--96
Ralf Hauser and
Philippe Janson and
Gene Tsudik and
Els Van Herreweghen and
Refik Molva Robust and secure password and key
change method . . . . . . . . . . . . . 97--111
Anonymous Information for authors . . . . . . . . 113--119
Sushil Jajodia and
Jonathan Millen Editors' preface . . . . . . . . . . . . 121--121
Shiuh-Pyng Shieh and
Virgil D. Gligor Detecting illicit leakage of information
in operating systems . . . . . . . . . . 123--148
Paul Ammann and
Ravi S. Sandhu and
Richard Lipton The expressive power of multi-parent
creation in monotonic access control
models . . . . . . . . . . . . . . . . . 149--165
Dennis Volpano and
Cynthia Irvine and
Geoffrey Smith A sound type system for secure flow
analysis . . . . . . . . . . . . . . . . 167--187
John McDermott and
Ravi Mukkamala Analytic performance comparison of
transaction processing algorithms for
the SINTRA replicated-architecture
database system . . . . . . . . . . . . 189--228
Jonathan Millen Editor's preface to the Bell--LaPadula
model . . . . . . . . . . . . . . . . . 229--231
Leonard J. LaPadula Foreword . . . . . . . . . . . . . . . . 233--238
Leonard J. LaPadula and
D. Elliott Bell MITRE Technical Report 2547, Volume II 239--263
Sushil Jajodia and
Jonathan Millen Editors' preface . . . . . . . . . . . . 265--265
Michael K. Reiter and
Matthew K. Franklin and
John B. Lacy and
Rebecca N. Wright The $ \Omega $ key management service 267--287
Shaw-Cheng Chuang Securing ATM networks . . . . . . . . . 289--329
Matt Bishop Conspiracy and information flow in the
Take-Grant Protection Model . . . . . . 331--359
Anonymous Author Index Volume 4 (1996) . . . . . . 361--362
Elisa Bertino and
Emilio Montolivo and
Helmut Kurth Guest editors' preface . . . . . . . . . 1--2
P. A. Bonatti and
M. L. Sapino and
V. S. Subrahmanian Merging heterogeneous security orderings 3--29
Volkmar Lotz Threat scenarios as a means to formally
develop secure systems . . . . . . . . . 31--67
Jan Camenisch and
Ueli Maurer and
Markus Stadler Digital payment systems with passive
anonymity-revoking trustees . . . . . . 69--89
N. Asokan and
G. Tsudik and
M. Waidner Server-supported signatures . . . . . . 91--108
Sushil Jajodia and
Jonathan Millen Editors' preface . . . . . . . . . . . . 109--109
Michael Merritt Guest editor's preface . . . . . . . . . 111--112
Dahlia Malkhi and
Michael Reiter A high-throughput secure reliable
multicast protocol . . . . . . . . . . . 113--127
Jane Sinclair Action systems for security
specification . . . . . . . . . . . . . 129--154
Sabrina De Capitani di Vimercati and
Pierangela Samarati Authorization specification and
enforcement in federated database
systems . . . . . . . . . . . . . . . . 155--188
Elisa Bertino and
Pierangela Samarati and
Gian Paolo Rossi Special issue on Security in the World
Wide Web (WWW) . . . . . . . . . . . . . 189--190
F. Bergadano and
B. Crispo and
M. Lomas Strong authentication and privacy with
standard browsers . . . . . . . . . . . 191--212
Jean-Jacques Quisquater and
Marc Joye Authentication of sequences with the
SL$_2$ hash function: application to
video sequences . . . . . . . . . . . . 213--223
Ciarán Bryce and
Winfried Kühnhauser and
Rémy Amouroux and
Mauricio López and
Harry Rudnik CWASAR: a European infrastructure for
secure electronic commerce . . . . . . . 225--235
Paul F. Syverson and
Michael G. Reed and
David M. Goldschlag Private Web browsing . . . . . . . . . . 237--248
Martin Röscheisen and
Terry Winograd A network-centric design for
relationship-based security and access
control . . . . . . . . . . . . . . . . 249--254
M. Winslett and
N. Ching and
V. Jones and
I. Slepchin Using digital credentials on the World
Wide Web . . . . . . . . . . . . . . . . 255--267
Pierangela Samarati and
Ravi Sandhu Guest editors' preface . . . . . . . . . 269--270
S. Castano and
S. De Capitani di Vimercati and
M. G. Fugini Automated derivation of global
authorizations for database federations 271--301
Vijayalakshmi Atluri and
Wei-Kuang Huang Enforcing mandatory and discretionary
security in workflow management systems 303--339
S. A. Demurjian Sr. and
T. C. Ting Towards a definitive paradigm for
security in object-oriented systems and
applications . . . . . . . . . . . . . . 341--382
Anonymous Author Index Volume 5 (1997) . . . . . . 383--384
Simon N. Foley Guest editors' preface . . . . . . . . . 1--1
Martín Abadi On SDSI's linked local name spaces . . . 3--21
James W. Gray III and
Kin Fai Epsilon Ip and
King-Shan Lui Provable security for cryptographic
protocols --- exact analysis and
engineering applications . . . . . . . . 23--52
Gavin Lowe Casper: A compiler for the analysis of
security protocols . . . . . . . . . . . 53--84
Lawrence C. Paulson The inductive approach to verifying
cryptographic protocols . . . . . . . . 85--128
Tsutomu Matsumoto Human--computer cryptography: An attempt 129--149
Steven A. Hofmeyr and
Stephanie Forrest and
Anil Somayaji Intrusion detection using sequences of
system calls . . . . . . . . . . . . . . 151--180
Indrakshi Ray and
Paul Ammann and
Sushil Jajodia A semantic-based transaction processing
model for multilevel transactions . . . 181--217
Lars R. Knudsen and
Keith M. Martin In search of multiple domain key
recovery . . . . . . . . . . . . . . . . 219--235
Matthew K. Franklin and
Dahlia Malkhi Auditable metering with lightweight
security . . . . . . . . . . . . . . . . 237--255
Fabio Casati and
Silvana Castano and
Maria Grazia Fugini Enforcing workflow authorization
constraints using triggers . . . . . . . 257--285
Anonymous Author Index Volume 6 (1998) . . . . . . 287--287
Jonathan Millen Special section on Intrusion Detection 1--1
Thomas E. Daniels and
Eugene H. Spafford Identification of host audit data to
detect attacks on low-level IP
vulnerabilities . . . . . . . . . . . . 3--35
Giovanni Vigna and
Richard A. Kemmerer NetSTAT: A network-based intrusion
detection system . . . . . . . . . . . . 37--71
Carlo Blundo and
Barbara Masucci A note on the randomness in dynamic
threshold schemes . . . . . . . . . . . 73--85
Simon N. Foley Guest editor's preface . . . . . . . . . 87--87
Gavin Lowe Towards a completeness result for model
checking of security protocols . . . . . 89--146
A. W. Roscoe and
P. J. Broadfoot Proving security protocols with model
checkers by data independence techniques 147--190
F. Javier Thayer Fábrega and
Jonathan C. Herzog and
Joshua D. Guttman Strand spaces: proving security
protocols correct . . . . . . . . . . . 191--230
Dennis Volpano and
Geoffrey Smith Probabilistic noninterference in a
concurrent language . . . . . . . . . . 231--253
T. Y. Lin Guest editor's preface . . . . . . . . . 255--255
Elisa Bertino and
Elena Ferrari Secure object deletion and garbage
collection in multilevel object bases 257--285
Ehud Gudes and
Martin S. Olivier and
Reind P. van de Riet Modelling, specifying and implementing
workflow security in Cyberspace . . . . 287--315
Ravi Sandhu and
Venkata Bhamidipati Role-based administration of user-role
assignment: The URA97 model and its
Oracle implementation . . . . . . . . . 317--342
T. Y. Lin Guest editor's preface . . . . . . . . . 1--1
Vijayalakshmi Atluri and
Wei-Kuang Huang and
Elisa Bertino A semantic-based execution model for
multilevel secure workflows . . . . . . 3--41
John Hale and
Jody Threet and
Sujeet Shenoi A ticket-based access control
architecture for object systems . . . . 43--65
Adrian Spalka and
Armin B. Cremers Structured name-spaces in secure
databases . . . . . . . . . . . . . . . 67--86
Yves Deswarte and
Catherine Meadows Guest editors' preface . . . . . . . . . 87--87
Günter Karjoth Authorization in CORBA Security . . . . 89--108
Elisa Bertino and
Francesco Buccafurri and
Elena Ferrari and
Pasquale Rullo A logic-based approach for enforcing
access control . . . . . . . . . . . . . 109--139
John Kelsey and
Bruce Schneier and
David Wagner and
Chris Hall Side channel cryptanalysis of product
ciphers . . . . . . . . . . . . . . . . 141--158
Andreas Wespi and
Hervé Debar and
Marc Dacier and
Mehdi Nassehi Fixed- vs. variable-length patterns for
detecting suspicious process behavior 159--181
Günther Horn and
Bart Preneel Authentication and payment in future
mobile systems . . . . . . . . . . . . . 183--207
Vijayalakshmi Atluri and
Wei-Kuang Huang A Petri net based safety analysis of
workflow authorization models . . . . . 209--240
Vijay Atluri and
John Hale Guest Editor's preface . . . . . . . . . 241--242
Peng Liu and
Sushil Jajodia and
Catherine D. McCollum Intrusion confinement by isolation in
information systems . . . . . . . . . . 243--279
Chris Clifton Using sample size to limit exposure to
data mining . . . . . . . . . . . . . . 281--307
Elisa Bertino and
Piero Andrea Bonatti and
Elena Ferrari and
Maria Luisa Sapino Temporal authorization bases: From
specification to integration . . . . . . 309--353
Paul F. Syverson Guest Editor's preface . . . . . . . . . 1--2
Mei Lin Hui and
Gavin Lowe Fault-preserving simplifying
transformations for security protocols 3--46
Dawn Xiaodong Song and
Sergey Berezin and
Adrian Perrig Athena: a novel approach to efficient
automatic security protocol analysis . . 47--74
P. Y. A. Ryan and
S. A. Schneider Process algebra and non-interference . . 75--103
Joseph Y. Halpern and
Ron van der Meyden A logic for SDSI's linked local name
spaces . . . . . . . . . . . . . . . . . 105--142
Catherine Meadows A cost-based framework for analysis of
denial of service in networks . . . . . 143--164
Sushil Jajodia and
Vijayalakshmi Atluri and
Thomas F. Keefe and
Catherine D. McCollum and
Ravi Mukkamala Multilevel secure transaction processing 165--195
Lawrence C. Paulson Relations between secrets: two formal
analyses of the Yahalom protocol . . . . 197--216
Frédéric Besson and
Thomas Jensen and
Daniel Le Métayer and
Tommy Thorn Model checking security properties of
control flow graphs . . . . . . . . . . 217--250
Sabrina De Capitani di Vimercati and
Patrick Lincoln and
Livio Ricciulli and
Pierangela Samarati Global infrastructure protection system 251--283
Dwaine Clarke and
Jean-Emile Elien and
Carl Ellison and
Matt Fredette and
Alexander Morcos and
Ronald L. Rivest Certificate chain discovery in SPKI/SDSI 285--322
Rebecca N. Wright and
Patrick D. Lincoln and
Jonathan K. Millen Depender graphs: A method of
fault-tolerant certificate distribution 323--338
Anonymous Author Index Volume 9 (2001) . . . . . . 339--340
Deborah Frincke Guest Editor's preface . . . . . . . . . 1--3
Wenke Lee and
Wei Fan and
Matthew Miller and
Salvatore J. Stolfo and
Erez Zadok Toward cost-sensitive modeling for
intrusion detection and response . . . . 5--22
Florian Kerschbaum and
Eugene H. Spafford and
Diego Zamboni Using internal sensors and embedded
detectors for intrusion detection . . . 23--70
Steven T. Eckmann and
Giovanni Vigna and
Richard A. Kemmerer STATL: An attack language for
state-based intrusion detection . . . . 71--103
Stuart Staniford and
James A. Hoagland and
Joseph M. McAlerney Practical automated detection of
stealthy portscans . . . . . . . . . . . 105--136
Yingjiu Li and
Ningning Wu and
X. Sean Wang and
Sushil Jajodia Enhancing profiles for anomaly detection
using time granularities . . . . . . . . 137--157
Diomidis Spinellis and
Dimitris Gritzalis Panoptis: Intrusion detection using a
domain-specific language . . . . . . . . 159--176
Alec Yasinsac An environment for security protocol
intrusion detection . . . . . . . . . . 177--188
C. R. Ramakrishnan and
R. Sekar Model-based analysis of configuration
vulnerabilities . . . . . . . . . . . . 189--209
Sushil Jajodia and
Dimitris Gritzalis Guest Editors' preface . . . . . . . . . 211--211
Brian Neil Levine and
Clay Shields Hordes: a multicast based protocol for
anonymity . . . . . . . . . . . . . . . 213--240
Piero A. Bonatti and
Pierangela Samarati A uniform framework for regulating
service access and information release
on the Web . . . . . . . . . . . . . . . 241--271
Ahto Buldas and
Peeter Laud and
Helger Lipmaa Eliminating counterevidence with
applications to accountable certificate
management . . . . . . . . . . . . . . . 273--296
Rebecca N. Wright and
Patrick D. Lincoln and
Jonathan K. Millen Depender graphs: A method of
fault-tolerant certificate distribution 297--297
Frédéric Cuppens Guest Editor's preface . . . . . . . . . 299--300
Gerald Brose Manageable access control for CORBA . . 301--337
Gerhard Schellhorn and
Wolfgang Reif and
Axel Schairer and
Paul Karger and
Vernon Austel and
David Toll Verified formal security models for
multiapplicative smart cards . . . . . . 339--367
P. Bieber and
J. Cazin and
P. Girard and
J.-L. Lanet and
V. Wiels and
G. Zanon Checking secure interactions of smart
card applets: extended version . . . . . 369--398
Ian Welch and
Robert J. Stroud Using reflection as a mechanism for
enforcing security policies on compiled
code . . . . . . . . . . . . . . . . . . 399--432
Anonymous Author Index Volume 10 (2002) . . . . . 433--434
Charles Iheagwara and
Andrew Blyth and
Mukesh Singhal A comparative experimental evaluation
study of intrusion detection system
performance in a gigabit environment . . 1--33
Ninghui Li and
William H. Winsborough and
John C. Mitchell Distributed credential chain discovery
in trust management . . . . . . . . . . 35--86
Giampaolo Bella Inductive verification of smart card
protocols . . . . . . . . . . . . . . . 87--132
Paul F. Syverson Guest Editor's preface . . . . . . . . . 133--133
Peter Sewell and
Jan Vitek Secure composition of untrusted code:
box $ \pi $, wrappers, and causality
types . . . . . . . . . . . . . . . . . 135--187
Ernie Cohen First-order verification of
cryptographic protocols . . . . . . . . 189--216
James Heather and
Gavin Lowe and
Steve Schneider How to prevent type flaw attacks on
security protocols . . . . . . . . . . . 217--244
Pankaj Kakkar and
Carl A. Gunter and
Martín Abadi Reasoning about secrecy for active
networks . . . . . . . . . . . . . . . . 245--287
Bhavani Thuraisingham and
Reind van de Riet Guest Editors' preface . . . . . . . . . 289--289
Premkumar Devanbu and
Michael Gertz and
Charles Martel and
Stuart G. Stubblebine Authentic data publication over the
Internet . . . . . . . . . . . . . . . . 291--314
Daniel Barbará and
Rajni Goel and
Sushil Jajodia A checksum-based corruption detection
technique . . . . . . . . . . . . . . . 315--329
John Hale and
Mauricio Papa and
Sujeet Shenoi Programmable access control . . . . . . 331--351
Wouter Teepe and
Reind van de Riet and
Martin Olivier WorkFlow analyzed for security and
privacy in using databases . . . . . . . 353--363
C. Altenschmidt and
J. Biskup and
U. Flegel and
Y. Karabulut Secure mediation: requirements, design,
and architecture . . . . . . . . . . . . 365--398
Steve Kremer and
Jean-François Raskin A game-based verification of
non-repudiation and fair exchange
protocols . . . . . . . . . . . . . . . 399--429
Katherine Campbell and
Lawrence A. Gordon and
Martin P. Loeb and
Lei Zhou The economic cost of publicly announced
information security breaches: empirical
evidence from the stock market . . . . . 431--448
Steve Schneider Guest Editor's preface . . . . . . . . . 449--450
Andrew D. Gordon and
Alan Jeffrey Authenticity by typing for security
protocols . . . . . . . . . . . . . . . 451--519
Eijiro Sumii and
Benjamin C. Pierce Logical relations for encryption . . . . 521--554
Olivier Pereira and
Jean-Jacques Quisquater Some attacks upon authenticated group
key agreement protocols . . . . . . . . 555--580
Joseph Y. Halpern and
Ron van der Meyden A logical reconstruction of SPKI . . . . 581--613
Heiko Mantel and
Andrei Sabelfeld A unifying approach to the security of
distributed and multi-threaded programs 615--676
Nancy Durgin and
John Mitchell and
Dusko Pavlovic A compositional logic for proving
security properties of protocols . . . . 677--721
Anonymous Author Index Volume 11 (2003) . . . . . 723--725
Joshua Guttman Guest Editor's preface . . . . . . . . . 1--1
Dominic Hughes and
Vitaly Shmatikov Information hiding, anonymity and
privacy: a modular approach . . . . . . 3--36
Alessandra Di Pierro and
Chris Hankin and
Herbert Wiklicky Approximate non-interference . . . . . . 37--81
Gavin Lowe Analysing protocols subject to guessing
attacks . . . . . . . . . . . . . . . . 83--97
Daniele Micciancio and
Bogdan Warinschi Completeness theorems for the
Abadi--Rogaway language of encrypted
expressions . . . . . . . . . . . . . . 99--129
Ajay Chander and
Drew Dean and
John C. Mitchell Reconstructing trust management . . . . 131--164
Dirk Ourston and
Sara Matzner and
William Stump and
Bryan Hopkins Coordinated Internet attacks: responding
to attack complexity . . . . . . . . . . 165--190
Alessandro Aldini and
Mario Bravetti and
Roberto Gorrieri A process-algebraic approach for the
analysis of probabilistic
noninterference . . . . . . . . . . . . 191--245
Nancy Durgin and
Patrick Lincoln and
John Mitchell and
Andre Scedrov Multiset rewriting and the complexity of
bounded security protocols . . . . . . . 247--311
Steve Schneider Guest Editor's preface . . . . . . . . . 313--315
S. Jha and
T. Reps Model checking SPKI/SDSI . . . . . . . . 317--353
Vitaly Shmatikov Probabilistic analysis of an anonymity
system . . . . . . . . . . . . . . . . . 355--377
P. J. Broadfoot and
A. W. Roscoe Embedding agents within the intruder to
detect parallel attacks . . . . . . . . 379--408
Joshua D. Guttman Authentication tests and disjoint
encryption: A design method for security
protocols . . . . . . . . . . . . . . . 409--433
Andrew D. Gordon and
Alan Jeffrey Types and effects for asymmetric
cryptographic protocols . . . . . . . . 435--483
Dominic Duggan Type-based cryptographic operations . . 485--550
Levente Buttyán and
Jean-Pierre Hubaux and
Srdjan \vCapkun A formal model of rational exchange and
its application to the analysis of
Syverson's protocol . . . . . . . . . . 551--587
Michael Backes and
Birgit Pfitzmann and
Michael Waidner and
Michael Steiner Polynomial liveness . . . . . . . . . . 589--617
Gavin Lowe Defining information flow quantity . . . 619--653
Lingyu Wang and
Duminda Wijesekera and
Sushil Jajodia Cardinality-based inference control in
data cubes . . . . . . . . . . . . . . . 655--692
Roberto Di Pietro and
Luigi V. Mancini and
Alessandro Mei Key management for high bandwidth secure
multicast . . . . . . . . . . . . . . . 693--709
Taenam Cho and
Sang-Ho Lee and
Won Kim A group key recovery mechanism based on
logical key hierarchy . . . . . . . . . 711--736
Jian Zhang and
Jian Gong and
Yong Ding Research on automated rollbackability of
intrusion response . . . . . . . . . . . 737--751
Florian P. Buchholz and
Clay Shields Providing process origin information to
aid in computer forensic investigations 753--776
Charles Iheagwara and
Andrew Blyth and
Mukesh Singhal Cost effective management frameworks for
intrusion detection systems . . . . . . 777--798
Vijayalakshmi Atluri and
Soon Ae Chun and
Pietro Mazzoleni Chinese wall security for decentralized
workflow management systems . . . . . . 799--840
Premkumar Devanbu and
Michael Gertz and
April Kwong and
Charles Martel and
Glen Nuckolls and
Stuart G. Stubblebine Flexible authentication of XML documents 841--864
Joshua D. Guttman and
F. Javier Thayer and
Lenore D. Zuck The faithfulness of abstract protocol
analysis: Message authentication . . . . 865--891
Catherine Meadows and
Paul Syverson and
Iliano Cervesato Formal specification and analysis of the
Group Domain of Interpretation Protocol
using NPATRL and the NRL Protocol
Analyzer . . . . . . . . . . . . . . . . 893--931
Anonymous Author Index Volume 12 (2004) . . . . . 933--935
Roberto Gorrieri Guest Editor's preface . . . . . . . . . 1--2
Stefano Bistarelli and
Iliano Cervesato and
Gabriele Lenzini and
Fabio Martinelli Relating multiset rewriting and process
algebras for security protocol analysis 3--47
Chiara Bodei and
Pierpaolo Degano and
Corrado Priami Checking security policies through an
enhanced Control Flow Analysis . . . . . 49--85
Michele Bugliesi and
Sabina Rossi Non-interference proof techniques for
the analysis of cryptographic protocols 87--113
Joshua D. Guttman and
Amy L. Herzog and
John D. Ramsdell and
Clement W. Skorupka Verifying information flow goals in
Security-Enhanced Linux . . . . . . . . 115--134
R. Ramanujam and
S. P. Suresh Decidability of context-explicit
security protocols . . . . . . . . . . . 135--165
Vitaly Shmatikov and
Carolyn Talcott Reputation-based trust management . . . 167--190
E. Bertino and
E. Ferrari and
G. Mella An approach to cooperative updates of
XML documents in distributed systems . . 191--242
André Zúquete An efficient high quality random number
generator for multi-programmed systems 243--263
Iliano Cervesato and
Nancy A. Durgin and
Patrick D. Lincoln and
John C. Mitchell and
Andre Scedrov A comparison between strand spaces and
multiset rewriting for security protocol
analysis . . . . . . . . . . . . . . . . 265--316
James Heather and
Steve Schneider A decision procedure for the existence
of a rank function . . . . . . . . . . . 317--344
Riccardo Focardi Guest Editor's preface . . . . . . . . . 345--345
Chiara Bodei and
Mikael Buchholtz and
Pierpaolo Degano and
Flemming Nielson and
Hanne Riis Nielson Static validation of security protocols 347--390
Annalisa Bossi and
Damiano Macedonio and
Carla Piazza and
Sabina Rossi Information flow in secure contexts . . 391--422
Anupam Datta and
Ante Derek and
John C. Mitchell and
Dusko Pavlovic A derivation system and compositional
logic for security protocols . . . . . . 423--482
Joseph Y. Halpern and
Kevin R. O'Neill Anonymity and information hiding in
multiagent systems . . . . . . . . . . . 483--514
Jonathan Millen and
Vitaly Shmatikov Symbolic protocol analysis with an
Abelian group operator or
Diffie--Hellman exponentiation . . . . . 515--564
Bogdan Warinschi A computational analysis of the
Needham--Schroeder--(Lowe) protocol . . 565--591
Jaideep Vaidya and
Chris Clifton Secure set intersection cardinality with
application to association rule mining 593--622
Meng Yu and
Peng Liu and
Wanyu Zang Specifying and using intrusion masking
models to process distributed operations 623--658
Salvatore J. Stolfo and
Frank Apap and
Eleazar Eskin and
Katherine Heller and
Shlomo Hershkop and
Andrew Honig and
Krysta Svore A comparative evaluation of two
algorithms for Windows Registry Anomaly
Detection . . . . . . . . . . . . . . . 659--693
Jonathan Millen and
Vitaly Shmatikov Symbolic protocol analysis with an
Abelian group operator or
Diffie--Hellman exponentiation . . . . . 695--695
Giampaolo Bella and
Peter Ryan Guest Editors' preface . . . . . . . . . 697--697
Stefano Bistarelli and
Simon N. Foley and
Barry O'Sullivan A soft constraint-based approach to the
cascade vulnerability problem . . . . . 699--720
Christian Collberg and
Tapas Ranjan Sahoo Software watermarking in the frequency
domain: Implementation, analysis, and
attacks . . . . . . . . . . . . . . . . 721--755
Aleksandra Nenadi\'c and
Ning Zhang and
Qi Shi RSA-based Verifiable and Recoverable
Encryption of Signatures and its
application in certified e-mail delivery 757--777
Christos Siaterlis and
Vasilis Maglaris One step ahead to multisensor data
fusion for DDoS detection . . . . . . . 779--806
Jarmo Mölsä Mitigating denial of service attacks: A
tutorial . . . . . . . . . . . . . . . . 807--837
Rob Sherwood and
Bobby Bhattacharjee and
Aravind Srinivasan P5: A protocol for scalable anonymous
communication . . . . . . . . . . . . . 839--876
Antonio Pescap\`e and
Giorgio Ventre Experimental analysis of attacks against
intradomain routing protocols . . . . . 877--903
Anonymous Author Index Volume 13 (2005) . . . . . 905--907
Véronique Cortier and
Stéphanie Delaune and
Pascal Lafourcade A survey of algebraic properties used in
cryptographic protocols . . . . . . . . 1--43
Stelvio Cimato and
Antonella Cresti and
Paolo D'Arco A unified model for unconditionally
secure key distribution . . . . . . . . 45--64
Riccardo Focardi and
Sabina Rossi Information flow security in dynamic
contexts . . . . . . . . . . . . . . . . 65--110
Riccardo Focardi Preface . . . . . . . . . . . . . . . . 111--111
Chiara Braghin and
Daniele Gorla and
Vladimiro Sassone Role-based access control for a
distributed calculus . . . . . . . . . . 113--155
Andrew C. Myers and
Andrei Sabelfeld and
Steve Zdancewic Enforcing Robust Declassification and
Qualified Robustness . . . . . . . . . . 157--196
Olivier Pereira and
Jean-Jacques Quisquater On the impossibility of building secure
Cliques-type authenticated group key
agreement protocols . . . . . . . . . . 197--246
Atsuhiro Goto Preface . . . . . . . . . . . . . . . . 247--247
Thibault Candebat and
David Gray Secure pseudonym management using
mediated identity-based encryption . . . 249--267
Abhilasha Bhargav-Spantzel and
Anna C. Squicciarini and
Elisa Bertino Establishing and protecting digital
identity in federation systems . . . . . 269--300
Sencun Zhu and
Sanjeev Setia and
Shouhuai Xu and
Sushil Jajodia GKMPAN: An Efficient Group Rekeying
Scheme for Secure Multicast in Ad-Hoc
Networks . . . . . . . . . . . . . . . . 301--325
Arun K. Eamani and
A. Prasad Sistla Language based policy analysis in a SPKI
Trust Management System . . . . . . . . 327--357
Jianhong Xia and
Sarma Vangala and
Jiang Wu and
Lixin Gao and
Kevin Kwiat Effective worm detection for various
scan techniques . . . . . . . . . . . . 359--387
Jianying Zhou and
Meng-Chow Kang Preface . . . . . . . . . . . . . . . . 389--390
Geraint Price Public Key Infrastructures: A research
agenda . . . . . . . . . . . . . . . . . 391--417
M. Lippert and
V. Karatsiolis and
A. Wiesmaier and
J. Buchmann Life-cycle management of X.509
certificates based on LDAP directories 419--439
Guilin Wang Generic non-repudiation protocols
supporting transparent off-line TTP . . 441--467
Javier Lopez Unleashing public-key cryptography in
wireless sensor networks . . . . . . . . 469--482
Patrick McDaniel and
Atul Prakash Enforcing provisioning and authorization
policy in the Antigone system . . . . . 483--511
Andrew Blyth and
Paula Thomas Performing real-time threat assessment
of security incidents using data fusion
of IDS logs . . . . . . . . . . . . . . 513--534
Esma A\"\imeur and
Gilles Brassard and
Flavien Serge Mani Onana Blind Electronic Commerce . . . . . . . 535--559
Gethin Norman and
Vitaly Shmatikov Analysis of probabilistic contract
signing . . . . . . . . . . . . . . . . 561--589
Geoffrey Smith Improved typings for probabilistic
noninterference in a multi-threaded
language . . . . . . . . . . . . . . . . 591--623
Anonymous Author Index Volume 14 (2006) . . . . . 625--626
Anonymous Message from the Guest Editors . . . . . 1--2
Charikleia Zouridaki and
Brian L. Mark and
Marek Hejmo and
Roshan K. Thomas Hermes: A quantitative trust
establishment framework for reliable
data packet delivery in MANETs . . . . . 3--38
Maxim Raya and
Jean-Pierre Hubaux Securing vehicular ad hoc networks . . . 39--68
Haowen Chan and
Adrian Perrig and
Bartosz Przydatek and
Dawn Song SIA: Secure information aggregation in
sensor networks . . . . . . . . . . . . 69--102
S. Radosavac and
Alvaro A. Cárdenas and
John S. Baras and
George V. Moustakides Detecting IEEE 802.11 MAC layer
misbehavior in ad hoc networks: Robust
strategies against individual and
colluding attackers . . . . . . . . . . 103--128
Shouhuai Xu On the security of group communication
schemes . . . . . . . . . . . . . . . . 129--169
Giorgio Zanin and
Roberto Di Pietro and
Luigi V. Mancini Robust RSA distributed signatures for
large-scale long-lived ad hoc networks 171--196
Valentina Casola and
Antonino Mazzeo and
Nicola Mazzocca and
Valeria Vittorini A policy-based methodology for security
evaluation: A Security Metric for Public
Key Infrastructures . . . . . . . . . . 197--229
Mahesh V. Tripunitara and
Ninghui Li A theory for comparing the expressive
power of access control models . . . . . 231--272
V. Skormin and
A. Volynkin and
D. Summerville and
J. Moronski Prevention of information attacks by
run-time detection of self-replication
in computer codes . . . . . . . . . . . 273--302
Stephanie Wehner Analyzing worms and network traffic
using compression . . . . . . . . . . . 303--320
David Clark and
Sebastian Hunt and
Pasquale Malacaria A static analysis for quantifying
information flow in a simple imperative
language . . . . . . . . . . . . . . . . 321--371
Annalisa Bossi and
Carla Piazza and
Sabina Rossi Compositional information flow security
for concurrent programs . . . . . . . . 373--416
Lingyu Wang and
Yingjiu Li and
Sushil Jajodia and
Duminda Wijesekera Parity-based inference control for
multi-dimensional range sum queries . . 417--445
Christian Skalka and
X. Sean Wang and
Peter Chapin Risk management for distributed
authorization . . . . . . . . . . . . . 447--489
Atsuhiro Goto Preface . . . . . . . . . . . . . . . . 491--491
Abhilasha Bhargav-Spantzel and
Jan Camenisch and
Thomas Gross and
Dieter Sommer User centricity: A taxonomy and open
issues . . . . . . . . . . . . . . . . . 493--527
Abhilasha Bhargav-Spantzel and
Anna C. Squicciarini and
Shimon Modi and
Matthew Young and
Elisa Bertino and
Stephen J. Elliott Privacy preserving multi-factor
authentication with biometrics . . . . . 529--560
Michael Backes and
David Basin and
Michael Waidner Preface . . . . . . . . . . . . . . . . 561--561
Michele Bugliesi and
Riccardo Focardi and
Matteo Maffei Dynamic types for authentication . . . . 563--617
R. Corin and
S. Etalle and
P. H. Hartel and
A. Mader Timed analysis of security protocols . . 619--645
Gilles Barthe and
Leonor Prensa Nieto Secure information flow for a concurrent
language with scheduling . . . . . . . . 647--689
Tomás E. Uribe and
Steven Cheung Automatic analysis of firewall and
network intrusion detection system
configurations . . . . . . . . . . . . . 691--715
Anonymous Author Index Volume 15 (2007) . . . . . 717--719
Nan Zhang and
Mark Ryan and
Dimitar P. Guelev Synthesising verified access control
systems through model checking . . . . . 1--61
Karl Krukow and
Mogens Nielsen and
Vladimiro Sassone A logical framework for history-based
access control and reputation systems 63--101
George O. M. Yee and
Ali A. Ghorbani and
Patrick C. K. Hung Guest Editors' Introduction . . . . . . 103--106
Jie Zhou and
Jim Alves-Foss Security policy refinement and
enforcement for the design of
multi-level secure systems . . . . . . . 107--131
Marco Casassa Mont and
Robert Thyne Privacy policy enforcement in
enterprises with identity management
solutions . . . . . . . . . . . . . . . 133--163
Harshit Nayyar and
Ali A. Ghorbani Approximate autoregressive modeling for
network attack detection . . . . . . . . 165--197
Torsten Spindler and
Christoph Wartmann and
Ludger Hovestadt and
Daniel Roth and
Luc Van Gool and
Andreas Steffen Privacy in video surveilled spaces . . . 199--222
Muhammad Alam and
Michael Hafner and
Ruth Breu Constraint based role based access
control in the SECTET-framework . . . . 223--260
George O. M. Yee and
Chunming Rong and
Laurence T. Yang Guest Editors' Introduction . . . . . . 261--264
A. J. Elbirt Accelerated AES implementations via
generalized instruction set extensions 265--288
Anne V. D. M. Kayem and
Selim G. Akl and
Patrick Martin On replacing cryptographic keys in
hierarchical key management systems . . 289--309
Lifu Wang and
Partha Dasgupta Coprocessor-based hierarchical trust
management for software integrity and
digital identity protection . . . . . . 311--339
Janne Merete Hagen and
Tormod Kalberg Sivertsen and
Chunming Rong Protection against unauthorized access
and computer crime in Norwegian
enterprises . . . . . . . . . . . . . . 341--366
Ernesto Damiani Guest Editorial . . . . . . . . . . . . 367--368
C. A. Ardagna and
M. Cremonini and
S. De Capitani di Vimercati and
P. Samarati A privacy-aware access control system 369--397
Michael T. Goodrich and
Roberto Tamassia and
Danfeng (Daphne) Yao Notarized federated ID management and
authentication . . . . . . . . . . . . . 399--418
Lingyu Wang and
Chao Yao and
Anoop Singhal and
Sushil Jajodia Implementing interactive analysis of
attack graphs using relational databases 419--437
Vijayalakshmi Atluri and
Heechang Shin and
Jaideep Vaidya Efficient security policy enforcement
for the mobile environment . . . . . . . 439--475
Joachim Biskup and
Lena Wiese Preprocessing for controlled query
evaluation with availability policy . . 477--494
Andrei Sabelfeld Preface . . . . . . . . . . . . . . . . 495--495
Michael Backes and
Birgit Pfitzmann and
Andre Scedrov Key-dependent message security under
active attacks --- BRSIM/UC-soundness of
Dolev--Yao-style encryption with key
cycles . . . . . . . . . . . . . . . . . 497--530
Konstantinos Chatzikokolakis and
Catuscia Palamidessi and
Prakash Panangaden On the Bayes risk in information-hiding
protocols . . . . . . . . . . . . . . . 531--571
Ricardo Corin and
Pierre-Malo Deniélou and
Cédric Fournet and
Karthikeyan Bhargavan and
James Leifer A secure compiler for session
abstractions . . . . . . . . . . . . . . 573--636
Paritosh Shroff and
Scott F. Smith and
Mark Thober Securing information flow via dynamic
capture of dependencies . . . . . . . . 637--688
Ferucio L. \cTiplea and
C\uat\ualin V. B\^\irjoveanu and
Constantin Enea and
Ioana Boureanu Secrecy for bounded security protocols
with freshness check is
NEXPTIME-complete . . . . . . . . . . . 689--712
Patrick Traynor and
William Enck and
Patrick McDaniel and
Thomas La Porta Exploiting open functionality in
SMS-capable cellular networks . . . . . 713--742
Toby Murray and
Duncan Grove Non-delegatable authorities in
capability systems . . . . . . . . . . . 743--759
Petros Belsis and
Kostas Fragos and
Stefanos Gritzalis and
Christos Skourlas Applying effective feature selection
techniques with hierarchical mixtures of
experts for spam classification . . . . 761--790
Anonymous Author Index Volume 16 (2008) . . . . . 791--793
Milan Petkovi\'c and
Willem Jonker Preface . . . . . . . . . . . . . . . . 1--3
Chao Yao and
Lingyu Wang and
X. Sean Wang and
Claudio Bettini and
Sushil Jajodia Evaluating privacy threats in released
database views by symmetric
indistinguishability . . . . . . . . . . 5--42
Ji-Won Byun and
Tiancheng Li and
Elisa Bertino and
Ninghui Li and
Yonglak Sohn Privacy-preserving incremental data
dissemination . . . . . . . . . . . . . 43--68
Stefan Böttcher and
Rita Hartel Information disclosure by answers to
XPath queries . . . . . . . . . . . . . 69--99
Weiwei Cheng and
Kian-Lee Tan Query assurance verification for
outsourced multi-dimensional databases 101--126
Nan Hu and
Giri K. Tayi and
Chengyu Ma and
Yingjiu Li Certificate revocation release policies 127--157
Amir Herzberg Folklore, practice and theory of robust
combiners . . . . . . . . . . . . . . . 159--189
Benjamin Aziz and
Simon N. Foley and
John Herbert and
Garret Swart Configuring storage-area networks using
mandatory security . . . . . . . . . . . 191--210
Jaideep Vaidya and
Vijayalakshmi Atluri and
Qi Guo and
Haibing Lu Edge-RMP: Minimizing administrative
assignments for role-based access
control . . . . . . . . . . . . . . . . 211--235
Giampaolo Bella and
Peter Y. A. Ryan \booktitleJournal of Computer Security 237--237
Petros Belsis and
Kostas Fragos and
Stefanos Gritzalis and
Christos Skourlas Applying effective feature selection
techniques with hierarchical mixtures of
experts for spam classification . . . . 239--268
Christian Grothoff and
Krista Grothoff and
Ryan Stutsman and
Ludmila Alkhutova and
Mikhail Atallah Translation-based steganography . . . . 269--303
Giovanni Vigna and
Fredrik Valeur and
Davide Balzarotti and
William Robertson and
Christopher Kruegel and
Engin Kirda Reducing errors in the anomaly-based
detection of web-based attacks through
the combined analysis of web requests
and SQL queries . . . . . . . . . . . . 305--329
Haizhi Xu and
Steve J. Chapin Address-space layout randomization using
code islands . . . . . . . . . . . . . . 331--362
Bruno Blanchet Automatic verification of
correspondences for security protocols 363--434
Stéphanie Delaune and
Steve Kremer and
Mark Ryan Verifying privacy-type properties of
electronic voting protocols . . . . . . 435--487
Xuhua Ding and
Gene Tsudik and
Shouhuai Xu Leak-free mediated group signatures . . 489--514
Joshua D. Guttman Introduction . . . . . . . . . . . . . . 515--515
Andrei Sabelfeld and
David Sands Declassification: Dimensions and
principles . . . . . . . . . . . . . . . 517--548
Ana Almeida Matos and
Gérard Boudol On declassification and the
non-disclosure policy . . . . . . . . . 549--597
William L. Harrison and
James Hook Achieving information flow security
through monadic control of effects . . . 599--653
Michael R. Clarkson and
Andrew C. Myers and
Fred B. Schneider Quantifying information flow with
beliefs . . . . . . . . . . . . . . . . 655--701
Dennis Hofheinz and
Jörn Müller-Quade and
Dominique Unruh Polynomial runtime in simulatability
definitions . . . . . . . . . . . . . . 703--735
Pedro Adão and
Gergei Bana and
Jonathan Herzog and
Andre Scedrov Soundness and completeness of formal
encryption: The cases of key cycles and
partial information leakage . . . . . . 737--797
Massimo Bartoletti and
Pierpaolo Degano and
Gian Luigi Ferrari Planning and verifying service
composition . . . . . . . . . . . . . . 799--837
Gilles Guette Automating trusted key rollover in
DNSSEC . . . . . . . . . . . . . . . . . 839--854
Mila Dalla Preda and
Roberto Giacobazzi Semantics-based code obfuscation by
abstract interpretation . . . . . . . . 855--908
Bart Jacobs and
Ichiro Hasuo Semantics and logic for security
protocols . . . . . . . . . . . . . . . 909--944
Alberto Dainotti and
Antonio Pescapé and
Giorgio Ventre A cascade architecture for DoS attacks
detection based on the wavelet transform 945--968
Anonymous Author Index Volume 17 (2009) . . . . . 969--971
Mário Campolargo JCS special issue on EU-funded ICT
research on Trust and Security: Foreword ??
Jan Camenisch and
Javier Lopez and
Fabio Massacci and
Massimo Ciscato and
Thomas Skordas JCS special issue on EU-funded ICT
research on Trust and Security . . . . . 1--5
André Bergholz and
Jan De Beer and
Sebastian Glahn and
Marie-Francine Moens and
Gerhard Paaß and
Siehyun Strobel New filtering approaches for phishing
email . . . . . . . . . . . . . . . . . 7--35
Mads Dam and
Bart Jacobs and
Andreas Lundblad and
Frank Piessens Provably correct inline monitoring for
multithreaded Java-like programs . . . . 37--59
Louis Salvail and
Momtchil Peev and
Eleni Diamanti and
Romain Alléaume and
Norbert Lütkenhaus and
Thomas Länger Security of trusted repeater quantum key
distribution networks . . . . . . . . . 61--87
Serdar Cabuk and
Chris I. Dalton and
Konrad Eriksson and
Dirk Kuhlmann and
HariGovind V. Ramasamy and
Gianluca Ramunno and
Ahmad-Reza Sadeghi and
Matthias Schunter and
Christian Stüble Towards automated security policy
enforcement in multi-tenant virtual data
centers . . . . . . . . . . . . . . . . 89--121
Claudio A. Ardagna and
Jan Camenisch and
Markulf Kohlweiss and
Ronald Leenes and
Gregory Neven and
Bart Priem and
Pierangela Samarati and
Dieter Sommer and
Mario Verdicchio Exploiting cryptography for
privacy-enhanced access control: A
result of the PRIME Project . . . . . . 123--160
Savvas Argyropoulos and
Dimitrios Tzovaras and
Dimosthenis Ioannidis and
Yannis Damousis and
Michael G. Strintzis and
Martin Braun and
Serge Boverie Biometric template protection in
multimodal authentication systems based
on error correcting codes . . . . . . . 161--185
Sushil Jajodia and
Jon Millen Editorial . . . . . . . . . . . . . . . 187--187
Daniele Gorla and
Catuscia Palamidessi Preface . . . . . . . . . . . . . . . . 189--189
Pasquale Malacaria Risk assessment of security threats for
looping constructs . . . . . . . . . . . 191--228
Chiara Bodei and
Linda Brodo and
Pierpaolo Degano and
Han Gao Detecting and preventing type flaws at
static time . . . . . . . . . . . . . . 229--264
Sardaouna Hamadou and
John Mullins Calibrating the power of schedulers for
probabilistic polynomial-time calculus 265--316
Stéphanie Delaune and
Steve Kremer and
Mark D. Ryan Symbolic bisimulation for the applied pi
calculus . . . . . . . . . . . . . . . . 317--377
Dimitrios Lekkas and
Dimitris Gritzalis e-Passports as a means towards a
Globally Interoperable Public Key
Infrastructure . . . . . . . . . . . . . 379--396
Massimiliano Pala and
Sean W. Smith Finding the PKI needles in the Internet
haystack . . . . . . . . . . . . . . . . 397--420
Jiguo Li and
Xinyi Huang and
Yi Mu and
Willy Susilo and
Qianhong Wu Constructions of certificate-based
signature secure against key replacement
attacks . . . . . . . . . . . . . . . . 421--449
Chung Ki Li and
Guomin Yang and
Duncan S. Wong and
Xiaotie Deng and
Sherman S. M. Chow An efficient signcryption scheme with
key privacy and its extension to ring
signcryption . . . . . . . . . . . . . . 451--473
David W. Chadwick and
Sean Antony and
Rune Bjerk Instant certificate revocation and
publication using WebDAV . . . . . . . . 475--496
Atsuhiro Goto Preface . . . . . . . . . . . . . . . . 497--497
Samir Saklikar and
Subir Saha Identity Federation for VoIP systems . . 499--540
Adrian Baldwin and
Marco Casassa Mont and
Yolanta Beres and
Simon Shiu Assurance for federated identity
management . . . . . . . . . . . . . . . 541--572
Sebastian Mödersheim and
Luca Vigan\`o and
David Basin Constraint differentiation: Search-space
reduction for the constraint-based
analysis of security protocols . . . . . 575--618
Moritz Y. Becker and
Cédric Fournet and
Andrew D. Gordon SecPAL: Design and semantics of a
decentralized authorization language . . 619--665
James R. Conrad and
Jim Alves-Foss and
Sauchi Stephen Lee Analyzing uncertainty in TG protection
graphs with TG/MC . . . . . . . . . . . 667--699
Riccardo Pucella and
Fred B. Schneider Independence from obfuscation: A
semantic framework for diversity . . . . 701--749
Roberto Giacobazzi and
Isabella Mastroeni Adjoining classified and unclassified
information by abstract interpretation 751--797
Matthew Pirretti and
Patrick Traynor and
Patrick McDaniel and
Brent Waters Secure attribute-based systems . . . . . 799--837
Roberto Di Pietro and
Luigi V. Mancini and
Alessandro Mei Hierarchies of keys in secure multicast
communications . . . . . . . . . . . . . 839--860
Nenad Jovanovic and
Christopher Kruegel and
Engin Kirda Static analysis for detecting
taint-style vulnerabilities in web
applications . . . . . . . . . . . . . . 861--907
Mathieu Baudet and
Bogdan Warinschi and
Martín Abadi Guessing attacks and the computational
soundness of static equivalence . . . . 909--968
Riccardo Focardi Editorial . . . . . . . . . . . . . . . 969--969
Frédéric Besson and
Guillaume Dufay and
Thomas Jensen and
David Pichardie Verifying resource access control on
mobile interactive devices . . . . . . . 971--998
Steve Kremer and
Laurent Mazaré Computationally sound analysis of
protocols using bilinear pairings . . . 999--1033
Arnab Roy and
Anupam Datta and
Ante Derek and
John C. Mitchell Inductive trace properties for
computational security . . . . . . . . . 1035--1073
Andrei Sabelfeld Preface . . . . . . . . . . . . . . . . 1075--1075
Michael Backes and
Dominique Unruh Computational soundness of symbolic
zero-knowledge proofs . . . . . . . . . 1077--1155
Michael R. Clarkson and
Fred B. Schneider Hyperproperties . . . . . . . . . . . . 1157--1210
Stéphanie Delaune and
Steve Kremer and
Graham Steel Formal security analysis of PKCS#11 and
proprietary extensions . . . . . . . . . 1211--1245
Jean Goubault-Larrecq Finite models for formal security proofs 1247--1299
Anonymous Author Index Volume 18 (2010) . . . . . 1301--1305
Boris Köpf and
David Basin Automatically deriving
information-theoretic bounds for
adaptive side-channel attacks . . . . . 1--31
Lawrence A. Gordon and
Martin P. Loeb and
Lei Zhou The impact of information security
breaches: Has there been a downward
shift in costs? . . . . . . . . . . . . 33--56
David DeAngelis and
K. Suzanne Barber Security applications of trust in
multi-agent systems . . . . . . . . . . 57--99
Deepak D'Souza and
Raveendra Holla and
K. R. Raghavendra and
Barbara Sprick Model-checking trace-based information
flow properties . . . . . . . . . . . . 101--138
L. H. Nguyen and
A. W. Roscoe Authentication protocols based on
low-bandwidth unspoofable channels: A
comparative survey . . . . . . . . . . . 139--201
Anshuman Sinha A survey of system security in
contactless electronic passports . . . . 203--226
Yingjiu Li and
Jianying Zhou Guest Editors' preface . . . . . . . . . 227--228
Basel Alomair and
Loukas Lazos and
Radha Poovendran Securing low-cost RFID systems: An
unconditionally secure approach . . . . 229--257
Gerhard P. Hancke Practical eavesdropping and skimming
attacks on high-frequency RFID tokens 259--288
Gildas Avoine and
Muhammed Ali Bingöl and
Süleyman Karda\cs and
Cédric Lauradoux and
Benjamin Martin A framework for analyzing RFID distance
bounding protocols . . . . . . . . . . . 289--317
Ching Yu Ng and
Willy Susilo and
Yi Mu and
Rei Safavi-Naini Practical RFID ownership transfer scheme 319--341
Tzipora Halevi and
Nitesh Saxena and
Shai Halevi Tree-based HB protocols for
privacy-preserving authentication of
RFID tags . . . . . . . . . . . . . . . 343--363
Vijay Atluri Preface . . . . . . . . . . . . . . . . 365--365
Changyu Dong and
Giovanni Russello and
Naranker Dulay Shared and searchable encrypted data for
untrusted servers . . . . . . . . . . . 367--397
Manachai Toahchoodee and
Indrakshi Ray On the formalization and analysis of a
spatio-temporal role-based access
control model . . . . . . . . . . . . . 399--452
Xiaoyun He and
Haibing Lu and
Jaideep Vaidya and
Nabil Adam Secure construction and publication of
contingency tables from distributed data 453--484
Jaideep Vaidya and
Ehud Gudes Introduction . . . . . . . . . . . . . . 485--486
Joachim Biskup and
Christian Gogolin and
Jens Seiler and
Torben Weibert Inference-proof view update transactions
with forwarded refreshments . . . . . . 487--529
Valentina Ciriani and
Sabrina De Capitani di Vimercati and
Sara Foresti and
Sushil Jajodia and
Stefano Paraboschi and
Pierangela Samarati Selective data outsourcing for enforcing
privacy . . . . . . . . . . . . . . . . 531--566
Simon N. Foley and
William M. Fitzgerald Management of security policy
configuration using a Semantic Threat
Graph approach . . . . . . . . . . . . . 567--605
Heechang Shin and
Vijayalakshmi Atluri and
June-suh Cho Efficiently enforcing spatiotemporal
access control under uncertain location
information . . . . . . . . . . . . . . 607--637
Konrad Rieck and
Philipp Trinius and
Carsten Willems and
Thorsten Holz Automatic analysis of malware behavior
using machine learning . . . . . . . . . 639--668
P. C. van Oorschot and
Julie Thorpe Exploiting predictability in click-based
graphical passwords . . . . . . . . . . 669--702
Mohammad Mannan and
P. C. van Oorschot Leveraging personal devices for stronger
password authentication from untrusted
computers . . . . . . . . . . . . . . . 703--750
Sabrina De Capitani di Vimercati and
Sara Foresti and
Sushil Jajodia and
Stefano Paraboschi and
Pierangela Samarati Authorization enforcement in distributed
query evaluation . . . . . . . . . . . . 751--794
Heechang Shin and
Jaideep Vaidya and
Vijayalakshmi Atluri A profile anonymization model for
location-based services . . . . . . . . 795--833
Dimitris Gritzalis and
Giannis Marias and
Yacine Rebahi and
Yannis Soupionis and
Sven Ehlert SPIDER: A platform for managing
SIP-based Spam over Internet Telephony
(SPIT) . . . . . . . . . . . . . . . . . 835--867
Francis Hsu and
Hao Chen and
Sridhar Machiraju WebCallerID: Leveraging cellular
networks for Web authentication . . . . 869--893
Reza Curtmola and
Juan Garay and
Seny Kamara and
Rafail Ostrovsky Searchable symmetric encryption:
Improved definitions and efficient
constructions . . . . . . . . . . . . . 895--934
Rinku Dewri and
Indrajit Ray and
Indrakshi Ray and
Darrell Whitley Exploring privacy versus data quality
trade-offs in anonymization techniques
using multi-objective optimization . . . 935--974
Allaa Kamil and
Gavin Lowe Analysing TLS in the strand spaces model 975--1025
Dimitris Gritzalis Guest Editor's Preface . . . . . . . . . 1027--1028
Hirotoshi Yasuoka and
Tachio Terauchi On bounding problems of quantitative
information flow . . . . . . . . . . . . 1029--1082
Chao Zhang and
Wei Zou and
Tielei Wang and
Yu Chen and
Tao Wei Using type analysis in compiler to
mitigate
integer-overflow-to-buffer-overflow
threat . . . . . . . . . . . . . . . . . 1083--1107
Robert H. Deng and
Yingjiu Li and
Moti Yung and
Yunlei Zhao A zero-knowledge based framework for
RFID privacy . . . . . . . . . . . . . . 1109--1146
Rishab Nithyanand and
Gene Tsudik and
Ersin Uzun User-aided reader revocation in
PKI-based RFID systems . . . . . . . . . 1147--1172
Anonymous Author Index Volume 19 (2011) . . . . . 1173--1176
Alessandro Armando and
Gavin Lowe Preface . . . . . . . . . . . . . . . . 1--1
Mário S. Alvim and
Miguel E. Andrés and
Catuscia Palamidessi Quantitative information flow in
interactive systems . . . . . . . . . . 3--50
Nataliia Bielova and
Fabio Massacci Iterative enforcement by suppression:
Towards practical enforcement theories 51--79
Gabriele Costa and
Pierpaolo Degano and
Fabio Martinelli Modular plans for secure service
composition . . . . . . . . . . . . . . 81--117
Hongbin Zhou and
Simon N. Foley Fast automatic security protocol
generation . . . . . . . . . . . . . . . 119--167
Natalia Stakhanova and
Chris Strasburg and
Samik Basu and
Johnny S. Wong Towards cost-sensitive assessment of
intrusion response selection . . . . . . 169--198
Brian M. Bowen and
Vasileios P. Kemerlis and
Pratap Prabhu and
Angelos D. Keromytis and
Salvatore J. Stolfo A system for generating and injecting
indistinguishable network decoys . . . . 199--221
Gail-Joon Ahn and
Jing Jin and
Mohamed Shehab Policy-driven role-based access
management for ad-hoc collaboration . . 223--257
Marina Blanton and
Mehrdad Aliasgari Secure outsourced computation of iris
matching . . . . . . . . . . . . . . . . 259--305
Gilles Barthe and
Jorge Cuellar and
Javier Lopez and
Alexander Pretschner Preface . . . . . . . . . . . . . . . . 307--308
Alessandro Armando and
Silvio Ranise Scalable automated symbolic analysis of
administrative role-based access control
policies by SMT solving . . . . . . . . 309--352
Deepak Garg and
Frank Pfenning Stateful authorization logic --- Proof
theory and a case study . . . . . . . . 353--391
Michele Bezzi and
Sabrina De Capitani di Vimercati and
Sara Foresti and
Giovanni Livraga and
Pierangela Samarati and
Roberto Sassi Modeling and preventing inferences from
sensitive value distributions in data
release . . . . . . . . . . . . . . . . 393--436
Yanjie Sun and
Chenyi Zhang and
Jun Pang and
Baptiste Alcalde and
Sjouke Mauw A trust-augmented voting scheme for
collaborative privacy management . . . . 437--459
Yingjiu Li Guest Editor's Preface . . . . . . . . . 461--462
Valentina Ciriani and
Sabrina De Capitani di Vimercati and
Sara Foresti and
Giovanni Livraga and
Pierangela Samarati An OBDD approach to enforce
confidentiality and visibility
constraints in data publishing . . . . . 463--508
Joachim Biskup Dynamic policy adaptation for inference
control of queries to a propositional
information system . . . . . . . . . . . 509--546
Raman Adaikkalavan and
Xing Xie and
Indrakshi Ray Multilevel secure data stream
processing: Architecture and
implementation . . . . . . . . . . . . . 547--581
Yuan Hong and
Jaideep Vaidya and
Haibing Lu Secure and efficient distributed linear
programming . . . . . . . . . . . . . . 583--634
Andrew Myers and
Michael Backes Preface . . . . . . . . . . . . . . . . 635--636
Stephen Chong Required information release . . . . . . 637--676
Moritz Y. Becker Information flow in trust management
systems . . . . . . . . . . . . . . . . 677--708
Ralf Küsters and
Tomasz Truderung and
Andreas Vogt A game-based definition of coercion
resistance and its applications . . . . 709--764
Anonymous Author Index Volume 20 (2012) . . . . . 765--767
Mohammad H. Yarmand and
Kamran Sartipi and
Douglas G. Down Behavior-based access control for
distributed healthcare systems . . . . . 1--39
Simon Meier and
Cas Cremers and
David Basin Efficient construction of
machine-checked symbolic protocol
security proofs . . . . . . . . . . . . 41--87
Véronique Cortier and
Ben Smyth Attacking and fixing Helios: An analysis
of ballot secrecy . . . . . . . . . . . 89--148
Frédéric Cuppens and
Nora Cuppens-Boulahia and
Yehia Elrakaiby Formal specification and management of
security policies with collective group
obligations . . . . . . . . . . . . . . 149--190
Arturo Geigel Neural network Trojan . . . . . . . . . 191--232
Dhananjay Phatak and
Alan T. Sherman and
Nikhil Joshi and
Bhushan Sonawane and
Vivek G. Relan and
Amol Dawalbhakta Spread Identity: A new dynamic address
remapping mechanism for anonymity and
DDoS defense . . . . . . . . . . . . . . 233--281
Vladimir Kolesnikov and
Ahmad-Reza Sadeghi and
Thomas Schneider A systematic approach to practically
efficient general two-party secure
function evaluation protocols and their
modular design . . . . . . . . . . . . . 283--315
Murtuza Jadliwala and
Igor Bilogrevic and
Jean-Pierre Hubaux Optimizing mix-zone coverage in
pervasive wireless networks . . . . . . 317--346
Alfred Kobsa and
Rishab Nithyanand and
Gene Tsudik and
Ersin Uzun Can Jannie verify? Usability of
display-equipped RFID tags for security
purposes . . . . . . . . . . . . . . . . 347--370
Gunnar Kreitz Flow stealing: A well-timed redirection
attack . . . . . . . . . . . . . . . . . 371--391
Amir Herzberg and
Ronen Margulies Forcing Johnny to login safely . . . . . 393--424
Sabrina De Capitani di Vimercati and
Sara Foresti and
Stefano Paraboschi and
Gerardo Pelosi and
Pierangela Samarati Supporting concurrency and multiple
indexes in private access to outsourced
data . . . . . . . . . . . . . . . . . . 425--461
Piotr Mardziel and
Stephen Magill and
Michael Hicks and
Mudhakar Srivatsa Dynamic enforcement of knowledge-based
security policies using probabilistic
abstract interpretation . . . . . . . . 463--532
Fangfei Zhou and
Manish Goel and
Peter Desnoyers and
Ravi Sundaram Scheduler vulnerabilities and
coordinated attacks in cloud computing 533--559
John Homer and
Su Zhang and
Xinming Ou and
David Schmidt and
Yanhui Du and
S. Raj Rajagopalan and
Anoop Singhal Aggregating vulnerability metrics in
enterprise networks using attack graphs 561--597
Ivan Visconti Special Issue: Advances in Security for
Communication Networks . . . . . . . . . 599--600
Joshua Baron and
Karim El Defrawy and
Kirill Minkovich and
Rafail Ostrovsky and
Eric Tressler 5PM: Secure pattern matching . . . . . . 601--625
Olivier Blazy and
Georg Fuchsbauer and
David Pointcheval and
Damien Vergnaud Short blind signatures . . . . . . . . . 627--661
Craig Gentry and
Shai Halevi and
Chris Peikert and
Nigel P. Smart Field switching in BGV-style homomorphic
encryption . . . . . . . . . . . . . . . 663--684
Helger Lipmaa and
Bingsheng Zhang A more efficient computationally sound
non-interactive zero-knowledge shuffle
argument . . . . . . . . . . . . . . . . 685--719
Steven Myers and
Mona Sergi and
abhi shelat Black-box construction of a more than
non-malleable CCA1 encryption scheme
from plaintext awareness . . . . . . . . 721--748
Juan González Nieto and
Mark Manulis and
Bertram Poettering and
Jothi Rangasamy and
Douglas Stebila Publicly verifiable ciphertexts . . . . 749--778
Pierpaolo Degano and
Joshua D. Guttman Preface . . . . . . . . . . . . . . . . 779--780
Miriam Paiola and
Bruno Blanchet Verification of security protocols with
lists: From length one to unbounded
length . . . . . . . . . . . . . . . . . 781--816
David Basin and
Cas Cremers and
Simon Meier Provably repairing the ISO/IEC 9798
standard for entity authentication . . . 817--846
Myrto Arapinis and
Sergiu Bursuc and
Mark Ryan Privacy-supporting cloud computing by
in-browser key translation . . . . . . . 847--880
Gilles Barthe and
Benjamin Grégoire and
Sylvain Heraud and
Federico Olmedo and
Santiago Zanella-Béguelin Verified indifferentiable hashing into
elliptic curves . . . . . . . . . . . . 881--917
Umut A. Acar and
Amal Ahmed and
James Cheney and
Roly Perera A core calculus for provenance . . . . . 919--969
Matteo Centenaro and
Riccardo Focardi and
Flaminia L. Luccio Type-based analysis of key management in
PKCS#11 cryptographic devices . . . . . 971--1007
Anonymous Author Index Volume 21 (2013) . . . . . 1009--1012
Haibing Lu and
Jaideep Vaidya and
Vijayalakshmi Atluri An optimization framework for role
mining . . . . . . . . . . . . . . . . . 1--31
Tsz Hon Yuen and
Willy Susilo and
Yi Mu Towards a cryptographic treatment of
publish/subscribe systems . . . . . . . 33--67
Jianwei Niu and
Mark Reith and
William H. Winsborough Formal verification of security
properties in trust management policy 69--153
Sai Teja Peddinti and
Nitesh Saxena Web search query privacy: Evaluating
query obfuscation and anonymizing
networks . . . . . . . . . . . . . . . . 155--199
Konstantinos Chatzikokolakis and
Sebastian Alexander Mödersheim and
Catuscia Palamidessi and
Jun Pang Foundational aspects of security . . . . 201--202
Joshua D. Guttman Establishing and preserving protocol
security goals . . . . . . . . . . . . . 203--267
Tri Minh Ngo and
Mariëlle Stoelinga and
Marieke Huisman Effective verification of
confidentiality for multi-threaded
programs . . . . . . . . . . . . . . . . 269--300
Michael Backes and
C\uat\ualin Hri\ctcu and
Matteo Maffei Union, intersection and refinement types
and reasoning about type disjointness
for secure protocol implementations . . 301--353
Carlo Blundo and
Emiliano De Cristofaro and
Paolo Gasti EsPRESSO: Efficient privacy-preserving
evaluation of sample set similarity . . 355--381
Yannis Soupionis and
Remous-Aris Koutsiamanis and
Pavlos Efraimidis and
Dimitris Gritzalis A game-theoretic analysis of preventing
spam over Internet Telephony via audio
CAPTCHA-based authentication . . . . . . 383--413
Prithvi Bisht and
Timothy Hinrichs and
Nazari Skrupsky and
V. N. Venkatakrishnan Automated detection of parameter
tampering opportunities and
vulnerabilities in web applications . . 415--465
Lieven Desmet and
Martin Johns and
Benjamin Livshits and
Andrei Sabelfeld Preface . . . . . . . . . . . . . . . . 467--468
Willem De Groef and
Dominique Devriese and
Nick Nikiforakis and
Frank Piessens Secure multi-execution of web scripts:
Theory and practice . . . . . . . . . . 469--509
Joe Gibbs Politz and
Arjun Guha and
Shriram Krishnamurthi Typed-based verification of Web
sandboxes . . . . . . . . . . . . . . . 511--565
M. Heiderich and
M. Niemietz and
F. Schuster and
T. Holz and
J. Schwenk Scriptless attacks: Stealing more pie
without touching the sill . . . . . . . 567--599
Chetan Bansal and
Karthikeyan Bhargavan and
Antoine Delignat-Lavaud and
Sergio Maffeis Discovering concrete attacks on website
authorization by formal analysis . . . . 601--657
Michael Backes and
Steve Zdancewic Message from the Guest Editors . . . . . 659--660
David Basin and
Samuel J. Burri and
Günter Karjoth Obstruction-free authorization
enforcement: Aligning security and
business objectives . . . . . . . . . . 661--698
Cole Schlesinger and
Karthik Pattabiraman and
Nikhil Swamy and
David Walker and
Benjamin Zorn Modular protections against non-control
data attacks . . . . . . . . . . . . . . 699--742
Myrto Arapinis and
Joshua Phillips and
Eike Ritter and
Mark D. Ryan StatVerif: Verification of stateful
processes . . . . . . . . . . . . . . . 743--821
François Dupressoir and
Andrew D. Gordon and
Jan Jürjens and
David A. Naumann Guiding a general-purpose C verifier to
prove cryptographic protocols . . . . . 823--866
Joseph A. Akinyele and
Matthew Green and
Susan Hohenberger and
Matthew Pagano Machine-generated algorithms, proofs and
software for the batch verification of
digital signature schemes . . . . . . . 867--912
Johannes Braun and
Florian Volk and
Jiska Classen and
Johannes Buchmann and
Max Mühlhäuser CA trust management for the Web PKI . . 913--959
Emre Uzun and
Vijayalakshmi Atluri and
Jaideep Vaidya and
Shamik Sural and
Anna Lisa Ferrara and
Gennaro Parlato and
P. Madhusudan Security analysis for temporal role
based access control . . . . . . . . . . 961--996
Yen-Chung Chen and
Yu-Sung Wu and
Wen-Guey Tzeng Preserving user query privacy in
cloud-based security services . . . . . 997--1024
Nicolas Buchmann and
Harald Baier Towards a more secure and scalable
verifying PKI of eMRTD . . . . . . . . . 1025--1049
Anonymous Author Index Volume 22 (2014) . . . . . 1051--1054
Ping Yang and
Mikhail I. Gofman and
Scott D. Stoller and
Zijiang Yang Policy analysis for administrative role
based access control without separate
administration . . . . . . . . . . . . . 1--29
Barsha Mitra and
Shamik Sural and
Vijayalakshmi Atluri and
Jaideep Vaidya The generalized temporal role mining
problem . . . . . . . . . . . . . . . . 31--58
Sabrina De Capitani di Vimercati and
Sara Foresti and
Sushil Jajodia and
Giovanni Livraga and
Stefano Paraboschi and
Pierangela Samarati Loose associations to increase utility
in data publishing . . . . . . . . . . . 59--88
Bechara Al Bouna and
Chris Clifton and
Qutaibah Malluhi Anonymizing transactional datasets . . . 89--106
Haibing Lu and
Yuan Hong and
Yanjiang Yang and
Lian Duan and
Nazia Badar Towards user-oriented RBAC model . . . . 107--129
Wen Ming Liu and
Lingyu Wang and
Lei Zhang and
Shunzhi Zhu $k$-jump: A strategy to design
publicly-known algorithms for privacy
preserving micro-data disclosure . . . . 131--165
Adam Bates and
Kevin R. B. Butler and
Micah Sherr and
Clay Shields and
Patrick Traynor and
Dan Wallach Accountable wiretapping --- or --- I
know they can hear you now . . . . . . . 167--195
Ron van der Meyden What, indeed, is intransitive
noninterference? . . . . . . . . . . . . 197--228
Ioana Boureanu and
Aikaterini Mitrokotsa and
Serge Vaudenay Practical and provably secure
distance-bounding . . . . . . . . . . . 229--257
Thomas Gibson-Robinson and
Allaa Kamil and
Gavin Lowe Verifying layered security protocols . . 259--307
Christos Dimitrakakis and
Aikaterini Mitrokotsa and
Serge Vaudenay Expected loss analysis for
authentication in constrained channels 309--329
David Cadé and
Bruno Blanchet Proved generation of implementations
from computationally secure protocol
specifications . . . . . . . . . . . . . 331--402
Jiawei Yuan and
Shucheng Yu PCPOR: Public and constant-cost proofs
of retrievability in cloud1 . . . . . . 403--425
Mário S. Alvim and
Miguel E. Andrés and
Konstantinos Chatzikokolakis and
Pierpaolo Degano and
Catuscia Palamidessi On the information leakage of
differentially-private mechanisms . . . 427--469
Shiuan-Tzuo Shen and
Wen-Guey Tzeng Delegated integrity check for
hierarchical cloud data . . . . . . . . 471--508
Michele Bugliesi and
Stefano Calzavara and
Riccardo Focardi and
Wilayat Khan CookiExt: Patching the browser against
session hijacking attacks . . . . . . . 509--537
Luca Spalazzi and
Luca Vigan\`o Special issue on security and high
performance computing systems . . . . . 539--540
Jason Lowden and
Marcin \Lukowiak and
Sonia Lopez Alarcon Design and performance analysis of
efficient Keccak tree hashing on GPU
architectures . . . . . . . . . . . . . 541--562
Giampaolo Bella and
Paul Curzon and
Gabriele Lenzini Service security and privacy as a
socio-technical problem . . . . . . . . 563--585
Jannik Dreier and
Jean-Guillaume Dumas and
Pascal Lafourcade Brandt's fully private auction protocol
revisited . . . . . . . . . . . . . . . 587--610
Alessio Merlo and
Mauro Migliardi and
Paolo Fontanelli Measuring and estimating power
consumption in Android to support
energy-based intrusion detection . . . . 611--637
Anonymous Regular Paper Section . . . . . . . . . 639--639
Sergey Belim and
Nadezda Bogachenko and
Evgeniy Ilushechkin An analysis of graphs that represent a
role-based security policy hierarchy . . 641--657
Jin Li and
Xiaofeng Chen and
Jingwei Li and
Chunfu Jia and
Jianfeng Ma and
Wenjing Lou New access control systems based on
outsourced attribute-based encryption 659--683
Ali Alshehri and
Steve Schneider A formal framework for security analysis
of NFC mobile coupon protocols . . . . . 685--707
Piero Bonatti and
Clemente Galdi and
Davide Torres Event-driven RBAC . . . . . . . . . . . 709--757
Yannis Mallios and
Lujo Bauer and
Dilsun Kaynar and
Fabio Martinelli and
Charles Morisset Probabilistic cost enforcement of
security policies . . . . . . . . . . . 759--787
Anonymous Author Index Volume 23 (2015) . . . . . 789--791
Florian Böhl and
Dominique Unruh Symbolic universal composability . . . . 1--38
Willard Rafnsson and
Andrei Sabelfeld Secure multi-execution: Fine-grained,
declassification-aware, and transparent 39--90
Zhengqin Luo and
José Fragoso Santos and
Ana Almeida Matos and
Tamara Rezk Mashic compiler: Mashup sandboxing based
on inter-frame communication . . . . . . 91--136
Henry Carter and
Benjamin Mood and
Patrick Traynor and
Kevin Butler Secure outsourced garbled circuit
evaluation for mobile devices . . . . . 137--180
Daniel Hedin and
Luciano Bello and
Andrei Sabelfeld Information-flow security for JavaScript
and its APIs . . . . . . . . . . . . . . 181--234
Claudio Taglienti and
James Cannady The user attribution problem and the
challenge of persistent surveillance of
user activity in complex networks . . . 235--288
Yu Chen and
Zongyang Zhang Publicly evaluable pseudorandom
functions and their applications . . . . 289--320
Sokratis Vavilis and
Milan Petkovi\'c and
Nicola Zannone A severity-based quantification of data
leakages in database systems . . . . . . 321--345
Sabrina De Capitani di Vimercati and
Sara Foresti and
Sushil Jajodia and
Stefano Paraboschi and
Pierangela Samarati Efficient integrity checks for join
queries in the cloud . . . . . . . . . . 347--378
Meixing Le and
Krishna Kant and
Malek Athamnah and
Sushil Jajodia Minimum cost rule enforcement for
cooperative database access . . . . . . 379--403
Yiming Jing and
Gail-Joon Ahn and
Hongxin Hu and
Haehyun Cho and
Ziming Zhao TripleMon: A multi-layer security
framework for mediating inter-process
communication on Android . . . . . . . . 405--426
Chiara Bodei and
Pierpaolo Degano and
Letterio Galletta and
Francesco Salvatori Context-aware security: Linguistic
mechanisms and static analysis . . . . . 427--477
Giovanni Di Crescenzo and
Debra L. Cook and
Allen McIntosh and
Euthimios Panagos Practical and privacy-preserving
information retrieval from a database
table . . . . . . . . . . . . . . . . . 479--506
Debabrata Kar and
Suvasini Panigrahi and
Srikanth Sundararajan SQLiDDS: SQL injection detection using
document similarity measure . . . . . . 507--539
Martin Lester and
Luke Ong and
Max Schäfer Information flow analysis for a
dynamically typed language with staged
metaprogramming . . . . . . . . . . . . 541--582
Steve Kremer and
Robert Künnemann Automated analysis of security protocols
with global state . . . . . . . . . . . 583--616
Deepak D'Souza and
K. R. Raghavendra Model-checking trace-based information
flow properties for infinite-state
systems . . . . . . . . . . . . . . . . 617--643
John Sonchack and
Adam J. Aviv Exploring large scale security system
reproducibility with the LESS simulator 645--665
Michal Davidson and
Tamir Tassa and
Ehud Gudes Content sharing schemes in DRM systems
with enhanced performance and privacy
preservation . . . . . . . . . . . . . . 667--688
Arthur Azevedo de Amorim and
Nathan Collins and
André DeHon and
Delphine Demange and
C\uat\ualin Hri\ctcu and
David Pichardie and
Benjamin C. Pierce and
Randy Pollack and
Andrew Tolmach A verified information-flow architecture 689--734
Sushil Jajodia and
Noseong Park and
Edoardo Serra and
V. S. Subrahmanian Using temporal probabilistic logic for
optimal monitoring of security events
with limited resources . . . . . . . . . 735--791
Roberto Guanciale and
Hamed Nemati and
Mads Dam and
Christoph Baumann Provably secure memory isolation for
Linux on ARM . . . . . . . . . . . . . . 793--837
Anonymous Author Index Volume 24 (2016) . . . . . 839--841
Joseph Y. Halpern From qualitative to quantitative proofs
of security properties using first-order
conditional logic . . . . . . . . . . . 1--19
Véronique Cortier and
Cyrille Wiedling A formal analysis of the Norwegian
E-voting protocol . . . . . . . . . . . 21--57
Stefan Wüller and
Daniel Mayer and
Fabian Förg and
Samuel Schüppen and
Benjamin Assadsolimani and
Ulrike Meyer and
Susanne Wetzel Designing privacy-preserving interval
operations based on homomorphic
encryption and secret sharing techniques 59--81
Jason Crampton and
Gregory Gutin and
Daniel Karapetyan and
Rémi Watrigant The bi-objective workflow satisfiability
problem and workflow resiliency . . . . 83--115
Andrea Continella and
Michele Carminati and
Mario Polino and
Andrea Lanzi and
Stefano Zanero and
Federico Maggi Prometheus: Analyzing WebInject-based
information stealers . . . . . . . . . . 117--137
Albert Guan and
Wen-Guey Tzeng A secret key establishment protocol for
wireless networks using noisy channels 139--151
Chung-Yi Lin and
Wen-Guey Tzeng Strategy analysis for cloud storage
reliability management based on game
theory . . . . . . . . . . . . . . . . . 153--171
Daniel Migault and
Tobias Guggemos and
Sylvain Killian and
Maryline Laurent and
Guy Pujolle and
Jean Philippe Wary Diet-ESP: IP layer security for IoT . . 173--203
Manar Mohamed and
Song Gao and
Niharika Sachdeva and
Nitesh Saxena and
Chengcui Zhang and
Ponnurangam Kumaraguru and
Paul C. Van Oorschot On the security and usability of dynamic
cognitive game CAPTCHAs . . . . . . . . 205--230
Yao Cheng and
Yingjiu Li and
Robert Deng and
Lingyun Ying and
Wei He A study on a feasible no-root approach
on Android . . . . . . . . . . . . . . . 231--253
Daniel Ricardo dos Santos and
Silvio Ranise and
Luca Compagna and
Serena Elisa Ponta Automatically finding execution
scenarios to deploy security-sensitive
workflows . . . . . . . . . . . . . . . 255--282
Euijin Choo and
Ting Yu and
Min Chi Detecting opinion spammer groups and
spam targets through community discovery
and sentiment analysis . . . . . . . . . 283--318
Toby Murray and
Andrei Sabelfeld and
Lujo Bauer Special issue on verified information
flow security . . . . . . . . . . . . . 319--321
Niklas Broberg and
Bart van Delft and
David Sands Paragon --- Practical programming with
information flow control . . . . . . . . 323--365
Jed Liu and
Owen Arden and
Michael D. George and
Andrew C. Myers Fabric: Building open distributed
systems securely by construction . . . . 367--426
Daniel Giffin and
Amit Levy and
Deian Stefan and
David Terei and
David Mazi\`eres and
John Mitchell and
Alejandro Russo Hails: Protecting data privacy in
untrusted web applications . . . . . . . 427--461
Marco Rocchetto and
Luca Vigan\`o and
Marco Volpe An interpolation-based method for the
verification of security protocols . . . 463--510
Jason Crampton and
Naomi Farley and
Gregory Gutin and
Mark Jones and
Bertram Poettering Cryptographic enforcement of information
flow policies without public information
via tree partitions . . . . . . . . . . 511--535
Bo Chen and
Reza Curtmola Remote data integrity checking with
server-side repair . . . . . . . . . . . 537--584
Max Kanovich and
Tajana Ban Kirigin and
Vivek Nigam and
Andre Scedrov and
Carolyn Talcott Time, computational complexity, and
probability in the analysis of
distance-bounding protocols . . . . . . 585--630
Anonymous Author Index Volume 25 (2017) . . . . . 631--633
Tarik Moataz and
Indrajit Ray and
Indrakshi Ray and
Abdullatif Shikfa and
Frédéric Cuppens and
Nora Cuppens Substring search over encrypted data . . 1--30
Mila Dalla Preda and
Isabella Mastroeni Characterizing a property-driven
obfuscation strategy . . . . . . . . . . 31--69
Christoph Sprenger and
David Basin Refining security protocols . . . . . . 71--120
Scott D. Stoller and
Thang Bui Mining hierarchical temporal roles with
multiple metrics . . . . . . . . . . . . 121--142
Sabrina De Capitani di Vimercati and
Sara Foresti and
Stefano Paraboschi and
Gerardo Pelosi and
Pierangela Samarati Enforcing authorizations while
protecting access confidentiality . . . 143--175
Silvie Levy and
Ehud Gudes and
Nurit Gal-Oz Sharing-habits based privacy control in
social networks . . . . . . . . . . . . 177--205
Ultan Neville and
Simon N. Foley Reasoning about firewall policies
through refinement and composition . . . 207--254
Haritabh Gupta and
Shamik Sural and
Vijayalakshmi Atluri and
Jaideep Vaidya A side-channel attack on smartphones:
Deciphering key taps using built-in
microphones . . . . . . . . . . . . . . 255--281
Wenrui Diao and
Rui Liu and
Xiangyu Liu and
Zhe Zhou and
Zhou Li and
Kehuan Zhang Accessing mobile user's privacy based on
IME personalization: Understanding and
practical attacks . . . . . . . . . . . 283--309
Maliheh Shirvanian and
Nitesh Saxena and
Dibya Mukhopadhyay Short voice imitation man-in-the-middle
attacks on Crypto Phones: Defeating
humans and machines . . . . . . . . . . 311--333
Simon Bischof and
Joachim Breitner and
Jürgen Graf and
Martin Hecker and
Martin Mohr and
Gregor Snelting Low-deterministic security for
low-nondeterministic programs . . . . . 335--366
Bruno Blanchet and
Ben Smyth Automated reasoning for equivalences in
the applied pi calculus with barriers 367--422
Silvio Ranise and
Anh Truong and
Luca Vigan\`o Automated and efficient analysis of
administrative temporal RBAC policies
with role hierarchies . . . . . . . . . 423--458
Binh Thanh Nguyen and
Christoph Sprenger and
Cas Cremers Abstractions for security protocol
verification . . . . . . . . . . . . . . 459--508
Rosario Giustolisi and
Giampaolo Bella and
Gabriele Lenzini Invalid certificates in modern browsers:
a socio-technical analysis . . . . . . . 509--541
Kiran S. Balagani and
Paolo Gasti and
Aaron Elliott and
Azriel Richardson and
Mike O'Neal The impact of application context on
privacy and performance of keystroke
authentication systems . . . . . . . . . 543--556
Per Hallgren and
Ravi Kishore and
Martín Ochoa and
Andrei Sabelfeld Assuring BetterTimes . . . . . . . . . . 557--587
Patrick Luckett and
J. Todd McDonald and
William B. Glisson and
Ryan Benton and
Joel Dawson and
Blair A. Doyle Identifying stealth malware using CPU
power consumption and learning
algorithms . . . . . . . . . . . . . . . 589--613
Tanmoy Chakraborty and
Sushil Jajodia and
Noseong Park and
Andrea Pugliese and
Edoardo Serra and
V. S. Subrahmanian Hybrid adversarial defense: Merging
honeypots and traditional security
methods . . . . . . . . . . . . . . . . 615--645
Ling Chen and
Ting Yu and
Rada Chirkova $k$-Skyband query answering with
differential privacy . . . . . . . . . . 647--676
Benny Fuhry and
Raad Bahmani and
Ferdinand Brasser and
Florian Hahn and
Florian Kerschbaum and
Ahmad-Reza Sadeghi HardIDX: Practical and secure index with
SGX in a malicious environment . . . . . 677--706
Jin Han and
Wangyu Zang and
Li Liu and
Songqing Chen and
Meng Yu Risk-aware multi-objective optimized
virtual machine placement in the cloud 707--730
David Lorenzi and
Emre Uzun and
Jaideep Vaidya and
Shamik Sural and
Vijayalakshmi Atluri Towards designing robust CAPTCHAs . . . 731--760
Daniel Borbor and
Lingyu Wang and
Sushil Jajodia and
Anoop Singhal Surviving unpatchable vulnerabilities
through heterogeneous network hardening
options . . . . . . . . . . . . . . . . 761--789
Jun Zhang and
Meiqi He and
Gongxian Zeng and
Siu-Ming Yiu Privacy-preserving verifiable elastic
net among multiple institutions in the
cloud . . . . . . . . . . . . . . . . . 791--815
Alessandro Barenghi and
Nicholas Mainardi and
Gerardo Pelosi Systematic parsing of X.509: Eradicating
security issues with a parse tree . . . 817--849
Matteo Maffei and
Giulio Malavolta and
Manuel Reinert and
Dominique Schröder Group ORAM for privacy and access
control in outsourced personal records 1--47
Sébastien Salva and
Loukmen Regainia A catalogue associating security
patterns and attack steps to design
secure applications . . . . . . . . . . 49--74
Grégory Demay and
Peter Ga\vzi and
Ueli Maurer and
Björn Tackmann Per-session security: Password-based
cryptography revisited . . . . . . . . . 75--111
Frederik Armknecht and
Zinaida Benenson and
Philipp Morgner and
Christian Müller and
Christian Riess Privacy implications of room climate
data . . . . . . . . . . . . . . . . . . 113--136
Sandrine Blazy and
David Pichardie and
Alix Trieu Verifying constant-time implementations
by abstract interpretation . . . . . . . 137--163
Suryadipta Majumdar and
Azadeh Tabiban and
Yosr Jarraya and
Momen Oqaily and
Amir Alimohammadifar and
Makan Pourzandi and
Lingyu Wang and
Mourad Debbabi Learning probabilistic dependencies
among events for proactive security
auditing in clouds . . . . . . . . . . . 165--202
Cas Cremers and
Martin Dehnel-Wild and
Kevin Milner Secure authentication in the grid: a
formal analysis of DNP3 SAv5 . . . . . . 203--232
Stefano Calzavara and
Alvise Rabitti and
Michele Bugliesi Sub-session hijacking on the web: Root
causes and prevention . . . . . . . . . 233--257
Yangguang Tian and
Yingjiu Li and
Guomin Yang and
Willy Susilo and
Yi Mu and
Hui Cui and
Yinghui Zhang DABKE: Secure deniable attribute-based
key exchange framework . . . . . . . . . 259--275
Lucca Hirschi and
David Baelde and
Stéphanie Delaune A method for unbounded verification of
privacy-type properties . . . . . . . . 277--342
Matteo Zavatteri and
Luca Vigan\`o Last man standing: Static, decremental
and dynamic resiliency via controller
synthesis . . . . . . . . . . . . . . . 343--373
Xingjie Yu and
Michael Shiwen Thang and
Yingjiu Li and
Robert Huijie Deng Collusion attacks and fair time-locked
deposits for fast-payment transactions
in Bitcoin . . . . . . . . . . . . . . . 375--403
Kiran Balagani and
Matteo Cardaioli and
Mauro Conti and
Paolo Gasti and
Martin Georgiev and
Tristan Gurtler and
Daniele Lain and
Charissa Miller and
Kendall Molas and
Nikita Samarin and
Eugen Saraci and
Gene Tsudik and
Lynn Wu PILOT: Password and PIN information
leakage from obfuscated typing videos 405--425
Nawaf Alhebaishi and
Lingyu Wang and
Sushil Jajodia and
Anoop Singhal Mitigating the insider threat of remote
administrators in clouds through
maintenance task assignments . . . . . . 427--458
Tobias Urban and
Dennis Tatang and
Thorsten Holz and
Norbert Pohlmann Analyzing leakage of personal
information by malware . . . . . . . . . 459--481
Gunjan Batra and
Vijayalakshmi Atluri and
Jaideep Vaidya and
Shamik Sural Deploying ABAC policies using RBAC
systems . . . . . . . . . . . . . . . . 483--506
George Stergiopoulos and
Georgia Chronopoulou and
Evangelos Bitsikas and
Nikolaos Tsalis and
Dimitris Gritzalis Using side channel TCP features for
real-time detection of malware
connections . . . . . . . . . . . . . . 507--520
Juan E. Rubio and
Rodrigo Roman and
Cristina Alcaraz and
Yan Zhang Tracking APTs in industrial ecosystems:
a proof of concept . . . . . . . . . . . 521--546
Ziqiang Ma and
Quanwei Cai and
Jingqiang Lin and
Bo Luo and
Jiwu Jing Towards the optimal performance of
integrating Warm and Delay against
remote cache timing side channels on
block ciphers . . . . . . . . . . . . . 547--580