Last update:
Fri Sep 29 09:39:51 MDT 2023
Sushil Jajodia and Jonathan Millen Editors' Preface . . . . . . . . . . . . 1--3 Catherine Meadows Applying Formal Methods to the Analysis of a Key Management Protocol . . . . . . 5--35 John McLean Proving Noninterference and Functional Correctness Using Traces . . . . . . . . 37--57 Ravi S. Sandhu Expressive Power of the Schematic Protection Model . . . . . . . . . . . . 59--98 Pierre Bieber and Frédéric Cuppens A Logical View of Secure Dependencies 99--129 Anonymous Call for Papers: European Symposium on Research in Computer Security . . . . . 131--131
Ravi Sandhu Guest Editor's Preface . . . . . . . . . 131--132 Sarbari Gupta and Virgil D. Gligor Towards a Theory of Penetration-Resistant Systems and Its Applications . . . . . . . . . . . . . . 133--158 Simon N. Foley Aggregation and Separation as Noninterference Properties . . . . . . . 159--188 Amihai Motro A Unified Model for Security and Integrity in Relational Databases . . . 189--213
Sushil Jajodia and Jonathan Millen Editors' Preface . . . . . . . . . . . . 215--215 Teresa F. Lunt and John McLean Guest Editors' Preface . . . . . . . . . 217--218 John C. Wray An Analysis of Covert Timing Channels 219--232 Wei-Ming Hu Reducing Timing Channels with Fuzzy Time 233--254 James W. Gray III Toward a Mathematical Foundation for Information Flow Security . . . . . . . 255--294 Joseph J. Tardo and Kannan Alagappan SPX: Global Authentication Using Public Key Certificates . . . . . . . . . . . . 295--316 Paul F. Syverson Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols . . 317--334 Paul E. Ammann and Ravi S. Sandhu The Extended Schematic Protection Model 335--383 Jeremy Jacob Basic Theorems about Security . . . . . 385--411 Anonymous Author Index . . . . . . . . . . . . . . 413--413
Sushil Jajodia and Jonathan Millen Editors' Preface . . . . . . . . . . . . 85--85 John McLean and Richard Kemmerer Guest Editors' Preface . . . . . . . . . 87--88 Jonathan K. Millen A Resource Allocation Model for Denial of Service Protection . . . . . . . . . 89--106 Thomas Y. C. Woo and Simon S. Lam Authorization in Distributed Systems: A New Approach . . . . . . . . . . . . . . 107--136 Virgil D. Gligor and Shyh-Wei Luan and Joseph N. Pato On Inter-Realm Authentication in Large Distributed Systems . . . . . . . . . . 137--157 Jeremy Epstein and John McHugh and Hilarie Orman and Rita Pascale and Ann Marmor-Squires and Bonnie Danner and Charles R. Martin and Martha Branstad and Glenn Benson and Doug Rothnie A High Assurance Window System Prototype 159--190 Raphael Yahalom Optimality of Asynchronous Two-Party Secure Data-Exchange Protocols . . . . . 191--209 Bev Littlewood and Sarah Brocklehurst and Norman Fenton and Peter Mellor and Stella Page and David Wright and John Dobson and John McDermid and Dieter Gollmann Towards Operational Measures of Computer Security . . . . . . . . . . . . . . . . 211--229 Roshan K. Thomas and Ravi S. Sandhu A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up . . . . . . . . . . 231--275
Jonathan Millen Editor's Preface . . . . . . . . . . . . 277--277 J. D. Horton and R. H. Cooper and W. F. Hyslop and B. G. Nickerson and O. K. Ward and Robert Harland and Elton Ashby and W. M. Stewart The Cascade Vulnerability Problem . . . 279--290 Jonathan T. Trostle Modelling a Fuzzy Time System . . . . . 291--309 Vijayalakshmi Atluri and Sushil Jajodia and Elisa Bertino Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems . . . . . . 311--351 Anonymous Author Index . . . . . . . . . . . . . . 353--354
Sushil Jajodia and Jonathan Millen Editors' Preface . . . . . . . . . . . . 1--1 Li Gong Guest Editor's Preface . . . . . . . . . 3--3 Riccardo Focardi and Roberto Gorrieri A Classification of Security Properties for Process Algebras . . . . . . . . . . 5--33 Jonathan K. Millen Unwinding Forward Correctability . . . . 35--54 William R. Bevier and William D. Young A State-based Approach to Noninterference . . . . . . . . . . . . 55--70 G. J. Simmons and Catherine Meadows The Role of Trust in Information Integrity Protocols . . . . . . . . . . 71--84
Jonathan K. Millen Editor's Preface . . . . . . . . . . . . 85--85 Paul Ammann and Frank Jaeckle and Sushil Jajodia Concurrency Control in a Secure Multilevel Database via a Two-Snapshot Algorithm . . . . . . . . . . . . . . . 87--113 I. E. Kang and T. F. Keefe Transaction Management for Multilevel Secure Replicated Databases . . . . . . 115--145 Thomas H. Hinke and Harry S. Delugach and Asha Chandrasekhar A Fast Algorithm for Detecting Second Paths in Database Inference Analysis . . 147--168 Elisa Bertino and Fabio Origgi and Pierangela Samarati An Extended Authorization Model for Object Databases . . . . . . . . . . . . 169--206 LouAnna Notargiacomo and Barbara T. Blaustein and Catherine D. McCollum Merging Models: Integrity, Dynamic Separation of Duty and Trusted Data Management . . . . . . . . . . . . . . . 207--230
Sushil Jajodia and Jonathan Millen Editors' Preface . . . . . . . . . . . . 231--231 Simon N. Foley and Jeremy L. Jacob Specifying Security for Computer Supported Collaborative Working . . . . 233--253 Liqun Chen and Dieter Gollmann and Christopher J. Mitchell Distributing Trust Amongst Multiple Authentication Servers . . . . . . . . . 255--267 A. Zakinthinos and E. S. Lee The Composability of Non-Interference 269--281 Matt Bishop Theft of Information in the Take-Grant Protection Model . . . . . . . . . . . . 283--308 C. Blundo and Luiz A. Frota Mattos and D. R. Stinson Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels 309--322 Anonymous Call for Papers . . . . . . . . . . . . 323--324 Anonymous Author Index Volume 3 . . . . . . . . . 325--326
Elisa Bertino and Gérard Eizenberg and Roger M. Needham Guest-editors' preface . . . . . . . . . 1--2 Bruno d'Ausbourg and Christel Calas Controlling causal dependencies over a secure network . . . . . . . . . . . . . 3--25 A. W. Roscoe and J. C. P. Woodcock and L. Wulf Non-interference through determinism . . 27--53 Ueli M. Maurer and Pierre E. Schmid A calculus for security boots trapping in distributed systems . . . . . . . . . 55--80 Azad Jiwa and Thomas Hardjono and Jennifer Seberry Beacons for authentication in distributed systems . . . . . . . . . . 81--96 Ralf Hauser and Philippe Janson and Gene Tsudik and Els Van Herreweghen and Refik Molva Robust and secure password and key change method . . . . . . . . . . . . . 97--111 Anonymous Information for authors . . . . . . . . 113--119
Sushil Jajodia and Jonathan Millen Editors' preface . . . . . . . . . . . . 121--121 Shiuh-Pyng Shieh and Virgil D. Gligor Detecting illicit leakage of information in operating systems . . . . . . . . . . 123--148 Paul Ammann and Ravi S. Sandhu and Richard Lipton The expressive power of multi-parent creation in monotonic access control models . . . . . . . . . . . . . . . . . 149--165 Dennis Volpano and Cynthia Irvine and Geoffrey Smith A sound type system for secure flow analysis . . . . . . . . . . . . . . . . 167--187 John McDermott and Ravi Mukkamala Analytic performance comparison of transaction processing algorithms for the SINTRA replicated-architecture database system . . . . . . . . . . . . 189--228 Jonathan Millen Editor's preface to the Bell--LaPadula model . . . . . . . . . . . . . . . . . 229--231 Leonard J. LaPadula Foreword . . . . . . . . . . . . . . . . 233--238 Leonard J. LaPadula and D. Elliott Bell MITRE Technical Report 2547, Volume II 239--263
Sushil Jajodia and Jonathan Millen Editors' preface . . . . . . . . . . . . 265--265 Michael K. Reiter and Matthew K. Franklin and John B. Lacy and Rebecca N. Wright The $ \Omega $ key management service 267--287 Shaw-Cheng Chuang Securing ATM networks . . . . . . . . . 289--329 Matt Bishop Conspiracy and information flow in the Take-Grant Protection Model . . . . . . 331--359 Anonymous Author Index Volume 4 (1996) . . . . . . 361--362
Elisa Bertino and Emilio Montolivo and Helmut Kurth Guest editors' preface . . . . . . . . . 1--2 P. A. Bonatti and M. L. Sapino and V. S. Subrahmanian Merging heterogeneous security orderings 3--29 Volkmar Lotz Threat scenarios as a means to formally develop secure systems . . . . . . . . . 31--67 Jan Camenisch and Ueli Maurer and Markus Stadler Digital payment systems with passive anonymity-revoking trustees . . . . . . 69--89 N. Asokan and G. Tsudik and M. Waidner Server-supported signatures . . . . . . 91--108
Sushil Jajodia and Jonathan Millen Editors' preface . . . . . . . . . . . . 109--109 Michael Merritt Guest editor's preface . . . . . . . . . 111--112 Dahlia Malkhi and Michael Reiter A high-throughput secure reliable multicast protocol . . . . . . . . . . . 113--127 Jane Sinclair Action systems for security specification . . . . . . . . . . . . . 129--154 Sabrina De Capitani di Vimercati and Pierangela Samarati Authorization specification and enforcement in federated database systems . . . . . . . . . . . . . . . . 155--188
Elisa Bertino and Pierangela Samarati and Gian Paolo Rossi Special issue on Security in the World Wide Web (WWW) . . . . . . . . . . . . . 189--190 F. Bergadano and B. Crispo and M. Lomas Strong authentication and privacy with standard browsers . . . . . . . . . . . 191--212 Jean-Jacques Quisquater and Marc Joye Authentication of sequences with the SL$_2$ hash function: application to video sequences . . . . . . . . . . . . 213--223 Ciarán Bryce and Winfried Kühnhauser and Rémy Amouroux and Mauricio López and Harry Rudnik CWASAR: a European infrastructure for secure electronic commerce . . . . . . . 225--235 Paul F. Syverson and Michael G. Reed and David M. Goldschlag Private Web browsing . . . . . . . . . . 237--248 Martin Röscheisen and Terry Winograd A network-centric design for relationship-based security and access control . . . . . . . . . . . . . . . . 249--254 M. Winslett and N. Ching and V. Jones and I. Slepchin Using digital credentials on the World Wide Web . . . . . . . . . . . . . . . . 255--267
Pierangela Samarati and Ravi Sandhu Guest editors' preface . . . . . . . . . 269--270 S. Castano and S. De Capitani di Vimercati and M. G. Fugini Automated derivation of global authorizations for database federations 271--301 Vijayalakshmi Atluri and Wei-Kuang Huang Enforcing mandatory and discretionary security in workflow management systems 303--339 S. A. Demurjian Sr. and T. C. Ting Towards a definitive paradigm for security in object-oriented systems and applications . . . . . . . . . . . . . . 341--382 Anonymous Author Index Volume 5 (1997) . . . . . . 383--384
Simon N. Foley Guest editors' preface . . . . . . . . . 1--1 Martín Abadi On SDSI's linked local name spaces . . . 3--21 James W. Gray III and Kin Fai Epsilon Ip and King-Shan Lui Provable security for cryptographic protocols --- exact analysis and engineering applications . . . . . . . . 23--52 Gavin Lowe Casper: A compiler for the analysis of security protocols . . . . . . . . . . . 53--84 Lawrence C. Paulson The inductive approach to verifying cryptographic protocols . . . . . . . . 85--128
Tsutomu Matsumoto Human--computer cryptography: An attempt 129--149 Steven A. Hofmeyr and Stephanie Forrest and Anil Somayaji Intrusion detection using sequences of system calls . . . . . . . . . . . . . . 151--180 Indrakshi Ray and Paul Ammann and Sushil Jajodia A semantic-based transaction processing model for multilevel transactions . . . 181--217
Lars R. Knudsen and Keith M. Martin In search of multiple domain key recovery . . . . . . . . . . . . . . . . 219--235 Matthew K. Franklin and Dahlia Malkhi Auditable metering with lightweight security . . . . . . . . . . . . . . . . 237--255 Fabio Casati and Silvana Castano and Maria Grazia Fugini Enforcing workflow authorization constraints using triggers . . . . . . . 257--285 Anonymous Author Index Volume 6 (1998) . . . . . . 287--287
Jonathan Millen Special section on Intrusion Detection 1--1 Thomas E. Daniels and Eugene H. Spafford Identification of host audit data to detect attacks on low-level IP vulnerabilities . . . . . . . . . . . . 3--35 Giovanni Vigna and Richard A. Kemmerer NetSTAT: A network-based intrusion detection system . . . . . . . . . . . . 37--71 Carlo Blundo and Barbara Masucci A note on the randomness in dynamic threshold schemes . . . . . . . . . . . 73--85
Simon N. Foley Guest editor's preface . . . . . . . . . 87--87 Gavin Lowe Towards a completeness result for model checking of security protocols . . . . . 89--146 A. W. Roscoe and P. J. Broadfoot Proving security protocols with model checkers by data independence techniques 147--190 F. Javier Thayer Fábrega and Jonathan C. Herzog and Joshua D. Guttman Strand spaces: proving security protocols correct . . . . . . . . . . . 191--230 Dennis Volpano and Geoffrey Smith Probabilistic noninterference in a concurrent language . . . . . . . . . . 231--253
T. Y. Lin Guest editor's preface . . . . . . . . . 255--255 Elisa Bertino and Elena Ferrari Secure object deletion and garbage collection in multilevel object bases 257--285 Ehud Gudes and Martin S. Olivier and Reind P. van de Riet Modelling, specifying and implementing workflow security in Cyberspace . . . . 287--315 Ravi Sandhu and Venkata Bhamidipati Role-based administration of user-role assignment: The URA97 model and its Oracle implementation . . . . . . . . . 317--342
T. Y. Lin Guest editor's preface . . . . . . . . . 1--1 Vijayalakshmi Atluri and Wei-Kuang Huang and Elisa Bertino A semantic-based execution model for multilevel secure workflows . . . . . . 3--41 John Hale and Jody Threet and Sujeet Shenoi A ticket-based access control architecture for object systems . . . . 43--65 Adrian Spalka and Armin B. Cremers Structured name-spaces in secure databases . . . . . . . . . . . . . . . 67--86
Yves Deswarte and Catherine Meadows Guest editors' preface . . . . . . . . . 87--87 Günter Karjoth Authorization in CORBA Security . . . . 89--108 Elisa Bertino and Francesco Buccafurri and Elena Ferrari and Pasquale Rullo A logic-based approach for enforcing access control . . . . . . . . . . . . . 109--139 John Kelsey and Bruce Schneier and David Wagner and Chris Hall Side channel cryptanalysis of product ciphers . . . . . . . . . . . . . . . . 141--158 Andreas Wespi and Hervé Debar and Marc Dacier and Mehdi Nassehi Fixed- vs. variable-length patterns for detecting suspicious process behavior 159--181 Günther Horn and Bart Preneel Authentication and payment in future mobile systems . . . . . . . . . . . . . 183--207 Vijayalakshmi Atluri and Wei-Kuang Huang A Petri net based safety analysis of workflow authorization models . . . . . 209--240
Vijay Atluri and John Hale Guest Editor's preface . . . . . . . . . 241--242 Peng Liu and Sushil Jajodia and Catherine D. McCollum Intrusion confinement by isolation in information systems . . . . . . . . . . 243--279 Chris Clifton Using sample size to limit exposure to data mining . . . . . . . . . . . . . . 281--307 Elisa Bertino and Piero Andrea Bonatti and Elena Ferrari and Maria Luisa Sapino Temporal authorization bases: From specification to integration . . . . . . 309--353
Paul F. Syverson Guest Editor's preface . . . . . . . . . 1--2 Mei Lin Hui and Gavin Lowe Fault-preserving simplifying transformations for security protocols 3--46 Dawn Xiaodong Song and Sergey Berezin and Adrian Perrig Athena: a novel approach to efficient automatic security protocol analysis . . 47--74 P. Y. A. Ryan and S. A. Schneider Process algebra and non-interference . . 75--103 Joseph Y. Halpern and Ron van der Meyden A logic for SDSI's linked local name spaces . . . . . . . . . . . . . . . . . 105--142 Catherine Meadows A cost-based framework for analysis of denial of service in networks . . . . . 143--164
Sushil Jajodia and Vijayalakshmi Atluri and Thomas F. Keefe and Catherine D. McCollum and Ravi Mukkamala Multilevel secure transaction processing 165--195 Lawrence C. Paulson Relations between secrets: two formal analyses of the Yahalom protocol . . . . 197--216 Frédéric Besson and Thomas Jensen and Daniel Le Métayer and Tommy Thorn Model checking security properties of control flow graphs . . . . . . . . . . 217--250
Sabrina De Capitani di Vimercati and Patrick Lincoln and Livio Ricciulli and Pierangela Samarati Global infrastructure protection system 251--283 Dwaine Clarke and Jean-Emile Elien and Carl Ellison and Matt Fredette and Alexander Morcos and Ronald L. Rivest Certificate chain discovery in SPKI/SDSI 285--322 Rebecca N. Wright and Patrick D. Lincoln and Jonathan K. Millen Depender graphs: A method of fault-tolerant certificate distribution 323--338 Anonymous Author Index Volume 9 (2001) . . . . . . 339--340
Deborah Frincke Guest Editor's preface . . . . . . . . . 1--3 Wenke Lee and Wei Fan and Matthew Miller and Salvatore J. Stolfo and Erez Zadok Toward cost-sensitive modeling for intrusion detection and response . . . . 5--22 Florian Kerschbaum and Eugene H. Spafford and Diego Zamboni Using internal sensors and embedded detectors for intrusion detection . . . 23--70 Steven T. Eckmann and Giovanni Vigna and Richard A. Kemmerer STATL: An attack language for state-based intrusion detection . . . . 71--103 Stuart Staniford and James A. Hoagland and Joseph M. McAlerney Practical automated detection of stealthy portscans . . . . . . . . . . . 105--136 Yingjiu Li and Ningning Wu and X. Sean Wang and Sushil Jajodia Enhancing profiles for anomaly detection using time granularities . . . . . . . . 137--157 Diomidis Spinellis and Dimitris Gritzalis Panoptis: Intrusion detection using a domain-specific language . . . . . . . . 159--176 Alec Yasinsac An environment for security protocol intrusion detection . . . . . . . . . . 177--188 C. R. Ramakrishnan and R. Sekar Model-based analysis of configuration vulnerabilities . . . . . . . . . . . . 189--209
Sushil Jajodia and Dimitris Gritzalis Guest Editors' preface . . . . . . . . . 211--211 Brian Neil Levine and Clay Shields Hordes: a multicast based protocol for anonymity . . . . . . . . . . . . . . . 213--240 Piero A. Bonatti and Pierangela Samarati A uniform framework for regulating service access and information release on the Web . . . . . . . . . . . . . . . 241--271 Ahto Buldas and Peeter Laud and Helger Lipmaa Eliminating counterevidence with applications to accountable certificate management . . . . . . . . . . . . . . . 273--296 Rebecca N. Wright and Patrick D. Lincoln and Jonathan K. Millen Depender graphs: A method of fault-tolerant certificate distribution 297--297
Frédéric Cuppens Guest Editor's preface . . . . . . . . . 299--300 Gerald Brose Manageable access control for CORBA . . 301--337 Gerhard Schellhorn and Wolfgang Reif and Axel Schairer and Paul Karger and Vernon Austel and David Toll Verified formal security models for multiapplicative smart cards . . . . . . 339--367 P. Bieber and J. Cazin and P. Girard and J.-L. Lanet and V. Wiels and G. Zanon Checking secure interactions of smart card applets: extended version . . . . . 369--398 Ian Welch and Robert J. Stroud Using reflection as a mechanism for enforcing security policies on compiled code . . . . . . . . . . . . . . . . . . 399--432 Anonymous Author Index Volume 10 (2002) . . . . . 433--434
Charles Iheagwara and Andrew Blyth and Mukesh Singhal A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment . . 1--33 Ninghui Li and William H. Winsborough and John C. Mitchell Distributed credential chain discovery in trust management . . . . . . . . . . 35--86 Giampaolo Bella Inductive verification of smart card protocols . . . . . . . . . . . . . . . 87--132
Paul F. Syverson Guest Editor's preface . . . . . . . . . 133--133 Peter Sewell and Jan Vitek Secure composition of untrusted code: box $ \pi $, wrappers, and causality types . . . . . . . . . . . . . . . . . 135--187 Ernie Cohen First-order verification of cryptographic protocols . . . . . . . . 189--216 James Heather and Gavin Lowe and Steve Schneider How to prevent type flaw attacks on security protocols . . . . . . . . . . . 217--244 Pankaj Kakkar and Carl A. Gunter and Martín Abadi Reasoning about secrecy for active networks . . . . . . . . . . . . . . . . 245--287
Bhavani Thuraisingham and Reind van de Riet Guest Editors' preface . . . . . . . . . 289--289 Premkumar Devanbu and Michael Gertz and Charles Martel and Stuart G. Stubblebine Authentic data publication over the Internet . . . . . . . . . . . . . . . . 291--314 Daniel Barbará and Rajni Goel and Sushil Jajodia A checksum-based corruption detection technique . . . . . . . . . . . . . . . 315--329 John Hale and Mauricio Papa and Sujeet Shenoi Programmable access control . . . . . . 331--351 Wouter Teepe and Reind van de Riet and Martin Olivier WorkFlow analyzed for security and privacy in using databases . . . . . . . 353--363 C. Altenschmidt and J. Biskup and U. Flegel and Y. Karabulut Secure mediation: requirements, design, and architecture . . . . . . . . . . . . 365--398 Steve Kremer and Jean-François Raskin A game-based verification of non-repudiation and fair exchange protocols . . . . . . . . . . . . . . . 399--429 Katherine Campbell and Lawrence A. Gordon and Martin P. Loeb and Lei Zhou The economic cost of publicly announced information security breaches: empirical evidence from the stock market . . . . . 431--448
Steve Schneider Guest Editor's preface . . . . . . . . . 449--450 Andrew D. Gordon and Alan Jeffrey Authenticity by typing for security protocols . . . . . . . . . . . . . . . 451--519 Eijiro Sumii and Benjamin C. Pierce Logical relations for encryption . . . . 521--554 Olivier Pereira and Jean-Jacques Quisquater Some attacks upon authenticated group key agreement protocols . . . . . . . . 555--580 Joseph Y. Halpern and Ron van der Meyden A logical reconstruction of SPKI . . . . 581--613 Heiko Mantel and Andrei Sabelfeld A unifying approach to the security of distributed and multi-threaded programs 615--676 Nancy Durgin and John Mitchell and Dusko Pavlovic A compositional logic for proving security properties of protocols . . . . 677--721 Anonymous Author Index Volume 11 (2003) . . . . . 723--725
Joshua Guttman Guest Editor's preface . . . . . . . . . 1--1 Dominic Hughes and Vitaly Shmatikov Information hiding, anonymity and privacy: a modular approach . . . . . . 3--36 Alessandra Di Pierro and Chris Hankin and Herbert Wiklicky Approximate non-interference . . . . . . 37--81 Gavin Lowe Analysing protocols subject to guessing attacks . . . . . . . . . . . . . . . . 83--97 Daniele Micciancio and Bogdan Warinschi Completeness theorems for the Abadi--Rogaway language of encrypted expressions . . . . . . . . . . . . . . 99--129 Ajay Chander and Drew Dean and John C. Mitchell Reconstructing trust management . . . . 131--164
Dirk Ourston and Sara Matzner and William Stump and Bryan Hopkins Coordinated Internet attacks: responding to attack complexity . . . . . . . . . . 165--190 Alessandro Aldini and Mario Bravetti and Roberto Gorrieri A process-algebraic approach for the analysis of probabilistic noninterference . . . . . . . . . . . . 191--245 Nancy Durgin and Patrick Lincoln and John Mitchell and Andre Scedrov Multiset rewriting and the complexity of bounded security protocols . . . . . . . 247--311
Steve Schneider Guest Editor's preface . . . . . . . . . 313--315 S. Jha and T. Reps Model checking SPKI/SDSI . . . . . . . . 317--353 Vitaly Shmatikov Probabilistic analysis of an anonymity system . . . . . . . . . . . . . . . . . 355--377 P. J. Broadfoot and A. W. Roscoe Embedding agents within the intruder to detect parallel attacks . . . . . . . . 379--408 Joshua D. Guttman Authentication tests and disjoint encryption: A design method for security protocols . . . . . . . . . . . . . . . 409--433 Andrew D. Gordon and Alan Jeffrey Types and effects for asymmetric cryptographic protocols . . . . . . . . 435--483 Dominic Duggan Type-based cryptographic operations . . 485--550 Levente Buttyán and Jean-Pierre Hubaux and Srdjan \vCapkun A formal model of rational exchange and its application to the analysis of Syverson's protocol . . . . . . . . . . 551--587 Michael Backes and Birgit Pfitzmann and Michael Waidner and Michael Steiner Polynomial liveness . . . . . . . . . . 589--617 Gavin Lowe Defining information flow quantity . . . 619--653
Lingyu Wang and Duminda Wijesekera and Sushil Jajodia Cardinality-based inference control in data cubes . . . . . . . . . . . . . . . 655--692 Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei Key management for high bandwidth secure multicast . . . . . . . . . . . . . . . 693--709 Taenam Cho and Sang-Ho Lee and Won Kim A group key recovery mechanism based on logical key hierarchy . . . . . . . . . 711--736 Jian Zhang and Jian Gong and Yong Ding Research on automated rollbackability of intrusion response . . . . . . . . . . . 737--751 Florian P. Buchholz and Clay Shields Providing process origin information to aid in computer forensic investigations 753--776 Charles Iheagwara and Andrew Blyth and Mukesh Singhal Cost effective management frameworks for intrusion detection systems . . . . . . 777--798
Vijayalakshmi Atluri and Soon Ae Chun and Pietro Mazzoleni Chinese wall security for decentralized workflow management systems . . . . . . 799--840 Premkumar Devanbu and Michael Gertz and April Kwong and Charles Martel and Glen Nuckolls and Stuart G. Stubblebine Flexible authentication of XML documents 841--864 Joshua D. Guttman and F. Javier Thayer and Lenore D. Zuck The faithfulness of abstract protocol analysis: Message authentication . . . . 865--891 Catherine Meadows and Paul Syverson and Iliano Cervesato Formal specification and analysis of the Group Domain of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer . . . . . . . . . . . . . . . . 893--931 Anonymous Author Index Volume 12 (2004) . . . . . 933--935
Roberto Gorrieri Guest Editor's preface . . . . . . . . . 1--2 Stefano Bistarelli and Iliano Cervesato and Gabriele Lenzini and Fabio Martinelli Relating multiset rewriting and process algebras for security protocol analysis 3--47 Chiara Bodei and Pierpaolo Degano and Corrado Priami Checking security policies through an enhanced Control Flow Analysis . . . . . 49--85 Michele Bugliesi and Sabina Rossi Non-interference proof techniques for the analysis of cryptographic protocols 87--113 Joshua D. Guttman and Amy L. Herzog and John D. Ramsdell and Clement W. Skorupka Verifying information flow goals in Security-Enhanced Linux . . . . . . . . 115--134 R. Ramanujam and S. P. Suresh Decidability of context-explicit security protocols . . . . . . . . . . . 135--165 Vitaly Shmatikov and Carolyn Talcott Reputation-based trust management . . . 167--190
E. Bertino and E. Ferrari and G. Mella An approach to cooperative updates of XML documents in distributed systems . . 191--242 André Zúquete An efficient high quality random number generator for multi-programmed systems 243--263 Iliano Cervesato and Nancy A. Durgin and Patrick D. Lincoln and John C. Mitchell and Andre Scedrov A comparison between strand spaces and multiset rewriting for security protocol analysis . . . . . . . . . . . . . . . . 265--316 James Heather and Steve Schneider A decision procedure for the existence of a rank function . . . . . . . . . . . 317--344
Riccardo Focardi Guest Editor's preface . . . . . . . . . 345--345 Chiara Bodei and Mikael Buchholtz and Pierpaolo Degano and Flemming Nielson and Hanne Riis Nielson Static validation of security protocols 347--390 Annalisa Bossi and Damiano Macedonio and Carla Piazza and Sabina Rossi Information flow in secure contexts . . 391--422 Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic A derivation system and compositional logic for security protocols . . . . . . 423--482 Joseph Y. Halpern and Kevin R. O'Neill Anonymity and information hiding in multiagent systems . . . . . . . . . . . 483--514 Jonathan Millen and Vitaly Shmatikov Symbolic protocol analysis with an Abelian group operator or Diffie--Hellman exponentiation . . . . . 515--564 Bogdan Warinschi A computational analysis of the Needham--Schroeder--(Lowe) protocol . . 565--591
Jaideep Vaidya and Chris Clifton Secure set intersection cardinality with application to association rule mining 593--622 Meng Yu and Peng Liu and Wanyu Zang Specifying and using intrusion masking models to process distributed operations 623--658 Salvatore J. Stolfo and Frank Apap and Eleazar Eskin and Katherine Heller and Shlomo Hershkop and Andrew Honig and Krysta Svore A comparative evaluation of two algorithms for Windows Registry Anomaly Detection . . . . . . . . . . . . . . . 659--693 Jonathan Millen and Vitaly Shmatikov Symbolic protocol analysis with an Abelian group operator or Diffie--Hellman exponentiation . . . . . 695--695
Giampaolo Bella and Peter Ryan Guest Editors' preface . . . . . . . . . 697--697 Stefano Bistarelli and Simon N. Foley and Barry O'Sullivan A soft constraint-based approach to the cascade vulnerability problem . . . . . 699--720 Christian Collberg and Tapas Ranjan Sahoo Software watermarking in the frequency domain: Implementation, analysis, and attacks . . . . . . . . . . . . . . . . 721--755 Aleksandra Nenadi\'c and Ning Zhang and Qi Shi RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery 757--777 Christos Siaterlis and Vasilis Maglaris One step ahead to multisensor data fusion for DDoS detection . . . . . . . 779--806
Jarmo Mölsä Mitigating denial of service attacks: A tutorial . . . . . . . . . . . . . . . . 807--837 Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan P5: A protocol for scalable anonymous communication . . . . . . . . . . . . . 839--876 Antonio Pescap\`e and Giorgio Ventre Experimental analysis of attacks against intradomain routing protocols . . . . . 877--903 Anonymous Author Index Volume 13 (2005) . . . . . 905--907
Véronique Cortier and Stéphanie Delaune and Pascal Lafourcade A survey of algebraic properties used in cryptographic protocols . . . . . . . . 1--43 Stelvio Cimato and Antonella Cresti and Paolo D'Arco A unified model for unconditionally secure key distribution . . . . . . . . 45--64 Riccardo Focardi and Sabina Rossi Information flow security in dynamic contexts . . . . . . . . . . . . . . . . 65--110
Riccardo Focardi Preface . . . . . . . . . . . . . . . . 111--111 Chiara Braghin and Daniele Gorla and Vladimiro Sassone Role-based access control for a distributed calculus . . . . . . . . . . 113--155 Andrew C. Myers and Andrei Sabelfeld and Steve Zdancewic Enforcing Robust Declassification and Qualified Robustness . . . . . . . . . . 157--196 Olivier Pereira and Jean-Jacques Quisquater On the impossibility of building secure Cliques-type authenticated group key agreement protocols . . . . . . . . . . 197--246
Atsuhiro Goto Preface . . . . . . . . . . . . . . . . 247--247 Thibault Candebat and David Gray Secure pseudonym management using mediated identity-based encryption . . . 249--267 Abhilasha Bhargav-Spantzel and Anna C. Squicciarini and Elisa Bertino Establishing and protecting digital identity in federation systems . . . . . 269--300
Sencun Zhu and Sanjeev Setia and Shouhuai Xu and Sushil Jajodia GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks . . . . . . . . . . . . . . . . 301--325 Arun K. Eamani and A. Prasad Sistla Language based policy analysis in a SPKI Trust Management System . . . . . . . . 327--357 Jianhong Xia and Sarma Vangala and Jiang Wu and Lixin Gao and Kevin Kwiat Effective worm detection for various scan techniques . . . . . . . . . . . . 359--387
Jianying Zhou and Meng-Chow Kang Preface . . . . . . . . . . . . . . . . 389--390 Geraint Price Public Key Infrastructures: A research agenda . . . . . . . . . . . . . . . . . 391--417 M. Lippert and V. Karatsiolis and A. Wiesmaier and J. Buchmann Life-cycle management of X.509 certificates based on LDAP directories 419--439 Guilin Wang Generic non-repudiation protocols supporting transparent off-line TTP . . 441--467 Javier Lopez Unleashing public-key cryptography in wireless sensor networks . . . . . . . . 469--482
Patrick McDaniel and Atul Prakash Enforcing provisioning and authorization policy in the Antigone system . . . . . 483--511 Andrew Blyth and Paula Thomas Performing real-time threat assessment of security incidents using data fusion of IDS logs . . . . . . . . . . . . . . 513--534 Esma A\"\imeur and Gilles Brassard and Flavien Serge Mani Onana Blind Electronic Commerce . . . . . . . 535--559 Gethin Norman and Vitaly Shmatikov Analysis of probabilistic contract signing . . . . . . . . . . . . . . . . 561--589 Geoffrey Smith Improved typings for probabilistic noninterference in a multi-threaded language . . . . . . . . . . . . . . . . 591--623 Anonymous Author Index Volume 14 (2006) . . . . . 625--626
Anonymous Message from the Guest Editors . . . . . 1--2 Charikleia Zouridaki and Brian L. Mark and Marek Hejmo and Roshan K. Thomas Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs . . . . . 3--38 Maxim Raya and Jean-Pierre Hubaux Securing vehicular ad hoc networks . . . 39--68 Haowen Chan and Adrian Perrig and Bartosz Przydatek and Dawn Song SIA: Secure information aggregation in sensor networks . . . . . . . . . . . . 69--102 S. Radosavac and Alvaro A. Cárdenas and John S. Baras and George V. Moustakides Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers . . . . . . . . . . 103--128 Shouhuai Xu On the security of group communication schemes . . . . . . . . . . . . . . . . 129--169 Giorgio Zanin and Roberto Di Pietro and Luigi V. Mancini Robust RSA distributed signatures for large-scale long-lived ad hoc networks 171--196
Valentina Casola and Antonino Mazzeo and Nicola Mazzocca and Valeria Vittorini A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures . . . . . . . . . . 197--229 Mahesh V. Tripunitara and Ninghui Li A theory for comparing the expressive power of access control models . . . . . 231--272 V. Skormin and A. Volynkin and D. Summerville and J. Moronski Prevention of information attacks by run-time detection of self-replication in computer codes . . . . . . . . . . . 273--302
Stephanie Wehner Analyzing worms and network traffic using compression . . . . . . . . . . . 303--320 David Clark and Sebastian Hunt and Pasquale Malacaria A static analysis for quantifying information flow in a simple imperative language . . . . . . . . . . . . . . . . 321--371 Annalisa Bossi and Carla Piazza and Sabina Rossi Compositional information flow security for concurrent programs . . . . . . . . 373--416
Lingyu Wang and Yingjiu Li and Sushil Jajodia and Duminda Wijesekera Parity-based inference control for multi-dimensional range sum queries . . 417--445 Christian Skalka and X. Sean Wang and Peter Chapin Risk management for distributed authorization . . . . . . . . . . . . . 447--489
Atsuhiro Goto Preface . . . . . . . . . . . . . . . . 491--491 Abhilasha Bhargav-Spantzel and Jan Camenisch and Thomas Gross and Dieter Sommer User centricity: A taxonomy and open issues . . . . . . . . . . . . . . . . . 493--527 Abhilasha Bhargav-Spantzel and Anna C. Squicciarini and Shimon Modi and Matthew Young and Elisa Bertino and Stephen J. Elliott Privacy preserving multi-factor authentication with biometrics . . . . . 529--560
Michael Backes and David Basin and Michael Waidner Preface . . . . . . . . . . . . . . . . 561--561 Michele Bugliesi and Riccardo Focardi and Matteo Maffei Dynamic types for authentication . . . . 563--617 R. Corin and S. Etalle and P. H. Hartel and A. Mader Timed analysis of security protocols . . 619--645 Gilles Barthe and Leonor Prensa Nieto Secure information flow for a concurrent language with scheduling . . . . . . . . 647--689 Tomás E. Uribe and Steven Cheung Automatic analysis of firewall and network intrusion detection system configurations . . . . . . . . . . . . . 691--715 Anonymous Author Index Volume 15 (2007) . . . . . 717--719
Nan Zhang and Mark Ryan and Dimitar P. Guelev Synthesising verified access control systems through model checking . . . . . 1--61 Karl Krukow and Mogens Nielsen and Vladimiro Sassone A logical framework for history-based access control and reputation systems 63--101
George O. M. Yee and Ali A. Ghorbani and Patrick C. K. Hung Guest Editors' Introduction . . . . . . 103--106 Jie Zhou and Jim Alves-Foss Security policy refinement and enforcement for the design of multi-level secure systems . . . . . . . 107--131 Marco Casassa Mont and Robert Thyne Privacy policy enforcement in enterprises with identity management solutions . . . . . . . . . . . . . . . 133--163 Harshit Nayyar and Ali A. Ghorbani Approximate autoregressive modeling for network attack detection . . . . . . . . 165--197 Torsten Spindler and Christoph Wartmann and Ludger Hovestadt and Daniel Roth and Luc Van Gool and Andreas Steffen Privacy in video surveilled spaces . . . 199--222 Muhammad Alam and Michael Hafner and Ruth Breu Constraint based role based access control in the SECTET-framework . . . . 223--260
George O. M. Yee and Chunming Rong and Laurence T. Yang Guest Editors' Introduction . . . . . . 261--264 A. J. Elbirt Accelerated AES implementations via generalized instruction set extensions 265--288 Anne V. D. M. Kayem and Selim G. Akl and Patrick Martin On replacing cryptographic keys in hierarchical key management systems . . 289--309 Lifu Wang and Partha Dasgupta Coprocessor-based hierarchical trust management for software integrity and digital identity protection . . . . . . 311--339 Janne Merete Hagen and Tormod Kalberg Sivertsen and Chunming Rong Protection against unauthorized access and computer crime in Norwegian enterprises . . . . . . . . . . . . . . 341--366
Ernesto Damiani Guest Editorial . . . . . . . . . . . . 367--368 C. A. Ardagna and M. Cremonini and S. De Capitani di Vimercati and P. Samarati A privacy-aware access control system 369--397 Michael T. Goodrich and Roberto Tamassia and Danfeng (Daphne) Yao Notarized federated ID management and authentication . . . . . . . . . . . . . 399--418 Lingyu Wang and Chao Yao and Anoop Singhal and Sushil Jajodia Implementing interactive analysis of attack graphs using relational databases 419--437 Vijayalakshmi Atluri and Heechang Shin and Jaideep Vaidya Efficient security policy enforcement for the mobile environment . . . . . . . 439--475 Joachim Biskup and Lena Wiese Preprocessing for controlled query evaluation with availability policy . . 477--494
Andrei Sabelfeld Preface . . . . . . . . . . . . . . . . 495--495 Michael Backes and Birgit Pfitzmann and Andre Scedrov Key-dependent message security under active attacks --- BRSIM/UC-soundness of Dolev--Yao-style encryption with key cycles . . . . . . . . . . . . . . . . . 497--530 Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden On the Bayes risk in information-hiding protocols . . . . . . . . . . . . . . . 531--571 Ricardo Corin and Pierre-Malo Deniélou and Cédric Fournet and Karthikeyan Bhargavan and James Leifer A secure compiler for session abstractions . . . . . . . . . . . . . . 573--636 Paritosh Shroff and Scott F. Smith and Mark Thober Securing information flow via dynamic capture of dependencies . . . . . . . . 637--688
Ferucio L. \cTiplea and C\uat\ualin V. B\^\irjoveanu and Constantin Enea and Ioana Boureanu Secrecy for bounded security protocols with freshness check is NEXPTIME-complete . . . . . . . . . . . 689--712 Patrick Traynor and William Enck and Patrick McDaniel and Thomas La Porta Exploiting open functionality in SMS-capable cellular networks . . . . . 713--742 Toby Murray and Duncan Grove Non-delegatable authorities in capability systems . . . . . . . . . . . 743--759 Petros Belsis and Kostas Fragos and Stefanos Gritzalis and Christos Skourlas Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification . . . . 761--790 Anonymous Author Index Volume 16 (2008) . . . . . 791--793
Milan Petkovi\'c and Willem Jonker Preface . . . . . . . . . . . . . . . . 1--3 Chao Yao and Lingyu Wang and X. Sean Wang and Claudio Bettini and Sushil Jajodia Evaluating privacy threats in released database views by symmetric indistinguishability . . . . . . . . . . 5--42 Ji-Won Byun and Tiancheng Li and Elisa Bertino and Ninghui Li and Yonglak Sohn Privacy-preserving incremental data dissemination . . . . . . . . . . . . . 43--68 Stefan Böttcher and Rita Hartel Information disclosure by answers to XPath queries . . . . . . . . . . . . . 69--99 Weiwei Cheng and Kian-Lee Tan Query assurance verification for outsourced multi-dimensional databases 101--126
Nan Hu and Giri K. Tayi and Chengyu Ma and Yingjiu Li Certificate revocation release policies 127--157 Amir Herzberg Folklore, practice and theory of robust combiners . . . . . . . . . . . . . . . 159--189 Benjamin Aziz and Simon N. Foley and John Herbert and Garret Swart Configuring storage-area networks using mandatory security . . . . . . . . . . . 191--210 Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo and Haibing Lu Edge-RMP: Minimizing administrative assignments for role-based access control . . . . . . . . . . . . . . . . 211--235
Giampaolo Bella and Peter Y. A. Ryan \booktitleJournal of Computer Security 237--237 Petros Belsis and Kostas Fragos and Stefanos Gritzalis and Christos Skourlas Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification . . . . 239--268 Christian Grothoff and Krista Grothoff and Ryan Stutsman and Ludmila Alkhutova and Mikhail Atallah Translation-based steganography . . . . 269--303 Giovanni Vigna and Fredrik Valeur and Davide Balzarotti and William Robertson and Christopher Kruegel and Engin Kirda Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries . . . . . . . . . . . . 305--329 Haizhi Xu and Steve J. Chapin Address-space layout randomization using code islands . . . . . . . . . . . . . . 331--362
Bruno Blanchet Automatic verification of correspondences for security protocols 363--434 Stéphanie Delaune and Steve Kremer and Mark Ryan Verifying privacy-type properties of electronic voting protocols . . . . . . 435--487 Xuhua Ding and Gene Tsudik and Shouhuai Xu Leak-free mediated group signatures . . 489--514
Joshua D. Guttman Introduction . . . . . . . . . . . . . . 515--515 Andrei Sabelfeld and David Sands Declassification: Dimensions and principles . . . . . . . . . . . . . . . 517--548 Ana Almeida Matos and Gérard Boudol On declassification and the non-disclosure policy . . . . . . . . . 549--597 William L. Harrison and James Hook Achieving information flow security through monadic control of effects . . . 599--653 Michael R. Clarkson and Andrew C. Myers and Fred B. Schneider Quantifying information flow with beliefs . . . . . . . . . . . . . . . . 655--701 Dennis Hofheinz and Jörn Müller-Quade and Dominique Unruh Polynomial runtime in simulatability definitions . . . . . . . . . . . . . . 703--735 Pedro Adão and Gergei Bana and Jonathan Herzog and Andre Scedrov Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage . . . . . . 737--797 Massimo Bartoletti and Pierpaolo Degano and Gian Luigi Ferrari Planning and verifying service composition . . . . . . . . . . . . . . 799--837
Gilles Guette Automating trusted key rollover in DNSSEC . . . . . . . . . . . . . . . . . 839--854 Mila Dalla Preda and Roberto Giacobazzi Semantics-based code obfuscation by abstract interpretation . . . . . . . . 855--908 Bart Jacobs and Ichiro Hasuo Semantics and logic for security protocols . . . . . . . . . . . . . . . 909--944 Alberto Dainotti and Antonio Pescapé and Giorgio Ventre A cascade architecture for DoS attacks detection based on the wavelet transform 945--968 Anonymous Author Index Volume 17 (2009) . . . . . 969--971
Mário Campolargo JCS special issue on EU-funded ICT research on Trust and Security: Foreword ?? Jan Camenisch and Javier Lopez and Fabio Massacci and Massimo Ciscato and Thomas Skordas JCS special issue on EU-funded ICT research on Trust and Security . . . . . 1--5 André Bergholz and Jan De Beer and Sebastian Glahn and Marie-Francine Moens and Gerhard Paaß and Siehyun Strobel New filtering approaches for phishing email . . . . . . . . . . . . . . . . . 7--35 Mads Dam and Bart Jacobs and Andreas Lundblad and Frank Piessens Provably correct inline monitoring for multithreaded Java-like programs . . . . 37--59 Louis Salvail and Momtchil Peev and Eleni Diamanti and Romain Alléaume and Norbert Lütkenhaus and Thomas Länger Security of trusted repeater quantum key distribution networks . . . . . . . . . 61--87 Serdar Cabuk and Chris I. Dalton and Konrad Eriksson and Dirk Kuhlmann and HariGovind V. Ramasamy and Gianluca Ramunno and Ahmad-Reza Sadeghi and Matthias Schunter and Christian Stüble Towards automated security policy enforcement in multi-tenant virtual data centers . . . . . . . . . . . . . . . . 89--121 Claudio A. Ardagna and Jan Camenisch and Markulf Kohlweiss and Ronald Leenes and Gregory Neven and Bart Priem and Pierangela Samarati and Dieter Sommer and Mario Verdicchio Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project . . . . . . 123--160 Savvas Argyropoulos and Dimitrios Tzovaras and Dimosthenis Ioannidis and Yannis Damousis and Michael G. Strintzis and Martin Braun and Serge Boverie Biometric template protection in multimodal authentication systems based on error correcting codes . . . . . . . 161--185
Sushil Jajodia and Jon Millen Editorial . . . . . . . . . . . . . . . 187--187 Daniele Gorla and Catuscia Palamidessi Preface . . . . . . . . . . . . . . . . 189--189 Pasquale Malacaria Risk assessment of security threats for looping constructs . . . . . . . . . . . 191--228 Chiara Bodei and Linda Brodo and Pierpaolo Degano and Han Gao Detecting and preventing type flaws at static time . . . . . . . . . . . . . . 229--264 Sardaouna Hamadou and John Mullins Calibrating the power of schedulers for probabilistic polynomial-time calculus 265--316 Stéphanie Delaune and Steve Kremer and Mark D. Ryan Symbolic bisimulation for the applied pi calculus . . . . . . . . . . . . . . . . 317--377
Dimitrios Lekkas and Dimitris Gritzalis e-Passports as a means towards a Globally Interoperable Public Key Infrastructure . . . . . . . . . . . . . 379--396 Massimiliano Pala and Sean W. Smith Finding the PKI needles in the Internet haystack . . . . . . . . . . . . . . . . 397--420 Jiguo Li and Xinyi Huang and Yi Mu and Willy Susilo and Qianhong Wu Constructions of certificate-based signature secure against key replacement attacks . . . . . . . . . . . . . . . . 421--449 Chung Ki Li and Guomin Yang and Duncan S. Wong and Xiaotie Deng and Sherman S. M. Chow An efficient signcryption scheme with key privacy and its extension to ring signcryption . . . . . . . . . . . . . . 451--473 David W. Chadwick and Sean Antony and Rune Bjerk Instant certificate revocation and publication using WebDAV . . . . . . . . 475--496
Atsuhiro Goto Preface . . . . . . . . . . . . . . . . 497--497 Samir Saklikar and Subir Saha Identity Federation for VoIP systems . . 499--540 Adrian Baldwin and Marco Casassa Mont and Yolanta Beres and Simon Shiu Assurance for federated identity management . . . . . . . . . . . . . . . 541--572 Sebastian Mödersheim and Luca Vigan\`o and David Basin Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols . . . . . 575--618 Moritz Y. Becker and Cédric Fournet and Andrew D. Gordon SecPAL: Design and semantics of a decentralized authorization language . . 619--665
James R. Conrad and Jim Alves-Foss and Sauchi Stephen Lee Analyzing uncertainty in TG protection graphs with TG/MC . . . . . . . . . . . 667--699 Riccardo Pucella and Fred B. Schneider Independence from obfuscation: A semantic framework for diversity . . . . 701--749 Roberto Giacobazzi and Isabella Mastroeni Adjoining classified and unclassified information by abstract interpretation 751--797 Matthew Pirretti and Patrick Traynor and Patrick McDaniel and Brent Waters Secure attribute-based systems . . . . . 799--837 Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei Hierarchies of keys in secure multicast communications . . . . . . . . . . . . . 839--860 Nenad Jovanovic and Christopher Kruegel and Engin Kirda Static analysis for detecting taint-style vulnerabilities in web applications . . . . . . . . . . . . . . 861--907 Mathieu Baudet and Bogdan Warinschi and Martín Abadi Guessing attacks and the computational soundness of static equivalence . . . . 909--968
Riccardo Focardi Editorial . . . . . . . . . . . . . . . 969--969 Frédéric Besson and Guillaume Dufay and Thomas Jensen and David Pichardie Verifying resource access control on mobile interactive devices . . . . . . . 971--998 Steve Kremer and Laurent Mazaré Computationally sound analysis of protocols using bilinear pairings . . . 999--1033 Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell Inductive trace properties for computational security . . . . . . . . . 1035--1073 Andrei Sabelfeld Preface . . . . . . . . . . . . . . . . 1075--1075 Michael Backes and Dominique Unruh Computational soundness of symbolic zero-knowledge proofs . . . . . . . . . 1077--1155 Michael R. Clarkson and Fred B. Schneider Hyperproperties . . . . . . . . . . . . 1157--1210 Stéphanie Delaune and Steve Kremer and Graham Steel Formal security analysis of PKCS#11 and proprietary extensions . . . . . . . . . 1211--1245 Jean Goubault-Larrecq Finite models for formal security proofs 1247--1299 Anonymous Author Index Volume 18 (2010) . . . . . 1301--1305
Boris Köpf and David Basin Automatically deriving information-theoretic bounds for adaptive side-channel attacks . . . . . 1--31 Lawrence A. Gordon and Martin P. Loeb and Lei Zhou The impact of information security breaches: Has there been a downward shift in costs? . . . . . . . . . . . . 33--56 David DeAngelis and K. Suzanne Barber Security applications of trust in multi-agent systems . . . . . . . . . . 57--99 Deepak D'Souza and Raveendra Holla and K. R. Raghavendra and Barbara Sprick Model-checking trace-based information flow properties . . . . . . . . . . . . 101--138 L. H. Nguyen and A. W. Roscoe Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey . . . . . . . . . . . 139--201 Anshuman Sinha A survey of system security in contactless electronic passports . . . . 203--226
Yingjiu Li and Jianying Zhou Guest Editors' preface . . . . . . . . . 227--228 Basel Alomair and Loukas Lazos and Radha Poovendran Securing low-cost RFID systems: An unconditionally secure approach . . . . 229--257 Gerhard P. Hancke Practical eavesdropping and skimming attacks on high-frequency RFID tokens 259--288 Gildas Avoine and Muhammed Ali Bingöl and Süleyman Karda\cs and Cédric Lauradoux and Benjamin Martin A framework for analyzing RFID distance bounding protocols . . . . . . . . . . . 289--317 Ching Yu Ng and Willy Susilo and Yi Mu and Rei Safavi-Naini Practical RFID ownership transfer scheme 319--341 Tzipora Halevi and Nitesh Saxena and Shai Halevi Tree-based HB protocols for privacy-preserving authentication of RFID tags . . . . . . . . . . . . . . . 343--363
Vijay Atluri Preface . . . . . . . . . . . . . . . . 365--365 Changyu Dong and Giovanni Russello and Naranker Dulay Shared and searchable encrypted data for untrusted servers . . . . . . . . . . . 367--397 Manachai Toahchoodee and Indrakshi Ray On the formalization and analysis of a spatio-temporal role-based access control model . . . . . . . . . . . . . 399--452 Xiaoyun He and Haibing Lu and Jaideep Vaidya and Nabil Adam Secure construction and publication of contingency tables from distributed data 453--484 Jaideep Vaidya and Ehud Gudes Introduction . . . . . . . . . . . . . . 485--486 Joachim Biskup and Christian Gogolin and Jens Seiler and Torben Weibert Inference-proof view update transactions with forwarded refreshments . . . . . . 487--529 Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati Selective data outsourcing for enforcing privacy . . . . . . . . . . . . . . . . 531--566 Simon N. Foley and William M. Fitzgerald Management of security policy configuration using a Semantic Threat Graph approach . . . . . . . . . . . . . 567--605 Heechang Shin and Vijayalakshmi Atluri and June-suh Cho Efficiently enforcing spatiotemporal access control under uncertain location information . . . . . . . . . . . . . . 607--637
Konrad Rieck and Philipp Trinius and Carsten Willems and Thorsten Holz Automatic analysis of malware behavior using machine learning . . . . . . . . . 639--668 P. C. van Oorschot and Julie Thorpe Exploiting predictability in click-based graphical passwords . . . . . . . . . . 669--702 Mohammad Mannan and P. C. van Oorschot Leveraging personal devices for stronger password authentication from untrusted computers . . . . . . . . . . . . . . . 703--750 Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati Authorization enforcement in distributed query evaluation . . . . . . . . . . . . 751--794
Heechang Shin and Jaideep Vaidya and Vijayalakshmi Atluri A profile anonymization model for location-based services . . . . . . . . 795--833 Dimitris Gritzalis and Giannis Marias and Yacine Rebahi and Yannis Soupionis and Sven Ehlert SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT) . . . . . . . . . . . . . . . . . 835--867 Francis Hsu and Hao Chen and Sridhar Machiraju WebCallerID: Leveraging cellular networks for Web authentication . . . . 869--893 Reza Curtmola and Juan Garay and Seny Kamara and Rafail Ostrovsky Searchable symmetric encryption: Improved definitions and efficient constructions . . . . . . . . . . . . . 895--934 Rinku Dewri and Indrajit Ray and Indrakshi Ray and Darrell Whitley Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization . . . 935--974 Allaa Kamil and Gavin Lowe Analysing TLS in the strand spaces model 975--1025
Dimitris Gritzalis Guest Editor's Preface . . . . . . . . . 1027--1028 Hirotoshi Yasuoka and Tachio Terauchi On bounding problems of quantitative information flow . . . . . . . . . . . . 1029--1082 Chao Zhang and Wei Zou and Tielei Wang and Yu Chen and Tao Wei Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat . . . . . . . . . . . . . . . . . 1083--1107 Robert H. Deng and Yingjiu Li and Moti Yung and Yunlei Zhao A zero-knowledge based framework for RFID privacy . . . . . . . . . . . . . . 1109--1146 Rishab Nithyanand and Gene Tsudik and Ersin Uzun User-aided reader revocation in PKI-based RFID systems . . . . . . . . . 1147--1172 Anonymous Author Index Volume 19 (2011) . . . . . 1173--1176
Alessandro Armando and Gavin Lowe Preface . . . . . . . . . . . . . . . . 1--1 Mário S. Alvim and Miguel E. Andrés and Catuscia Palamidessi Quantitative information flow in interactive systems . . . . . . . . . . 3--50 Nataliia Bielova and Fabio Massacci Iterative enforcement by suppression: Towards practical enforcement theories 51--79 Gabriele Costa and Pierpaolo Degano and Fabio Martinelli Modular plans for secure service composition . . . . . . . . . . . . . . 81--117
Hongbin Zhou and Simon N. Foley Fast automatic security protocol generation . . . . . . . . . . . . . . . 119--167 Natalia Stakhanova and Chris Strasburg and Samik Basu and Johnny S. Wong Towards cost-sensitive assessment of intrusion response selection . . . . . . 169--198 Brian M. Bowen and Vasileios P. Kemerlis and Pratap Prabhu and Angelos D. Keromytis and Salvatore J. Stolfo A system for generating and injecting indistinguishable network decoys . . . . 199--221 Gail-Joon Ahn and Jing Jin and Mohamed Shehab Policy-driven role-based access management for ad-hoc collaboration . . 223--257 Marina Blanton and Mehrdad Aliasgari Secure outsourced computation of iris matching . . . . . . . . . . . . . . . . 259--305
Gilles Barthe and Jorge Cuellar and Javier Lopez and Alexander Pretschner Preface . . . . . . . . . . . . . . . . 307--308 Alessandro Armando and Silvio Ranise Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving . . . . . . . . 309--352 Deepak Garg and Frank Pfenning Stateful authorization logic --- Proof theory and a case study . . . . . . . . 353--391 Michele Bezzi and Sabrina De Capitani di Vimercati and Sara Foresti and Giovanni Livraga and Pierangela Samarati and Roberto Sassi Modeling and preventing inferences from sensitive value distributions in data release . . . . . . . . . . . . . . . . 393--436 Yanjie Sun and Chenyi Zhang and Jun Pang and Baptiste Alcalde and Sjouke Mauw A trust-augmented voting scheme for collaborative privacy management . . . . 437--459
Yingjiu Li Guest Editor's Preface . . . . . . . . . 461--462 Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Giovanni Livraga and Pierangela Samarati An OBDD approach to enforce confidentiality and visibility constraints in data publishing . . . . . 463--508 Joachim Biskup Dynamic policy adaptation for inference control of queries to a propositional information system . . . . . . . . . . . 509--546 Raman Adaikkalavan and Xing Xie and Indrakshi Ray Multilevel secure data stream processing: Architecture and implementation . . . . . . . . . . . . . 547--581 Yuan Hong and Jaideep Vaidya and Haibing Lu Secure and efficient distributed linear programming . . . . . . . . . . . . . . 583--634
Andrew Myers and Michael Backes Preface . . . . . . . . . . . . . . . . 635--636 Stephen Chong Required information release . . . . . . 637--676 Moritz Y. Becker Information flow in trust management systems . . . . . . . . . . . . . . . . 677--708 Ralf Küsters and Tomasz Truderung and Andreas Vogt A game-based definition of coercion resistance and its applications . . . . 709--764 Anonymous Author Index Volume 20 (2012) . . . . . 765--767
Mohammad H. Yarmand and Kamran Sartipi and Douglas G. Down Behavior-based access control for distributed healthcare systems . . . . . 1--39 Simon Meier and Cas Cremers and David Basin Efficient construction of machine-checked symbolic protocol security proofs . . . . . . . . . . . . 41--87 Véronique Cortier and Ben Smyth Attacking and fixing Helios: An analysis of ballot secrecy . . . . . . . . . . . 89--148 Frédéric Cuppens and Nora Cuppens-Boulahia and Yehia Elrakaiby Formal specification and management of security policies with collective group obligations . . . . . . . . . . . . . . 149--190
Arturo Geigel Neural network Trojan . . . . . . . . . 191--232 Dhananjay Phatak and Alan T. Sherman and Nikhil Joshi and Bhushan Sonawane and Vivek G. Relan and Amol Dawalbhakta Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense . . . . . . . . . . . . . . 233--281 Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design . . . . . . . . . . . . . 283--315
Murtuza Jadliwala and Igor Bilogrevic and Jean-Pierre Hubaux Optimizing mix-zone coverage in pervasive wireless networks . . . . . . 317--346 Alfred Kobsa and Rishab Nithyanand and Gene Tsudik and Ersin Uzun Can Jannie verify? Usability of display-equipped RFID tags for security purposes . . . . . . . . . . . . . . . . 347--370 Gunnar Kreitz Flow stealing: A well-timed redirection attack . . . . . . . . . . . . . . . . . 371--391 Amir Herzberg and Ronen Margulies Forcing Johnny to login safely . . . . . 393--424 Sabrina De Capitani di Vimercati and Sara Foresti and Stefano Paraboschi and Gerardo Pelosi and Pierangela Samarati Supporting concurrency and multiple indexes in private access to outsourced data . . . . . . . . . . . . . . . . . . 425--461
Piotr Mardziel and Stephen Magill and Michael Hicks and Mudhakar Srivatsa Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation . . . . . . . . 463--532 Fangfei Zhou and Manish Goel and Peter Desnoyers and Ravi Sundaram Scheduler vulnerabilities and coordinated attacks in cloud computing 533--559 John Homer and Su Zhang and Xinming Ou and David Schmidt and Yanhui Du and S. Raj Rajagopalan and Anoop Singhal Aggregating vulnerability metrics in enterprise networks using attack graphs 561--597
Ivan Visconti Special Issue: Advances in Security for Communication Networks . . . . . . . . . 599--600 Joshua Baron and Karim El Defrawy and Kirill Minkovich and Rafail Ostrovsky and Eric Tressler 5PM: Secure pattern matching . . . . . . 601--625 Olivier Blazy and Georg Fuchsbauer and David Pointcheval and Damien Vergnaud Short blind signatures . . . . . . . . . 627--661 Craig Gentry and Shai Halevi and Chris Peikert and Nigel P. Smart Field switching in BGV-style homomorphic encryption . . . . . . . . . . . . . . . 663--684 Helger Lipmaa and Bingsheng Zhang A more efficient computationally sound non-interactive zero-knowledge shuffle argument . . . . . . . . . . . . . . . . 685--719 Steven Myers and Mona Sergi and abhi shelat Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness . . . . . . . . 721--748 Juan González Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila Publicly verifiable ciphertexts . . . . 749--778
Pierpaolo Degano and Joshua D. Guttman Preface . . . . . . . . . . . . . . . . 779--780 Miriam Paiola and Bruno Blanchet Verification of security protocols with lists: From length one to unbounded length . . . . . . . . . . . . . . . . . 781--816 David Basin and Cas Cremers and Simon Meier Provably repairing the ISO/IEC 9798 standard for entity authentication . . . 817--846 Myrto Arapinis and Sergiu Bursuc and Mark Ryan Privacy-supporting cloud computing by in-browser key translation . . . . . . . 847--880 Gilles Barthe and Benjamin Grégoire and Sylvain Heraud and Federico Olmedo and Santiago Zanella-Béguelin Verified indifferentiable hashing into elliptic curves . . . . . . . . . . . . 881--917 Umut A. Acar and Amal Ahmed and James Cheney and Roly Perera A core calculus for provenance . . . . . 919--969 Matteo Centenaro and Riccardo Focardi and Flaminia L. Luccio Type-based analysis of key management in PKCS#11 cryptographic devices . . . . . 971--1007 Anonymous Author Index Volume 21 (2013) . . . . . 1009--1012
Haibing Lu and Jaideep Vaidya and Vijayalakshmi Atluri An optimization framework for role mining . . . . . . . . . . . . . . . . . 1--31 Tsz Hon Yuen and Willy Susilo and Yi Mu Towards a cryptographic treatment of publish/subscribe systems . . . . . . . 33--67 Jianwei Niu and Mark Reith and William H. Winsborough Formal verification of security properties in trust management policy 69--153 Sai Teja Peddinti and Nitesh Saxena Web search query privacy: Evaluating query obfuscation and anonymizing networks . . . . . . . . . . . . . . . . 155--199
Konstantinos Chatzikokolakis and Sebastian Alexander Mödersheim and Catuscia Palamidessi and Jun Pang Foundational aspects of security . . . . 201--202 Joshua D. Guttman Establishing and preserving protocol security goals . . . . . . . . . . . . . 203--267 Tri Minh Ngo and Mariëlle Stoelinga and Marieke Huisman Effective verification of confidentiality for multi-threaded programs . . . . . . . . . . . . . . . . 269--300 Michael Backes and C\uat\ualin Hri\ctcu and Matteo Maffei Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations . . 301--353
Carlo Blundo and Emiliano De Cristofaro and Paolo Gasti EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity . . 355--381 Yannis Soupionis and Remous-Aris Koutsiamanis and Pavlos Efraimidis and Dimitris Gritzalis A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication . . . . . . 383--413 Prithvi Bisht and Timothy Hinrichs and Nazari Skrupsky and V. N. Venkatakrishnan Automated detection of parameter tampering opportunities and vulnerabilities in web applications . . 415--465
Lieven Desmet and Martin Johns and Benjamin Livshits and Andrei Sabelfeld Preface . . . . . . . . . . . . . . . . 467--468 Willem De Groef and Dominique Devriese and Nick Nikiforakis and Frank Piessens Secure multi-execution of web scripts: Theory and practice . . . . . . . . . . 469--509 Joe Gibbs Politz and Arjun Guha and Shriram Krishnamurthi Typed-based verification of Web sandboxes . . . . . . . . . . . . . . . 511--565 M. Heiderich and M. Niemietz and F. Schuster and T. Holz and J. Schwenk Scriptless attacks: Stealing more pie without touching the sill . . . . . . . 567--599 Chetan Bansal and Karthikeyan Bhargavan and Antoine Delignat-Lavaud and Sergio Maffeis Discovering concrete attacks on website authorization by formal analysis . . . . 601--657
Michael Backes and Steve Zdancewic Message from the Guest Editors . . . . . 659--660 David Basin and Samuel J. Burri and Günter Karjoth Obstruction-free authorization enforcement: Aligning security and business objectives . . . . . . . . . . 661--698 Cole Schlesinger and Karthik Pattabiraman and Nikhil Swamy and David Walker and Benjamin Zorn Modular protections against non-control data attacks . . . . . . . . . . . . . . 699--742 Myrto Arapinis and Joshua Phillips and Eike Ritter and Mark D. Ryan StatVerif: Verification of stateful processes . . . . . . . . . . . . . . . 743--821 François Dupressoir and Andrew D. Gordon and Jan Jürjens and David A. Naumann Guiding a general-purpose C verifier to prove cryptographic protocols . . . . . 823--866
Joseph A. Akinyele and Matthew Green and Susan Hohenberger and Matthew Pagano Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes . . . . . . . 867--912 Johannes Braun and Florian Volk and Jiska Classen and Johannes Buchmann and Max Mühlhäuser CA trust management for the Web PKI . . 913--959 Emre Uzun and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural and Anna Lisa Ferrara and Gennaro Parlato and P. Madhusudan Security analysis for temporal role based access control . . . . . . . . . . 961--996 Yen-Chung Chen and Yu-Sung Wu and Wen-Guey Tzeng Preserving user query privacy in cloud-based security services . . . . . 997--1024 Nicolas Buchmann and Harald Baier Towards a more secure and scalable verifying PKI of eMRTD . . . . . . . . . 1025--1049 Anonymous Author Index Volume 22 (2014) . . . . . 1051--1054
Ping Yang and Mikhail I. Gofman and Scott D. Stoller and Zijiang Yang Policy analysis for administrative role based access control without separate administration . . . . . . . . . . . . . 1--29 Barsha Mitra and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya The generalized temporal role mining problem . . . . . . . . . . . . . . . . 31--58 Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati Loose associations to increase utility in data publishing . . . . . . . . . . . 59--88 Bechara Al Bouna and Chris Clifton and Qutaibah Malluhi Anonymizing transactional datasets . . . 89--106 Haibing Lu and Yuan Hong and Yanjiang Yang and Lian Duan and Nazia Badar Towards user-oriented RBAC model . . . . 107--129
Wen Ming Liu and Lingyu Wang and Lei Zhang and Shunzhi Zhu $k$-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure . . . . 131--165 Adam Bates and Kevin R. B. Butler and Micah Sherr and Clay Shields and Patrick Traynor and Dan Wallach Accountable wiretapping --- or --- I know they can hear you now . . . . . . . 167--195 Ron van der Meyden What, indeed, is intransitive noninterference? . . . . . . . . . . . . 197--228 Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay Practical and provably secure distance-bounding . . . . . . . . . . . 229--257
Thomas Gibson-Robinson and Allaa Kamil and Gavin Lowe Verifying layered security protocols . . 259--307 Christos Dimitrakakis and Aikaterini Mitrokotsa and Serge Vaudenay Expected loss analysis for authentication in constrained channels 309--329 David Cadé and Bruno Blanchet Proved generation of implementations from computationally secure protocol specifications . . . . . . . . . . . . . 331--402 Jiawei Yuan and Shucheng Yu PCPOR: Public and constant-cost proofs of retrievability in cloud1 . . . . . . 403--425
Mário S. Alvim and Miguel E. Andrés and Konstantinos Chatzikokolakis and Pierpaolo Degano and Catuscia Palamidessi On the information leakage of differentially-private mechanisms . . . 427--469 Shiuan-Tzuo Shen and Wen-Guey Tzeng Delegated integrity check for hierarchical cloud data . . . . . . . . 471--508 Michele Bugliesi and Stefano Calzavara and Riccardo Focardi and Wilayat Khan CookiExt: Patching the browser against session hijacking attacks . . . . . . . 509--537
Luca Spalazzi and Luca Vigan\`o Special issue on security and high performance computing systems . . . . . 539--540 Jason Lowden and Marcin \Lukowiak and Sonia Lopez Alarcon Design and performance analysis of efficient Keccak tree hashing on GPU architectures . . . . . . . . . . . . . 541--562 Giampaolo Bella and Paul Curzon and Gabriele Lenzini Service security and privacy as a socio-technical problem . . . . . . . . 563--585 Jannik Dreier and Jean-Guillaume Dumas and Pascal Lafourcade Brandt's fully private auction protocol revisited . . . . . . . . . . . . . . . 587--610 Alessio Merlo and Mauro Migliardi and Paolo Fontanelli Measuring and estimating power consumption in Android to support energy-based intrusion detection . . . . 611--637 Anonymous Regular Paper Section . . . . . . . . . 639--639 Sergey Belim and Nadezda Bogachenko and Evgeniy Ilushechkin An analysis of graphs that represent a role-based security policy hierarchy . . 641--657
Jin Li and Xiaofeng Chen and Jingwei Li and Chunfu Jia and Jianfeng Ma and Wenjing Lou New access control systems based on outsourced attribute-based encryption 659--683 Ali Alshehri and Steve Schneider A formal framework for security analysis of NFC mobile coupon protocols . . . . . 685--707 Piero Bonatti and Clemente Galdi and Davide Torres Event-driven RBAC . . . . . . . . . . . 709--757 Yannis Mallios and Lujo Bauer and Dilsun Kaynar and Fabio Martinelli and Charles Morisset Probabilistic cost enforcement of security policies . . . . . . . . . . . 759--787 Anonymous Author Index Volume 23 (2015) . . . . . 789--791
Florian Böhl and Dominique Unruh Symbolic universal composability . . . . 1--38 Willard Rafnsson and Andrei Sabelfeld Secure multi-execution: Fine-grained, declassification-aware, and transparent 39--90 Zhengqin Luo and José Fragoso Santos and Ana Almeida Matos and Tamara Rezk Mashic compiler: Mashup sandboxing based on inter-frame communication . . . . . . 91--136
Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler Secure outsourced garbled circuit evaluation for mobile devices . . . . . 137--180 Daniel Hedin and Luciano Bello and Andrei Sabelfeld Information-flow security for JavaScript and its APIs . . . . . . . . . . . . . . 181--234 Claudio Taglienti and James Cannady The user attribution problem and the challenge of persistent surveillance of user activity in complex networks . . . 235--288 Yu Chen and Zongyang Zhang Publicly evaluable pseudorandom functions and their applications . . . . 289--320
Sokratis Vavilis and Milan Petkovi\'c and Nicola Zannone A severity-based quantification of data leakages in database systems . . . . . . 321--345 Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati Efficient integrity checks for join queries in the cloud . . . . . . . . . . 347--378 Meixing Le and Krishna Kant and Malek Athamnah and Sushil Jajodia Minimum cost rule enforcement for cooperative database access . . . . . . 379--403
Yiming Jing and Gail-Joon Ahn and Hongxin Hu and Haehyun Cho and Ziming Zhao TripleMon: A multi-layer security framework for mediating inter-process communication on Android . . . . . . . . 405--426 Chiara Bodei and Pierpaolo Degano and Letterio Galletta and Francesco Salvatori Context-aware security: Linguistic mechanisms and static analysis . . . . . 427--477 Giovanni Di Crescenzo and Debra L. Cook and Allen McIntosh and Euthimios Panagos Practical and privacy-preserving information retrieval from a database table . . . . . . . . . . . . . . . . . 479--506 Debabrata Kar and Suvasini Panigrahi and Srikanth Sundararajan SQLiDDS: SQL injection detection using document similarity measure . . . . . . 507--539
Martin Lester and Luke Ong and Max Schäfer Information flow analysis for a dynamically typed language with staged metaprogramming . . . . . . . . . . . . 541--582 Steve Kremer and Robert Künnemann Automated analysis of security protocols with global state . . . . . . . . . . . 583--616 Deepak D'Souza and K. R. Raghavendra Model-checking trace-based information flow properties for infinite-state systems . . . . . . . . . . . . . . . . 617--643 John Sonchack and Adam J. Aviv Exploring large scale security system reproducibility with the LESS simulator 645--665
Michal Davidson and Tamir Tassa and Ehud Gudes Content sharing schemes in DRM systems with enhanced performance and privacy preservation . . . . . . . . . . . . . . 667--688 Arthur Azevedo de Amorim and Nathan Collins and André DeHon and Delphine Demange and C\uat\ualin Hri\ctcu and David Pichardie and Benjamin C. Pierce and Randy Pollack and Andrew Tolmach A verified information-flow architecture 689--734 Sushil Jajodia and Noseong Park and Edoardo Serra and V. S. Subrahmanian Using temporal probabilistic logic for optimal monitoring of security events with limited resources . . . . . . . . . 735--791 Roberto Guanciale and Hamed Nemati and Mads Dam and Christoph Baumann Provably secure memory isolation for Linux on ARM . . . . . . . . . . . . . . 793--837 Anonymous Author Index Volume 24 (2016) . . . . . 839--841
Joseph Y. Halpern From qualitative to quantitative proofs of security properties using first-order conditional logic . . . . . . . . . . . 1--19 Véronique Cortier and Cyrille Wiedling A formal analysis of the Norwegian E-voting protocol . . . . . . . . . . . 21--57 Stefan Wüller and Daniel Mayer and Fabian Förg and Samuel Schüppen and Benjamin Assadsolimani and Ulrike Meyer and Susanne Wetzel Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques 59--81 Jason Crampton and Gregory Gutin and Daniel Karapetyan and Rémi Watrigant The bi-objective workflow satisfiability problem and workflow resiliency . . . . 83--115
Andrea Continella and Michele Carminati and Mario Polino and Andrea Lanzi and Stefano Zanero and Federico Maggi Prometheus: Analyzing WebInject-based information stealers . . . . . . . . . . 117--137 Albert Guan and Wen-Guey Tzeng A secret key establishment protocol for wireless networks using noisy channels 139--151 Chung-Yi Lin and Wen-Guey Tzeng Strategy analysis for cloud storage reliability management based on game theory . . . . . . . . . . . . . . . . . 153--171 Daniel Migault and Tobias Guggemos and Sylvain Killian and Maryline Laurent and Guy Pujolle and Jean Philippe Wary Diet-ESP: IP layer security for IoT . . 173--203
Manar Mohamed and Song Gao and Niharika Sachdeva and Nitesh Saxena and Chengcui Zhang and Ponnurangam Kumaraguru and Paul C. Van Oorschot On the security and usability of dynamic cognitive game CAPTCHAs . . . . . . . . 205--230 Yao Cheng and Yingjiu Li and Robert Deng and Lingyun Ying and Wei He A study on a feasible no-root approach on Android . . . . . . . . . . . . . . . 231--253 Daniel Ricardo dos Santos and Silvio Ranise and Luca Compagna and Serena Elisa Ponta Automatically finding execution scenarios to deploy security-sensitive workflows . . . . . . . . . . . . . . . 255--282 Euijin Choo and Ting Yu and Min Chi Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis . . . . . . . . . 283--318
Toby Murray and Andrei Sabelfeld and Lujo Bauer Special issue on verified information flow security . . . . . . . . . . . . . 319--321 Niklas Broberg and Bart van Delft and David Sands Paragon --- Practical programming with information flow control . . . . . . . . 323--365 Jed Liu and Owen Arden and Michael D. George and Andrew C. Myers Fabric: Building open distributed systems securely by construction . . . . 367--426 Daniel Giffin and Amit Levy and Deian Stefan and David Terei and David Mazi\`eres and John Mitchell and Alejandro Russo Hails: Protecting data privacy in untrusted web applications . . . . . . . 427--461
Marco Rocchetto and Luca Vigan\`o and Marco Volpe An interpolation-based method for the verification of security protocols . . . 463--510 Jason Crampton and Naomi Farley and Gregory Gutin and Mark Jones and Bertram Poettering Cryptographic enforcement of information flow policies without public information via tree partitions . . . . . . . . . . 511--535 Bo Chen and Reza Curtmola Remote data integrity checking with server-side repair . . . . . . . . . . . 537--584 Max Kanovich and Tajana Ban Kirigin and Vivek Nigam and Andre Scedrov and Carolyn Talcott Time, computational complexity, and probability in the analysis of distance-bounding protocols . . . . . . 585--630 Anonymous Author Index Volume 25 (2017) . . . . . 631--633
Tarik Moataz and Indrajit Ray and Indrakshi Ray and Abdullatif Shikfa and Frédéric Cuppens and Nora Cuppens Substring search over encrypted data . . 1--30 Mila Dalla Preda and Isabella Mastroeni Characterizing a property-driven obfuscation strategy . . . . . . . . . . 31--69 Christoph Sprenger and David Basin Refining security protocols . . . . . . 71--120 Scott D. Stoller and Thang Bui Mining hierarchical temporal roles with multiple metrics . . . . . . . . . . . . 121--142
Sabrina De Capitani di Vimercati and Sara Foresti and Stefano Paraboschi and Gerardo Pelosi and Pierangela Samarati Enforcing authorizations while protecting access confidentiality . . . 143--175 Silvie Levy and Ehud Gudes and Nurit Gal-Oz Sharing-habits based privacy control in social networks . . . . . . . . . . . . 177--205 Ultan Neville and Simon N. Foley Reasoning about firewall policies through refinement and composition . . . 207--254 Haritabh Gupta and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya A side-channel attack on smartphones: Deciphering key taps using built-in microphones . . . . . . . . . . . . . . 255--281
Wenrui Diao and Rui Liu and Xiangyu Liu and Zhe Zhou and Zhou Li and Kehuan Zhang Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks . . . . . . . . . . . 283--309 Maliheh Shirvanian and Nitesh Saxena and Dibya Mukhopadhyay Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines . . . . . . . . . . 311--333 Simon Bischof and Joachim Breitner and Jürgen Graf and Martin Hecker and Martin Mohr and Gregor Snelting Low-deterministic security for low-nondeterministic programs . . . . . 335--366 Bruno Blanchet and Ben Smyth Automated reasoning for equivalences in the applied pi calculus with barriers 367--422
Silvio Ranise and Anh Truong and Luca Vigan\`o Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies . . . . . . . . . 423--458 Binh Thanh Nguyen and Christoph Sprenger and Cas Cremers Abstractions for security protocol verification . . . . . . . . . . . . . . 459--508 Rosario Giustolisi and Giampaolo Bella and Gabriele Lenzini Invalid certificates in modern browsers: a socio-technical analysis . . . . . . . 509--541 Kiran S. Balagani and Paolo Gasti and Aaron Elliott and Azriel Richardson and Mike O'Neal The impact of application context on privacy and performance of keystroke authentication systems . . . . . . . . . 543--556 Per Hallgren and Ravi Kishore and Martín Ochoa and Andrei Sabelfeld Assuring BetterTimes . . . . . . . . . . 557--587
Patrick Luckett and J. Todd McDonald and William B. Glisson and Ryan Benton and Joel Dawson and Blair A. Doyle Identifying stealth malware using CPU power consumption and learning algorithms . . . . . . . . . . . . . . . 589--613 Tanmoy Chakraborty and Sushil Jajodia and Noseong Park and Andrea Pugliese and Edoardo Serra and V. S. Subrahmanian Hybrid adversarial defense: Merging honeypots and traditional security methods . . . . . . . . . . . . . . . . 615--645 Ling Chen and Ting Yu and Rada Chirkova $k$-Skyband query answering with differential privacy . . . . . . . . . . 647--676 Benny Fuhry and Raad Bahmani and Ferdinand Brasser and Florian Hahn and Florian Kerschbaum and Ahmad-Reza Sadeghi HardIDX: Practical and secure index with SGX in a malicious environment . . . . . 677--706 Jin Han and Wangyu Zang and Li Liu and Songqing Chen and Meng Yu Risk-aware multi-objective optimized virtual machine placement in the cloud 707--730
David Lorenzi and Emre Uzun and Jaideep Vaidya and Shamik Sural and Vijayalakshmi Atluri Towards designing robust CAPTCHAs . . . 731--760 Daniel Borbor and Lingyu Wang and Sushil Jajodia and Anoop Singhal Surviving unpatchable vulnerabilities through heterogeneous network hardening options . . . . . . . . . . . . . . . . 761--789 Jun Zhang and Meiqi He and Gongxian Zeng and Siu-Ming Yiu Privacy-preserving verifiable elastic net among multiple institutions in the cloud . . . . . . . . . . . . . . . . . 791--815 Alessandro Barenghi and Nicholas Mainardi and Gerardo Pelosi Systematic parsing of X.509: Eradicating security issues with a parse tree . . . 817--849
Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schröder Group ORAM for privacy and access control in outsourced personal records 1--47 Sébastien Salva and Loukmen Regainia A catalogue associating security patterns and attack steps to design secure applications . . . . . . . . . . 49--74 Grégory Demay and Peter Ga\vzi and Ueli Maurer and Björn Tackmann Per-session security: Password-based cryptography revisited . . . . . . . . . 75--111 Frederik Armknecht and Zinaida Benenson and Philipp Morgner and Christian Müller and Christian Riess Privacy implications of room climate data . . . . . . . . . . . . . . . . . . 113--136 Sandrine Blazy and David Pichardie and Alix Trieu Verifying constant-time implementations by abstract interpretation . . . . . . . 137--163
Suryadipta Majumdar and Azadeh Tabiban and Yosr Jarraya and Momen Oqaily and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi Learning probabilistic dependencies among events for proactive security auditing in clouds . . . . . . . . . . . 165--202 Cas Cremers and Martin Dehnel-Wild and Kevin Milner Secure authentication in the grid: a formal analysis of DNP3 SAv5 . . . . . . 203--232 Stefano Calzavara and Alvise Rabitti and Michele Bugliesi Sub-session hijacking on the web: Root causes and prevention . . . . . . . . . 233--257 Yangguang Tian and Yingjiu Li and Guomin Yang and Willy Susilo and Yi Mu and Hui Cui and Yinghui Zhang DABKE: Secure deniable attribute-based key exchange framework . . . . . . . . . 259--275
Lucca Hirschi and David Baelde and Stéphanie Delaune A method for unbounded verification of privacy-type properties . . . . . . . . 277--342 Matteo Zavatteri and Luca Vigan\`o Last man standing: Static, decremental and dynamic resiliency via controller synthesis . . . . . . . . . . . . . . . 343--373 Xingjie Yu and Michael Shiwen Thang and Yingjiu Li and Robert Huijie Deng Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin . . . . . . . . . . . . . . . 375--403
Kiran Balagani and Matteo Cardaioli and Mauro Conti and Paolo Gasti and Martin Georgiev and Tristan Gurtler and Daniele Lain and Charissa Miller and Kendall Molas and Nikita Samarin and Eugen Saraci and Gene Tsudik and Lynn Wu PILOT: Password and PIN information leakage from obfuscated typing videos 405--425 Nawaf Alhebaishi and Lingyu Wang and Sushil Jajodia and Anoop Singhal Mitigating the insider threat of remote administrators in clouds through maintenance task assignments . . . . . . 427--458 Tobias Urban and Dennis Tatang and Thorsten Holz and Norbert Pohlmann Analyzing leakage of personal information by malware . . . . . . . . . 459--481 Gunjan Batra and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural Deploying ABAC policies using RBAC systems . . . . . . . . . . . . . . . . 483--506
George Stergiopoulos and Georgia Chronopoulou and Evangelos Bitsikas and Nikolaos Tsalis and Dimitris Gritzalis Using side channel TCP features for real-time detection of malware connections . . . . . . . . . . . . . . 507--520 Juan E. Rubio and Rodrigo Roman and Cristina Alcaraz and Yan Zhang Tracking APTs in industrial ecosystems: a proof of concept . . . . . . . . . . . 521--546 Ziqiang Ma and Quanwei Cai and Jingqiang Lin and Bo Luo and Jiwu Jing Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers . . . . . . . . . . . . . 547--580