You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly.
Go to headerGo to navigationGo to searchGo to contentsGo to footer
In content section. Select this link to jump to navigation

Author Index Volume 23 (2015)

AL Bouna, B., C. Clifton and Q. Malluhi,  Anonymizing transactional datasets (1) 89–106

Alshehri, A. and S. Schneider,  A formal framework for security analysis of NFC mobile coupon protocols (6) 685–707

Alvim, M.S., M.E. Andrés, K. Chatzikokolakis, P. Degano and C. Palamidessi,  On the information leakage of differentially-private mechanisms (4) 427–469

Andrés, M.E.,  see Alvim, M.S. (4) 427–469

Atluri, V.,  see Mitra, B. (1) 31– 58

Badar, N.,  see Lu, H. (1) 107–129

Bates, A., K.R.B. Butler, M. Sherr, C. Shields, P. Traynor and D. Wallach,  Accountable wiretapping – or – I know they can hear you now (2) 167–195

Bauer, L.,  see Mallios, Y. (6) 759–787

Belim, S., N. Bogachenko and E. Ilushechkin,  An analysis of graphs that represent a role-based security policy hierarchy (5) 641–657

Bella, G., P. Curzon and G. Lenzini,  Service security and privacy as a socio-technical problem (5) 563–585

Blanchet, B.,  see Cadé, D. (3) 331–402

Bogachenko, N.,  see Belim, S. (5) 641–657

Bonatti, P., C. Galdi and D. Torres,  Event-driven RBAC (6) 709–757

Boureanu, I., A. Mitrokotsa and S. Vaudenay,  Practical and provably secure distance-bounding (2) 229–257

Bugliesi, M., S. Calzavara, R. Focardi and W. Khan,  CookiExt: Patching the browser against session hijacking attacks (4) 509–537

Butler, K.R.B.,  see Bates, A. (2) 167–195

Cadé, D. and B. Blanchet,  Proved generation of implementations from computationally secure protocol specifications (3) 331–402

Calzavara, S.,  see Bugliesi, M. (4) 509–537

Chatzikokolakis, K.,  see Alvim, M.S. (4) 427–469

Chen, X.,  see Li, J. (6) 659–683

Clifton, C.,  see AL Bouna, B. (1) 89–106

Curzon, P.,  see Bella, G. (5) 563–585

De Capitani di Vimercati, S., S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi and P. Samarati,  Loose associations to increase utility in data publishing (1) 59– 88

Degano, P.,  see Alvim, M.S. (4) 427–469

Dimitrakakis, C., A. Mitrokotsa and S. Vaudenay,  Expected loss analysis for authentication in constrained channels (3) 309–329

Dreier, J., J.-G. Dumas and P. Lafourcade,  Brandt’s fully private auction protocol revisited (5) 587–610

Duan, L.,  see Lu, H. (1) 107–129

Dumas, J.-G.,  see Dreier, J. (5) 587–610

Focardi, R.,  see Bugliesi, M. (4) 509–537

Fontanelli, P.,  see Merlo, A. (5) 611–637

Foresti, S.,  see De Capitani di Vimercati, S. (1) 59– 88

Galdi, C.,  see Bonatti, P. (6) 709–757

Gibson-Robinson, T., A. Kamil and G. Lowe,  Verifying layered security protocols (3) 259–307

Gofman, M.I.,  see Yang, P. (1) 1– 29

Hong, Y.,  see Lu, H. (1) 107–129

Ilushechkin, E.,  see Belim, S. (5) 641–657

Jajodia, S.,  see De Capitani di Vimercati, S. (1) 59– 88

Jia, C.,  see Li, J. (6) 659–683

Kamil, A.,  see Gibson-Robinson, T. (3) 259–307

Kaynar, D.,  see Mallios, Y. (6) 759–787

Khan, W.,  see Bugliesi, M. (4) 509–537

Łukowiak, M.,  see Lowden, J. (5) 541–562

Lafourcade, P.,  see Dreier, J. (5) 587–610

Lenzini, G.,  see Bella, G. (5) 563–585

Li, J., X. Chen, J. Li, C. Jia, J. Ma and W. Lou,  New access control systems based on outsourced attribute-based encryption (6) 659–683

Li, J.,  see Li, J. (6) 659–683

Liu, W.M., L. Wang, L. Zhang and S. Zhu,  k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure (2) 131–165

Livraga, G.,  see De Capitani di Vimercati, S. (1) 59– 88

Lopez Alarcon, S.,  see Lowden, J. (5) 541–562

Lou, W.,  see Li, J. (6) 659–683

Lowden, J., M. Łukowiak and S. Lopez Alarcon,  Design and performance analysis of efficient Keccak tree hashing on GPU architectures (5) 541–562

Lowe, G.,  see Gibson-Robinson, T. (3) 259–307

Lu, H., Y. Hong, Y. Yang, L. Duan and N. Badar,  Towards user-oriented RBAC model (1) 107–129

Ma, J.,  see Li, J. (6) 659–683

Mallios, Y., L. Bauer, D. Kaynar, F. Martinelli and C. Morisset,  Probabilistic cost enforcement of security policies (6) 759–787

Malluhi, Q.,  see AL Bouna, B. (1) 89–106

Martinelli, F.,  see Mallios, Y. (6) 759–787

Merlo, A., M. Migliardi and P. Fontanelli,  Measuring and estimating power consumption in Android to support energy-based intrusion detection (5) 611–637

Migliardi, M.,  see Merlo, A. (5) 611–637

Mitra, B., S. Sural, V. Atluri and J. Vaidya,  The generalized temporal role mining problem (1) 31– 58

Mitrokotsa, A.,  see Boureanu, I. (2) 229–257

Mitrokotsa, A.,  see Dimitrakakis, C. (3) 309–329

Morisset, C.,  see Mallios, Y. (6) 759–787

Palamidessi, C.,  see Alvim, M.S. (4) 427–469

Paraboschi, S.,  see De Capitani di Vimercati, S. (1) 59– 88

Samarati, P.,  see De Capitani di Vimercati, S. (1) 59– 88

Schneider, S.,  see Alshehri, A. (6) 685–707

Shen, S.-T. and W.-G. Tzeng,  Delegated integrity check for hierarchical cloud data (4) 471–508

Sherr, M.,  see Bates, A. (2) 167–195

Shields, C.,  see Bates, A. (2) 167–195

Spalazzi, L. and L. Viganò,  Editorial: Special issue on security and high performance computing systems (5) 539–540

Stoller, S.D.,  see Yang, P. (1) 1– 29

Sural, S.,  see Mitra, B. (1) 31– 58

Torres, D.,  see Bonatti, P. (6) 709–757

Traynor, P.,  see Bates, A. (2) 167–195

Tzeng, W.-G.,  see Shen, S.-T. (4) 471–508

Vaidya, J.,  see Mitra, B. (1) 31– 58

van der Meyden, R.,  What, indeed, is intransitive noninterference? (2) 197–228

Vaudenay, S.,  see Boureanu, I. (2) 229–257

Vaudenay, S.,  see Dimitrakakis, C. (3) 309–329

Viganò, L.,  see Spalazzi, L. (5) 539–540

Wallach, D.,  see Bates, A. (2) 167–195

Wang, L.,  see Liu, W.M. (2) 131–165

Yang, P., M.I. Gofman, S.D. Stoller and Z. Yang,  Policy analysis for administrative role based access control without separate administration (1) 1– 29

Yang, Y.,  see Lu, H. (1) 107–129

Yang, Z.,  see Yang, P. (1) 1– 29

Yu, S.,  see Yuan, J. (3) 403–425

Yuan, J. and S. Yu,  PCPOR: Public and constant-cost proofs of retrievability in cloud (3) 403–425

Zhang, L.,  see Liu, W.M. (2) 131–165

Zhu, S.,  see Liu, W.M. (2) 131–165