You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly.
Go to headerGo to navigationGo to searchGo to contentsGo to footer
In content section. Select this link to jump to navigation

Author Index Volume 24 (2016)

Ahn, G.-J., see Jing, Y. (4) 405–426

Almeida Matos, A., see Luo, Z. (1) 91–136

Athamnah, M., see Le, M. (3) 379–403

Aviv, A.J., see Sonchack, J. (5) 645–665

Azevedo de Amorim, A., N. Collins, A. DeHon, D. Demange, C. Hriţcu, D. Pichardie, B.C. Pierce, R. Pollack and A. Tolmach, A verified information-flow architecture (6) 689–734

Baumann, C., see Guanciale, R. (6) 793–837

Bello, L., see Hedin, D. (2) 181–234

Bodei, C., P. Degano, L. Galletta and F. Salvatori, Context-aware security: Linguistic mechanisms and static analysis (4) 427–477

Böhl, F. and D. Unruh, Symbolic universal composability (1) 1– 38

Butler, K., see Carter, H. (2) 137–180

Cannady, J., see Taglienti, C. (2) 235–288

Carter, H., B. Mood, P. Traynor and K. Butler, Secure outsourced garbled circuit evaluation for mobile devices (2) 137–180

Chen, Y. and Z. Zhang, Publicly evaluable pseudorandom functions and their applications (2) 289–320

Cho, H., see Jing, Y. (4) 405–426

Collins, N., see Azevedo de Amorim, A. (6) 689–734

Cook, D.L., see Di Crescenzo, G. (4) 479–506

Dam, M., see Guanciale, R. (6) 793–837

Davidson, M., T. Tassa and E. Gudes, Content sharing schemes in DRM systems with enhanced performance and privacy preservation (6) 667–688

De Capitani di Vimercati, S., S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Efficient integrity checks for join queries in the cloud (3) 347–378

Degano, P., see Bodei, C. (4) 427–477

DeHon, A., see Azevedo de Amorim, A. (6) 689–734

Demange, D., see Azevedo de Amorim, A. (6) 689–734

Di Crescenzo, G., D.L. Cook, A. McIntosh and E. Panagos, Practical and privacy-preserving information retrieval from a database table (4) 479–506

D’Souza, D. and K.R. Raghavendra, Model-checking trace-based information flow properties for infinite-state systems (5) 617–643

Foresti, S., see De Capitani di Vimercati, S. (3) 347–378

Fragoso Santos, J., see Luo, Z. (1) 91–136

Galletta, L., see Bodei, C. (4) 427–477

Guanciale, R., H. Nemati, M. Dam and C. Baumann, Provably secure memory isolation for Linux on ARM (6) 793–837

Gudes, E., see Davidson, M. (6) 667–688

Hedin, D., L. Bello and A. Sabelfeld, Information-flow security for JavaScript and its APIs (2) 181–234

Hriţcu, C., see Azevedo de Amorim, A. (6) 689–734

Hu, H., see Jing, Y. (4) 405–426

Jajodia, S., N. Park, E. Serra and V.S. Subrahmanian, Using temporal probabilistic logic for optimal monitoring of security events with limited resources (6) 735–791

Jajodia, S., see De Capitani di Vimercati, S. (3) 347–378

Jajodia, S., see Le, M. (3) 379–403

Jing, Y., G.-J. Ahn, H. Hu, H. Cho and Z. Zhao, TripleMon: A multi-layer security framework for mediating inter-process communication on Android (4) 405–426

Kant, K., see Le, M. (3) 379–403

Kar, D., S. Panigrahi and S. Sundararajan, SQLiDDS: SQL injection detection using document similarity measure (4) 507–539

Kremer, S. and R. Künnemann, Automated analysis of security protocols with global state (5) 583–616

Künnemann, R., see Kremer, S. (5) 583–616

Le, M., K. Kant, M. Athamnah and S. Jajodia, Minimum cost rule enforcement for cooperative database access (3) 379–403

Lester, M., L. Ong and M. Schäfer, Information flow analysis for a dynamically typed language with staged metaprogramming (5) 541–582

Luo, Z., J. Fragoso Santos, A. Almeida Matos and T. Rezk, Mashic compiler: Mashup sandboxing based on inter-frame communication (1) 91–136

McIntosh, A., see Di Crescenzo, G. (4) 479–506

Mood, B., see Carter, H. (2) 137–180

Nemati, H., see Guanciale, R. (6) 793–837

Ong, L., see Lester, M. (5) 541–582

Panagos, E., see Di Crescenzo, G. (4) 479–506

Panigrahi, S., see Kar, D. (4) 507–539

Paraboschi, S., see De Capitani di Vimercati, S. (3) 347–378

Park, N., see Jajodia, S. (6) 735–791

Petković, M., see Vavilis, S. (3) 321–345

Pichardie, D., see Azevedo de Amorim, A. (6) 689–734

Pierce, B.C., see Azevedo de Amorim, A. (6) 689–734

Pollack, R., see Azevedo de Amorim, A. (6) 689–734

Rafnsson, W. and A. Sabelfeld, Secure multi-execution: Fine-grained, declassification-aware, and transparent (1) 39– 90

Raghavendra, K.R., see D’Souza, D. (5) 617–643

Rezk, T., see Luo, Z. (1) 91–136

Sabelfeld, A., see Hedin, D. (2) 181–234

Sabelfeld, A., see Rafnsson, W. (1) 39– 90

Salvatori, F., see Bodei, C. (4) 427–477

Samarati, P., see De Capitani di Vimercati, S. (3) 347–378

Schäfer, M., see Lester, M. (5) 541–582

Serra, E., see Jajodia, S. (6) 735–791

Sonchack, J. and A.J. Aviv, Exploring large scale security system reproducibility with the LESS simulator (5) 645–665

Subrahmanian, V.S., see Jajodia, S. (6) 735–791

Sundararajan, S., see Kar, D. (4) 507–539

Taglienti, C. and J. Cannady, The user attribution problem and the challenge of persistent surveillance of user activity in complex networks (2) 235–288

Tassa, T., see Davidson, M. (6) 667–688

Tolmach, A., see Azevedo de Amorim, A. (6) 689–734

Traynor, P., see Carter, H. (2) 137–180

Unruh, D., see Böhl, F. (1) 1– 38

Vavilis, S., M. Petković and N. Zannone, A severity-based quantification of data leakages in database systems (3) 321–345

Zannone, N., see Vavilis, S. (3) 321–345

Zhang, Z., see Chen, Y. (2) 289–320

Zhao, Z., see Jing, Y. (4) 405–426