Author Index Volume 23 (2015)
AL Bouna, B., C. Clifton and Q. Malluhi, Anonymizing transactional datasets (1) 89–106
Alshehri, A. and S. Schneider, A formal framework for security analysis of NFC mobile coupon protocols (6) 685–707
Alvim, M.S., M.E. Andrés, K. Chatzikokolakis, P. Degano and C. Palamidessi, On the information leakage of differentially-private mechanisms (4) 427–469
Andrés, M.E., see Alvim, M.S. (4) 427–469
Atluri, V., see Mitra, B. (1) 31– 58
Badar, N., see Lu, H. (1) 107–129
Bates, A., K.R.B. Butler, M. Sherr, C. Shields, P. Traynor and D. Wallach, Accountable wiretapping – or – I know they can hear you now (2) 167–195
Bauer, L., see Mallios, Y. (6) 759–787
Belim, S., N. Bogachenko and E. Ilushechkin, An analysis of graphs that represent a role-based security policy hierarchy (5) 641–657
Bella, G., P. Curzon and G. Lenzini, Service security and privacy as a socio-technical problem (5) 563–585
Blanchet, B., see Cadé, D. (3) 331–402
Bogachenko, N., see Belim, S. (5) 641–657
Bonatti, P., C. Galdi and D. Torres, Event-driven RBAC (6) 709–757
Boureanu, I., A. Mitrokotsa and S. Vaudenay, Practical and provably secure distance-bounding (2) 229–257
Bugliesi, M., S. Calzavara, R. Focardi and W. Khan, CookiExt: Patching the browser against session hijacking attacks (4) 509–537
Butler, K.R.B., see Bates, A. (2) 167–195
Cadé, D. and B. Blanchet, Proved generation of implementations from computationally secure protocol specifications (3) 331–402
Calzavara, S., see Bugliesi, M. (4) 509–537
Chatzikokolakis, K., see Alvim, M.S. (4) 427–469
Chen, X., see Li, J. (6) 659–683
Clifton, C., see AL Bouna, B. (1) 89–106
Curzon, P., see Bella, G. (5) 563–585
De Capitani di Vimercati, S., S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi and P. Samarati, Loose associations to increase utility in data publishing (1) 59– 88
Degano, P., see Alvim, M.S. (4) 427–469
Dimitrakakis, C., A. Mitrokotsa and S. Vaudenay, Expected loss analysis for authentication in constrained channels (3) 309–329
Dreier, J., J.-G. Dumas and P. Lafourcade, Brandt’s fully private auction protocol revisited (5) 587–610
Duan, L., see Lu, H. (1) 107–129
Dumas, J.-G., see Dreier, J. (5) 587–610
Focardi, R., see Bugliesi, M. (4) 509–537
Fontanelli, P., see Merlo, A. (5) 611–637
Foresti, S., see De Capitani di Vimercati, S. (1) 59– 88
Galdi, C., see Bonatti, P. (6) 709–757
Gibson-Robinson, T., A. Kamil and G. Lowe, Verifying layered security protocols (3) 259–307
Gofman, M.I., see Yang, P. (1) 1– 29
Hong, Y., see Lu, H. (1) 107–129
Ilushechkin, E., see Belim, S. (5) 641–657
Jajodia, S., see De Capitani di Vimercati, S. (1) 59– 88
Jia, C., see Li, J. (6) 659–683
Kamil, A., see Gibson-Robinson, T. (3) 259–307
Kaynar, D., see Mallios, Y. (6) 759–787
Khan, W., see Bugliesi, M. (4) 509–537
Łukowiak, M., see Lowden, J. (5) 541–562
Lafourcade, P., see Dreier, J. (5) 587–610
Lenzini, G., see Bella, G. (5) 563–585
Li, J., X. Chen, J. Li, C. Jia, J. Ma and W. Lou, New access control systems based on outsourced attribute-based encryption (6) 659–683
Li, J., see Li, J. (6) 659–683
Liu, W.M., L. Wang, L. Zhang and S. Zhu, k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure (2) 131–165
Livraga, G., see De Capitani di Vimercati, S. (1) 59– 88
Lopez Alarcon, S., see Lowden, J. (5) 541–562
Lou, W., see Li, J. (6) 659–683
Lowden, J., M. Łukowiak and S. Lopez Alarcon, Design and performance analysis of efficient Keccak tree hashing on GPU architectures (5) 541–562
Lowe, G., see Gibson-Robinson, T. (3) 259–307
Lu, H., Y. Hong, Y. Yang, L. Duan and N. Badar, Towards user-oriented RBAC model (1) 107–129
Ma, J., see Li, J. (6) 659–683
Mallios, Y., L. Bauer, D. Kaynar, F. Martinelli and C. Morisset, Probabilistic cost enforcement of security policies (6) 759–787
Malluhi, Q., see AL Bouna, B. (1) 89–106
Martinelli, F., see Mallios, Y. (6) 759–787
Merlo, A., M. Migliardi and P. Fontanelli, Measuring and estimating power consumption in Android to support energy-based intrusion detection (5) 611–637
Migliardi, M., see Merlo, A. (5) 611–637
Mitra, B., S. Sural, V. Atluri and J. Vaidya, The generalized temporal role mining problem (1) 31– 58
Mitrokotsa, A., see Boureanu, I. (2) 229–257
Mitrokotsa, A., see Dimitrakakis, C. (3) 309–329
Morisset, C., see Mallios, Y. (6) 759–787
Palamidessi, C., see Alvim, M.S. (4) 427–469
Paraboschi, S., see De Capitani di Vimercati, S. (1) 59– 88
Samarati, P., see De Capitani di Vimercati, S. (1) 59– 88
Schneider, S., see Alshehri, A. (6) 685–707
Shen, S.-T. and W.-G. Tzeng, Delegated integrity check for hierarchical cloud data (4) 471–508
Sherr, M., see Bates, A. (2) 167–195
Shields, C., see Bates, A. (2) 167–195
Spalazzi, L. and L. Viganò, Editorial: Special issue on security and high performance computing systems (5) 539–540
Stoller, S.D., see Yang, P. (1) 1– 29
Sural, S., see Mitra, B. (1) 31– 58
Torres, D., see Bonatti, P. (6) 709–757
Traynor, P., see Bates, A. (2) 167–195
Tzeng, W.-G., see Shen, S.-T. (4) 471–508
Vaidya, J., see Mitra, B. (1) 31– 58
van der Meyden, R., What, indeed, is intransitive noninterference? (2) 197–228
Vaudenay, S., see Boureanu, I. (2) 229–257
Vaudenay, S., see Dimitrakakis, C. (3) 309–329
Viganò, L., see Spalazzi, L. (5) 539–540
Wallach, D., see Bates, A. (2) 167–195
Wang, L., see Liu, W.M. (2) 131–165
Yang, P., M.I. Gofman, S.D. Stoller and Z. Yang, Policy analysis for administrative role based access control without separate administration (1) 1– 29
Yang, Y., see Lu, H. (1) 107–129
Yang, Z., see Yang, P. (1) 1– 29
Yu, S., see Yuan, J. (3) 403–425
Yuan, J. and S. Yu, PCPOR: Public and constant-cost proofs of retrievability in cloud (3) 403–425
Zhang, L., see Liu, W.M. (2) 131–165
Zhu, S., see Liu, W.M. (2) 131–165