Author Index Volume 24 (2016)
Ahn, G.-J., see Jing, Y. (4) 405–426
Almeida Matos, A., see Luo, Z. (1) 91–136
Athamnah, M., see Le, M. (3) 379–403
Aviv, A.J., see Sonchack, J. (5) 645–665
Azevedo de Amorim, A., N. Collins, A. DeHon, D. Demange, C. Hriţcu, D. Pichardie, B.C. Pierce, R. Pollack and A. Tolmach, A verified information-flow architecture (6) 689–734
Baumann, C., see Guanciale, R. (6) 793–837
Bello, L., see Hedin, D. (2) 181–234
Bodei, C., P. Degano, L. Galletta and F. Salvatori, Context-aware security: Linguistic mechanisms and static analysis (4) 427–477
Böhl, F. and D. Unruh, Symbolic universal composability (1) 1– 38
Butler, K., see Carter, H. (2) 137–180
Cannady, J., see Taglienti, C. (2) 235–288
Carter, H., B. Mood, P. Traynor and K. Butler, Secure outsourced garbled circuit evaluation for mobile devices (2) 137–180
Chen, Y. and Z. Zhang, Publicly evaluable pseudorandom functions and their applications (2) 289–320
Cho, H., see Jing, Y. (4) 405–426
Collins, N., see Azevedo de Amorim, A. (6) 689–734
Cook, D.L., see Di Crescenzo, G. (4) 479–506
Dam, M., see Guanciale, R. (6) 793–837
Davidson, M., T. Tassa and E. Gudes, Content sharing schemes in DRM systems with enhanced performance and privacy preservation (6) 667–688
De Capitani di Vimercati, S., S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Efficient integrity checks for join queries in the cloud (3) 347–378
Degano, P., see Bodei, C. (4) 427–477
DeHon, A., see Azevedo de Amorim, A. (6) 689–734
Demange, D., see Azevedo de Amorim, A. (6) 689–734
Di Crescenzo, G., D.L. Cook, A. McIntosh and E. Panagos, Practical and privacy-preserving information retrieval from a database table (4) 479–506
D’Souza, D. and K.R. Raghavendra, Model-checking trace-based information flow properties for infinite-state systems (5) 617–643
Foresti, S., see De Capitani di Vimercati, S. (3) 347–378
Fragoso Santos, J., see Luo, Z. (1) 91–136
Galletta, L., see Bodei, C. (4) 427–477
Guanciale, R., H. Nemati, M. Dam and C. Baumann, Provably secure memory isolation for Linux on ARM (6) 793–837
Gudes, E., see Davidson, M. (6) 667–688
Hedin, D., L. Bello and A. Sabelfeld, Information-flow security for JavaScript and its APIs (2) 181–234
Hriţcu, C., see Azevedo de Amorim, A. (6) 689–734
Hu, H., see Jing, Y. (4) 405–426
Jajodia, S., N. Park, E. Serra and V.S. Subrahmanian, Using temporal probabilistic logic for optimal monitoring of security events with limited resources (6) 735–791
Jajodia, S., see De Capitani di Vimercati, S. (3) 347–378
Jajodia, S., see Le, M. (3) 379–403
Jing, Y., G.-J. Ahn, H. Hu, H. Cho and Z. Zhao, TripleMon: A multi-layer security framework for mediating inter-process communication on Android (4) 405–426
Kant, K., see Le, M. (3) 379–403
Kar, D., S. Panigrahi and S. Sundararajan, SQLiDDS: SQL injection detection using document similarity measure (4) 507–539
Kremer, S. and R. Künnemann, Automated analysis of security protocols with global state (5) 583–616
Künnemann, R., see Kremer, S. (5) 583–616
Le, M., K. Kant, M. Athamnah and S. Jajodia, Minimum cost rule enforcement for cooperative database access (3) 379–403
Lester, M., L. Ong and M. Schäfer, Information flow analysis for a dynamically typed language with staged metaprogramming (5) 541–582
Luo, Z., J. Fragoso Santos, A. Almeida Matos and T. Rezk, Mashic compiler: Mashup sandboxing based on inter-frame communication (1) 91–136
McIntosh, A., see Di Crescenzo, G. (4) 479–506
Mood, B., see Carter, H. (2) 137–180
Nemati, H., see Guanciale, R. (6) 793–837
Ong, L., see Lester, M. (5) 541–582
Panagos, E., see Di Crescenzo, G. (4) 479–506
Panigrahi, S., see Kar, D. (4) 507–539
Paraboschi, S., see De Capitani di Vimercati, S. (3) 347–378
Park, N., see Jajodia, S. (6) 735–791
Petković, M., see Vavilis, S. (3) 321–345
Pichardie, D., see Azevedo de Amorim, A. (6) 689–734
Pierce, B.C., see Azevedo de Amorim, A. (6) 689–734
Pollack, R., see Azevedo de Amorim, A. (6) 689–734
Rafnsson, W. and A. Sabelfeld, Secure multi-execution: Fine-grained, declassification-aware, and transparent (1) 39– 90
Raghavendra, K.R., see D’Souza, D. (5) 617–643
Rezk, T., see Luo, Z. (1) 91–136
Sabelfeld, A., see Hedin, D. (2) 181–234
Sabelfeld, A., see Rafnsson, W. (1) 39– 90
Salvatori, F., see Bodei, C. (4) 427–477
Samarati, P., see De Capitani di Vimercati, S. (3) 347–378
Schäfer, M., see Lester, M. (5) 541–582
Serra, E., see Jajodia, S. (6) 735–791
Sonchack, J. and A.J. Aviv, Exploring large scale security system reproducibility with the LESS simulator (5) 645–665
Subrahmanian, V.S., see Jajodia, S. (6) 735–791
Sundararajan, S., see Kar, D. (4) 507–539
Taglienti, C. and J. Cannady, The user attribution problem and the challenge of persistent surveillance of user activity in complex networks (2) 235–288
Tassa, T., see Davidson, M. (6) 667–688
Tolmach, A., see Azevedo de Amorim, A. (6) 689–734
Traynor, P., see Carter, H. (2) 137–180
Unruh, D., see Böhl, F. (1) 1– 38
Vavilis, S., M. Petković and N. Zannone, A severity-based quantification of data leakages in database systems (3) 321–345
Zannone, N., see Vavilis, S. (3) 321–345
Zhang, Z., see Chen, Y. (2) 289–320
Zhao, Z., see Jing, Y. (4) 405–426