@article{Groz-Staworko-Caron-Roos-Tison/14, AUTHOR = {Groz, Beno{\^{i}}t and Staworko, S{\l}awomir and Caron, Anne-Cecile and Roos, Yves and Tison, Sophie}, TITLE = {Static analysis of XML security views and query rewriting}, JOURNAL = {Inf.~Comput.}, VOLUME = {238}, PAGES = {2-29}, YEAR = {2014}, EDITOR = {Meyer, Albert R.}, KEYWORDS = {xml, security views, query rewriting, determinacy}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540114000893}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Arnaud-Cortier-Delaune/14, AUTHOR = {Arnaud, Mathilde and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, TITLE = {Modeling and verifying ad hoc routing protocols}, JOURNAL = {Inf.~Comput.}, VOLUME = {238}, PAGES = {30-67}, YEAR = {2014}, EDITOR = {Meyer, Albert R.}, URL = {http://www.sciencedirect.com/science/article/pii/S089054011400090X}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Capecchi-Castellani-Dezani-Ciancaglini/14, AUTHOR = {Capecchi, Sara and Castellani, Ilaria and Dezani-Ciancaglini, Mariangiola}, TITLE = {Typing access control and secure information flow in sessions}, JOURNAL = {Inf.~Comput.}, VOLUME = {238}, PAGES = {68-105}, YEAR = {2014}, EDITOR = {Meyer, Albert R.}, KEYWORDS = {communication-centred computing, session types, access control, secure information flow}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540114000911}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Bursuc-Comon-Lundh-Delaune/14, AUTHOR = {Bursuc, Sergiu and Comon-Lundh, Hubert and Delaune, St{\'e}phanie}, TITLE = {Deducibility constraints and blind signatures}, JOURNAL = {Inf.~Comput.}, VOLUME = {238}, PAGES = {106-127}, YEAR = {2014}, EDITOR = {Meyer, Albert R.}, KEYWORDS = {formal methods, verification, security protocol, constraint system}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540114000923}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Liu-Lynch/14, AUTHOR = {Liu, Zhiqiang and Lynch, Christopher}, TITLE = {Efficient general AGH-unification}, JOURNAL = {Inf.~Comput.}, VOLUME = {238}, PAGES = {128-156}, YEAR = {2014}, EDITOR = {Meyer, Albert R.}, KEYWORDS = {abelian group, homomorphism, general unification}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540114000947}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Escobar-Meadows-Meseguer-Santiago/14, AUTHOR = {Escobar, Santiago and Meadows, Catherine and Meseguer, Jos{\'e} and Santiago, Sonia}, TITLE = {State space reduction in the Maude-NRL Protocol Analyzer}, JOURNAL = {Inf.~Comput.}, VOLUME = {238}, PAGES = {157-186}, YEAR = {2014}, EDITOR = {Meyer, Albert R.}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540114000935}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Bertolissi-Fernandez/14, AUTHOR = {Bertolissi, Clara and Fern{\'a}ndez, Maribel}, TITLE = {A metamodel of access control for distributed environments: Applications and properties}, JOURNAL = {Inf.~Comput.}, VOLUME = {238}, PAGES = {187-207}, YEAR = {2014}, EDITOR = {Meyer, Albert R.}, KEYWORDS = {security policies, distributed access control, operational semantics, rewriting}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540114000959}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Cortier-Steel/14, AUTHOR = {Cortier, V{\'e}ronique and Steel, Graham}, TITLE = {A generic security API for symmetric key management on cryptographic devices}, JOURNAL = {Inf.~Comput.}, VOLUME = {238}, PAGES = {208-232}, YEAR = {2014}, EDITOR = {Meyer, Albert R.}, KEYWORDS = {security apis, key management, pkcs\#11, cryptographic devices}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540114000960}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Kanovich-Ban_Kirigin-Nigam-Scedrov/14, AUTHOR = {Kanovich, Max and Ban Kirigin, Tajana and Nigam, Vivek and Scedrov, Andre}, TITLE = {Bounded memory Dolev-Yao adversaries in collaborative systems}, JOURNAL = {Inf.~Comput.}, VOLUME = {238}, PAGES = {233-261}, YEAR = {2014}, EDITOR = {Meyer, Albert R.}, KEYWORDS = {collaborative systems, protocol security, complexity results}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540114000972}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, }