CINXE.COM
Journal of Computer Security - Volume 19, issue 3 - Journals - IOS Press
<!doctype html> <!--[if lte IE 8]> <html class="no-js oldie" xmlns:mml="http://www.w3.org/1998/Math/MathML" lang="en"> <![endif]--> <!--[if gt IE 8]><!--> <html class="no-js" xmlns:mml="http://www.w3.org/1998/Math/MathML" lang="en"> <!--<![endif]--> <head> <meta charset="utf-8"> <title>Journal of Computer Security - Volume 19, issue 3 - Journals - IOS Press</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <!-- These tags have been added for Google Scholar. --> <!-- see: http://scholar.google.com/intl/en/scholar/inclusion.html --> <!-- Three fields are required at a minimum: title, at least one author, publication date --> <meta name="citation_title" content="Journal of Computer Security - Volume 19, issue 3 - Journals"> <meta name="citation_journal_title" content="Journal of Computer Security"> <meta name="citation_issn" content="0926-227X"/> <meta name="citation_volume" content="19"/> <meta name="citation_issue" content="3"/> <meta name="citation_publisher" content="IOS Press"> <meta name="format-detection" content="telephone=no" /> <link rel="search" href="/opensearch.xml?title=Scolaris&autocompletePath=%2Fautocomplete%3Fq%3D%7BsearchTerms%7D" type="application/opensearchdescription+xml" title="Scolaris" /> <link href='//fonts.googleapis.com/css?family=PT+Sans:400,700%7CPT+Serif:400,700' rel='stylesheet' type='text/css'> <link rel="stylesheet" href="https://content.iospress.com:443/static/less/journals.less.css@2.6.8-2-gb19ff93" /> <script src="https://content.iospress.com:443/static/js/libs/modernizr-2.5.3.min.js@2.6.8-2-gb19ff93"></script> <link rel="shortcut icon" href="https://content.iospress.com:443/static/img/favicon.ico@2.6.8-2-gb19ff93" /> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-PJ8NZ9C');</script> <!-- End Google Tag Manager --> </head> <body class="page-journals loading" data-baseurl="https://content.iospress.com:443/" data-git="@2.6.8-2-gb19ff93" data-p13n="no" data-saved-alerts="true" data-ecommerce="true" data-shibboleth="true" data-default-counter="true" > <div class="no-js-message"> <i class="icon-warning-sign" role="presentation"></i> You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly. </div> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-PJ8NZ9C" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'GTM-PJ8NZ9C', 'auto'); ga('send', 'pageview'); </script> <!-- End Google Tag Manager (noscript) --> <a href="#header-skiplink" class="skiplinks">Go to header</a><a href="#nav-skiplink" class="skiplinks">Go to navigation</a><a href="#search-bar" class="skiplinks">Go to search</a><a href="#content" class="skiplinks">Go to contents</a><a href="#footer-skiplink" class="skiplinks">Go to footer</a> <div class="header-block"> <header id="header" class="header block"> <a href="#nav-skiplink" class="skiplinks" id="header-skiplink">In header section. Select this link to jump to navigation</a> <div class="container"> <div class="logo" style="width: 35%"> <a href="https://content.iospress.com:443/" title="Home" class="header-home-link"> <img src="https://content.iospress.com:443/static/img/latest_header_img.png@2.6.8-2-gb19ff93" alt="IOS Press" style="max-width: 80%"/> </a> </div> <div class="header-menu clearfix"> <ul class=""> <li class=""><a href="https://content.iospress.com:443/page/help">Help</a></li> <li class=""><a href="https://content.iospress.com:443/page/about">About us</a></li> <li class=""><a href="https://content.iospress.com:443/page/contact">Contact us</a></li> </ul> </div> </div> </header> <nav id="nav" class="nav"> <a href="#content" class="skiplinks" id="nav-skiplink">In navigation section. Select this link to jump to content</a> <div class="menu-mobile js-toggle-handle"> <a class="menu-mobile-text" href="#" title="Main menu"> Menu</a> </div> <div class="container nav-menu-dropdown toggle-section clearfix"> <ul class="nav-item nav-main"> <!--Add selected class if you want to display the nav for the current page as selected --> <li class="nav-item"><a href="https://content.iospress.com:443/">Home</a></li> <li class="nav-item selected"><a href="https://content.iospress.com:443/journals/">Journals</a></li> </ul> <ul class="nav-item nav-sp-side nav-sub clearfix"> <li> <form class="getCartForm" id="getCart" method="get" action="https://content.iospress.com:443/cart"> <button class="getCartButton"> <i class="icon-shopping-cart"></i> Cart <span class="shopping-cart"> </span> </button> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/19/3" /> <span class="currency-section"> <span class="selected-currency">€</span> <button class="currency-change" data-currency="US_DOLLAR"><span class="visuallyhidden">title="Change currency to USD - US Dollar"</span>$</button> </span> </form> </li> <li> <a id="p13n-menu" href="/login?dest=https://content.iospress.com:443/" data-recaptchasitekey="6LfnJVIUAAAAAE-bUOMg0MJGki4lqSvDmhJp19fN"> Log in / Register </a> <div id="p13n-dd" class="p13n-dd"></div> <div class="p13n-modal-overlay"></div> <div id="p13n-history" data-uri="https://content.iospress.com:443/checkout/purchase-history"></div> </li> </ul> </div> </nav> <div id="search" class="search-complex" role="search"> <div class="container"> <form id="search-form" action="https://content.iospress.com:443/search" class="search-form block clearfix"> <div class="wrap-input clearfix"> <i role="presentation" class="icon-search"></i> <label for="search-bar" class="visuallyhidden">Search</label> <input id="search-bar" type="search" name="q" placeholder="Search" class="search-query search-input focused" value="" required="required"> <button type="submit" class="search-btn btn">Search</button> <input name="published_between" type="hidden" /> <input name="from_year" type="hidden" /> <input name="to_year" type="hidden"/> </div> </form> <div class="search-row second-search-row clearfix"> <form id="peer-review-form"> <label class="search-label published-label" for="published-between"> <input id="published-between" name="published_between" type="checkbox" /> Published between: </label> <label class="visuallyhidden" for="from-year">Published from year:</label> <input class="tinput search-year search-year-from" id="from-year" name="from_year" type="text" placeholder="YYYY" pattern="\d{4,4}" /> <span>and</span> <label class="visuallyhidden" for="to-year">Published to year:</label> <input class="tinput search-year" id="to-year" name="to_year" type="text" placeholder="YYYY" pattern="\d{4,4}" /> <a class="search-syntax" href="#">Search syntax help</a> </form> </div> <div id="search-syntax" class="search-helptext"> <div class='container'> <div class="search-row search-syntax-row clearfix"> <div class="search-syntax-content"> <p class='intro'>Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.</p> <dl> <dt>Boolean operators</dt> <dd>This <strong>OR</strong> that<br />This <strong>AND</strong> that<br />This <strong>NOT</strong> that</dd> <dt>Must include "This" and "That"</dt> <dd>This That</dd> <dt class="grouped">Must not include "That"</dt> <dd class="grouped">This -That</dd> <dt class="grouped">"This" is optional</dt> <dd class="grouped">This +That</dd> <dt>Exact phrase "This That"</dt> <dd>"This That"</dd> <dt>Grouping</dt> <dd>(this <strong>AND</strong> that) <strong>OR</strong> (that <strong>AND</strong> other)</dd> </dl> </div> </div> </div> </div> </div> </div> </div> <div class="container main-container"> <a href="#nav-skiplink" class="skiplinks" id="content">In content section. Select this link to jump to navigation</a> <script> ga('set', 'dimension3',"Journal of Computer Security"); ga('set', 'metric2', 1 ); ga('set', 'dimension4',"Volume 19"); ga('set', 'metric3', 1 ); ga('set', 'metric4', 1 ); ga('set', 'dimension5',"Issue 3"); ga('send', 'pageview', "/Journal of Computer Security/"); </script> <script>window.latestLoadTimestamp=1739893923824;</script> <div class="block journal-overview shadow border"> <div class="journal-overview-header block"> <div class="main col"><h1>Journal of Computer Security - Volume 19, issue 3</h1></div> <span class="main col"><div class="pricing-journal"> <p>Purchase individual online access for 1 year to this journal.</p> <strong>Price: EUR 260.00</strong> <form class="add-to-cart-form" id="add-JournalId_jcs" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/19/3" /> <input type="hidden" name="id" value="JournalId_jcs" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div></span> <span class="sidebar col" data-toc="Journal of Computer Security" data-toc-url="q=s2_parent_title_id%3Ajournal-of-computer-security" data-toc-journal-uri="journals/journal-of-computer-security" data-toc-q="s2_parent_title_id:journal-of-computer-security" data-toc-journal-name="Journal of Computer Security"> <span class="p13n-toc"> <button class="btn btn-p13n save-toc open-p13n-modal">Enable new issue alert</button> </span> </span> </div> <div class="journal-info block"> <div class="main col"> <div class="journal-cover col col-1by4"> <div class="journal-cover-img"> <img id="journal-of-computer-security-image" data-mercury="image" src="/fragr/images/JCS_21.jpg" /> </div> <div id="journal-of-computer-security-data" data-mercury="full" class="journals-data">ISSN 0926-227X (P) <br />ISSN 1875-8924 (E) <dl> </dl></div> </div> <div class="journal-details col col-3by4"> <div id="journal-of-computer-security-above-fold" data-mercury="full" class="clearfix above-fold details"><p><b>Impact Factor 2024: 0.9</b></p> <p>The <i>Journal of Computer Security</i> presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems. It also provides a forum for ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community.</p></div> <div id="journal-of-computer-security-below-fold" data-mercury="full" class="clearfix below-fold details toggle-section"><p>The journal provides an opportunity to publish articles of greater depth and length than is possible in the proceedings of various existing conferences, while addressing an audience of researchers in computer security who can be assumed to have a more specialized background than the readership of other archival publications. The journal welcomes contributions on all aspects of computer security: confidentiality, integrity, and assurance of service - that is, protection against unauthorized disclosure or modification of sensitive information, or denial of service. Of interest is a precise understanding of security policies through modelling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware systems implementing them.</p></div> <button class="btn btn-link js-toggle-handle"><span class="toggle-text-handle">Show more</span><span class="toggle-text-handle toggle-text-hide">Show less</span></button> </div> </div> <div class="sidebar col"> <div id="journal-of-computer-security-action-links" data-mercury="full" class="action-links"><a target="_blank" href="http://www.iospress.nl/recommend-this-title/?title=Journal%20of%20Computer%20Security&url=www.iospress.nl/journal/journal-of-computer-security/"></a> <a href="https://journals.sagepub.com/home/jcu" target="_blank"><img src="/fragr/images/J25_4629 IOS have moved ad for HW platform_268x268.jpg" /></a> <br /> <br /> <a href="http://www.iospress.nl/journal/journal-of-computer-security/?tab=submission-of-manuscripts"></a></div> </div> </div> </div> <div class="volume-listing main col"> <div class="col-spacing"> <div class="search-content border shadow"> <div class="search-result-header clearfix"> <div class="search-results-bulk-action bulk-action clearfix"> <button id="mark-toggle" class="btn-link mark-toggle"><i class="icon-check-empty" id="mark-all"></i><span> Mark all</span></button> <form class="add-to-cart-form add-marked-to-cart" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/19/3" /> <button class="btn btn-link btn-cart add-multiple disabled" disabled>Add marked to cart</button> </form> <form class="add-marked get-citation" method="post"> <button class="btn btn-link cite-multiple disabled" disabled>Export marked citations</button> </form> </div> </div> <div id="article-list"> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs425"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs425" data-itemid="ArticleId_jcs425"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs425" data-p13n-articleid="journal-of-computer-security/jcs425" data-p13n-title=" Preface " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs425"> Preface </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Atluri%2C+Vijay%22%29">Atluri, Vijay</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Editorial </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2011-0425 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 19, no. 3, pp. 365-365, 2011 </p> </div> <div class="pricing"> <a href="https://content.iospress.com:443/download/journal-of-computer-security/jcs425?id=journal-of-computer-security%2Fjcs425" class="btn btn-download btn-right get-pdf" target="_blank" data-articleid="journal-of-computer-security/jcs425" data-journal="Journal of Computer Security" data-volume="Volume 19" data-issue="Issue 3" data-article="Preface"> <i class="icon-download-alt" role="presentation"></i>Get PDF </a> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs415"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs415" data-itemid="ArticleId_jcs415"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs415" data-p13n-articleid="journal-of-computer-security/jcs415" data-p13n-title=" Shared and searchable encrypted data for untrusted servers " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs415"> Shared and searchable encrypted data for untrusted servers </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Dong%2C+Changyu%22%29">Dong, Changyu</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Russello%2C+Giovanni%22%29">Russello, Giovanni</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Dulay%2C+Naranker%22%29">Dulay, Naranker</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and computation overheads if only a subset of the data is required, for example, selecting records in a database table based on a keyword search. New cryptographic schemes have been proposed that support encrypted queries over encrypted data. But they all depend on a single set of secret keys, which implies single user access or sharing keys among multiple users, with key revocation requiring</span> <span class="fold-elip">…</span><span class="below-fold hidden" >costly data re-encryption. In this paper, we propose an encryption scheme where each authorised user in the system has his own keys to encrypt and decrypt data. The scheme supports keyword search which enables the server to return only the encrypted data that satisfies an encrypted query without decrypting it. We provide a concrete construction of the scheme and give formal proofs of its security. We also report on the results of our implementation. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Searchable encryption, secure data outsourcing, proxy encryption </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2010-0415 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 19, no. 3, pp. 367-397, 2011 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs415" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/19/3" /> <input type="hidden" name="id" value="ArticleId_jcs415" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs418"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs418" data-itemid="ArticleId_jcs418"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs418" data-p13n-articleid="journal-of-computer-security/jcs418" data-p13n-title=" On the formalization and analysis of a spatio-temporal role-based access control model " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs418"> On the formalization and analysis of a spatio-temporal role-based access control model </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Toahchoodee%2C+Manachai%22%29">Toahchoodee, Manachai</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Ray%2C+Indrakshi%22%29">Ray, Indrakshi</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>With the growing use of wireless networks and mobile devices, we are moving towards an era of pervasive computing. Such environments will spawn new applications that use contextual information to provide enhanced services. Traditional access control models cannot protect such applications because the access requirements may be contingent upon the location of the user and the time of access. Consequently, we propose a new spatio-temporal role-based access control model that supports delegation for use in such applications. The model can be used by any application where the access is contingent not only on the role of the user, but also</span> <span class="fold-elip">…</span><span class="below-fold hidden" >on the locations of the user and the object and the time of access. We describe how each entity in the role-based access control model is affected by time and location and propose constraints to express this. We also show how the formal semantics of our model can be expressed using graph-theoretic notation. The various features of our model give rise to numerous constraints that may interact with each other and result in conflicts. Thus, for any given application using our model, it is important to analyze the interaction of constraints to ensure that conflicts or security breaches do not occur. Manual analysis is tedious and error-prone. Towards this end, we show how the analysis can be automated using Coloured Petri Nets. Since automated analysis for large applications is time consuming, we propose an approach that reduces the analysis time. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Access control model, security, requirements specification, model analysis and verification </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2010-0418 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 19, no. 3, pp. 399-452, 2011 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs418" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/19/3" /> <input type="hidden" name="id" value="ArticleId_jcs418" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs417"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs417" data-itemid="ArticleId_jcs417"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs417" data-p13n-articleid="journal-of-computer-security/jcs417" data-p13n-title=" Secure construction and publication of contingency tables from distributed data " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs417"> Secure construction and publication of contingency tables from distributed data </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22He%2C+Xiaoyun%22%29">He, Xiaoyun</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Lu%2C+Haibing%22%29">Lu, Haibing</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Vaidya%2C+Jaideep%22%29">Vaidya, Jaideep</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Adam%2C+Nabil%22%29">Adam, Nabil</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>Contingency tables are widely used in many fields to analyze the relationship or infer the association between two or more variables. Indeed, due to their simplicity and ease, they are one of the first methods used to analyze gathered data. Typically, the construction of contingency tables from source data is considered straightforward since all data is supposed to be aggregated at a single party. However, in many cases, the collected data may actually be federated among different parties. While construction of the global contingency tables would still be of immense interest, privacy and security concerns may restrict the data owners</span> <span class="fold-elip">…</span><span class="below-fold hidden" >from free sharing of the raw data. In this paper, we propose techniques for enabling secure construction of contingency tables from both horizontally and vertically partitioned data. Our methods are efficient and secure. We also examine cases where the constructed contingency table may itself leak too much information and discuss potential solutions. In order to protect certain sensitive cell values against being inferred from the marginal totals of a constructed contingency table, we further address the problem of how to securely publish the marginal totals. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Secure construction, contingency tables, distributed data </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2010-0417 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 19, no. 3, pp. 453-484, 2011 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs417" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/19/3" /> <input type="hidden" name="id" value="ArticleId_jcs417" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs427"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs427" data-itemid="ArticleId_jcs427"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs427" data-p13n-articleid="journal-of-computer-security/jcs427" data-p13n-title=" Introduction " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs427"> Introduction </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Vaidya%2C+Jaideep%22%29">Vaidya, Jaideep</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Gudes%2C+Ehud%22%29">Gudes, Ehud</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Introduction </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2011-0427 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 19, no. 3, pp. 485-486, 2011 </p> </div> <div class="pricing"> <a href="https://content.iospress.com:443/download/journal-of-computer-security/jcs427?id=journal-of-computer-security%2Fjcs427" class="btn btn-download btn-right get-pdf" target="_blank" data-articleid="journal-of-computer-security/jcs427" data-journal="Journal of Computer Security" data-volume="Volume 19" data-issue="Issue 3" data-article="Introduction"> <i class="icon-download-alt" role="presentation"></i>Get PDF </a> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs420"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs420" data-itemid="ArticleId_jcs420"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs420" data-p13n-articleid="journal-of-computer-security/jcs420" data-p13n-title=" Inference-proof view update transactions with forwarded refreshments " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs420"> Inference-proof view update transactions with forwarded refreshments </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Biskup%2C+Joachim%22%29">Biskup, Joachim</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Gogolin%2C+Christian%22%29">Gogolin, Christian</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Seiler%2C+Jens%22%29">Seiler, Jens</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Weibert%2C+Torben%22%29">Weibert, Torben</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>Inference control aims at disabling a participant to gain a piece of information to be kept confidential. Considering a server–client architecture for information systems, we extend Controlled Query Evaluation (CQE), an inference control method to enforce confidentiality in static information systems under queries, to databases that are updatable by a client. More specifically, within the framework of the lying approach to CQE, we study how the server should translate a view update request issued by a client into a new database state in an inference-proof way. In order to avoid dangerous inferences, some such updates have to be denied even</span> <span class="fold-elip">…</span><span class="below-fold hidden" >though the new database instance would be compatible with the set of integrity constraints declared in the schema and supposed to be known to the client. In contrast, seen from the client's point of view some other updates leading to an incompatible instance should not be denied. We design a control method to resolve this seemingly paradoxical situation and then prove that the general security definitions of CQE, suitably extended to capture both query evaluation and view update processing, and other properties linked to view updates hold. Moreover, we further enhance that control method by adding an inference-proof subprotocol for refreshing the views of the other clients. To ensure inference-proofness, from the other clients' point of view, any view update might be a transaction, i.e., a sequence of elementary updates.1 1 This article extends, elaborates and clarifies our contribution [12] to DBSec 2009 and also comprises some results of our work [9] presented at ESORICS 2009. This article extends, elaborates and clarifies our contribution [12] to DBSec 2009 and also comprises some results of our work [9] presented at ESORICS 2009. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> A priori knowledge, confidentiality policy, controlled execution, controlled query evaluation, inference control, inference-proof, information system, integrity constraint, lying approach, propositional logic, reversibility, security, transaction, view refreshment, view update </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2011-0420 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 19, no. 3, pp. 487-529, 2011 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs420" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/19/3" /> <input type="hidden" name="id" value="ArticleId_jcs420" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs422"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs422" data-itemid="ArticleId_jcs422"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs422" data-p13n-articleid="journal-of-computer-security/jcs422" data-p13n-title=" Selective data outsourcing for enforcing privacy " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs422"> Selective data outsourcing for enforcing privacy </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Ciriani%2C+Valentina%22%29">Ciriani, Valentina</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22De+Capitani+di+Vimercati%2C+Sabrina%22%29">De Capitani di Vimercati, Sabrina</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Foresti%2C+Sara%22%29">Foresti, Sara</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Jajodia%2C+Sushil%22%29">Jajodia, Sushil</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Paraboschi%2C+Stefano%22%29">Paraboschi, Stefano</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Samarati%2C+Pierangela%22%29">Samarati, Pierangela</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>Existing approaches for protecting sensitive information outsourced at external “honest-but-curious” servers are typically based on an overlying layer of encryption applied to the whole database, or on the combined use of fragmentation and encryption. In this paper, we put forward a novel paradigm for preserving privacy in data outsourcing, which departs from encryption. The basic idea is to involve the owner in storing a limited portion of the data, while storing the remaining information in the clear at the external server. We analyze the problem of computing a fragmentation that minimizes the owner's workload, which is represented using different metrics</span> <span class="fold-elip">…</span><span class="below-fold hidden" >and corresponding weight functions, and prove that this minimization problem is NP-hard. We then introduce the definition of locally minimal fragmentation that is used to efficiently compute a fragmentation via a heuristic algorithm. The algorithm translates the problem of finding a locally minimal fragmentation in terms of a hypergraph 2-coloring problem. Finally, we illustrate the execution of queries on fragments and provide experimental results comparing the fragmentations returned by our heuristics with respect to optimal fragmentations. The experiments show that the heuristics guarantees a low computation cost and is able to compute a fragmentation close to optimum. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Privacy, confidentiality constraints, fragmentation, outsourcing </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2011-0422 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 19, no. 3, pp. 531-566, 2011 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs422" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/19/3" /> <input type="hidden" name="id" value="ArticleId_jcs422" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs421"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs421" data-itemid="ArticleId_jcs421"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs421" data-p13n-articleid="journal-of-computer-security/jcs421" data-p13n-title=" Management of security policy configuration using a Semantic Threat Graph approach " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs421"> Management of security policy configuration using a Semantic Threat Graph approach </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Foley%2C+Simon+N.%22%29">Foley, Simon N.</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Fitzgerald%2C+William+M.%22%29">Fitzgerald, William M.</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>Managing the configuration of heterogeneous enterprise security mechanisms is a complex task. The effectiveness of a configuration may be constrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management based approach, whereby knowledge about the effectiveness of mitigating countermeasures is used to guide the autonomic configuration of security mechanisms. This knowledge is modeled in terms of Semantic Threat Graphs, a variation of the traditional Threat/Attack Tree, extended in order to relate semantic information about security configuration with threats, vulnerabilities and countermeasures.</span> <span class="fold-elip">…</span><span class="below-fold hidden" >An ontology-based approach to representing and reasoning over this knowledge is taken. A case study based on Network Access Controls demonstrates how threats can be analysed and how automated configuration recommendations can be made based on catalogues of countermeasures. These countermeasures are drawn from best-practice standards, including NIST, IETF and PCI-DSS recommendations for firewall configuration. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> , Ontology, threat tree, firewall, security compliance </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2011-0421 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 19, no. 3, pp. 567-605, 2011 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs421" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/19/3" /> <input type="hidden" name="id" value="ArticleId_jcs421" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs423"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs423" data-itemid="ArticleId_jcs423"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs423" data-p13n-articleid="journal-of-computer-security/jcs423" data-p13n-title=" Efficiently enforcing spatiotemporal access control under uncertain location information " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs423"> Efficiently enforcing spatiotemporal access control under uncertain location information </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Shin%2C+Heechang%22%29">Shin, Heechang</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Atluri%2C+Vijayalakshmi%22%29">Atluri, Vijayalakshmi</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Cho%2C+June-suh%22%29">Cho, June-suh</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>In a mobile environment, user’s physical location plays an important role in determining access to resources. However, because current moving object databases do not keep the exact location of the moving objects, but rather maintain their approximate location for reasons of minimizing the updates, the access request evaluation cannot always guarantee the intended access control policy requirements. This may be risky to the system’s security, especially for highly sensitive resources. In this paper, we introduce an authorization model that takes the uncertainty of location measures into consideration for specifying and evaluating access control policies. An access request is granted only</span> <span class="fold-elip">…</span><span class="below-fold hidden" >if the confidence level of the location predicate exceeds the predefined uncertainty threshold level specified in the policy. However, this access request evaluation is computationally expensive as it requires to evaluate a location predicate condition and may also require evaluating the entire moving object database. For reducing the cost of evaluation, in this paper, we compute lower and upper bounds (R min and R max ) on the region that minimize the region to be evaluated, thereby allowing unneeded moving objects to be discarded from evaluation. To further minimize the region of evaluation, we propose to compute R min ′ and R max ′ that have smaller filter size so that filtering more objects out for evaluation. In addition, we extend our approach such that it does not require assumptions on the probability distribution functions. We show how these filters R min , R max , R min ′ , and R max ′ can be computed and maintained, and provide algorithms to process access requests. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Uncertain location, spatiotemporal access control, security, mobile environment </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2011-0423 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 19, no. 3, pp. 607-637, 2011 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs423" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/19/3" /> <input type="hidden" name="id" value="ArticleId_jcs423" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> </div> </div> <div class="pagination-bottom"> </div> <div class="citation-popup-container"></div> </div> </div> <div class="sidebar journal-sidebar col"> <div class="volume-list toc folded-section shadow border" id="table-of-content"> <ul> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume Pre-press </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/Pre-press/Pre-press">Issue Pre-press</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 32 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 31 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 30 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 29 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/1">Issue 1</a></li> </ul> </li> </ul> <div class="below-fold"> <ul> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 28 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 27 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 26 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 25 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/4-5">Issue 4-5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 24 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 23 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 22 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 21 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 20 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/1">Issue 1</a></li> </ul> </li> <li class="active"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-minus"></i>Volume 19 </button> <ul class="toggle-section open"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/4">Issue 4</a></li> <li class="active"><span><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/3">Issue 3</a></span></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 18 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 17 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 16 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 15 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 14 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 13 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 12 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/3-4">Issue 3-4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 11 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/11/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/11/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/11/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/11/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 10 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/10/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/10/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/10/1-2">Issue 1-2</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 9 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/9/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/9/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/9/1-2">Issue 1-2</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 8 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/8/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/8/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/8/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 7 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/7/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/7/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/7/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 6 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/6/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/6/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/6/1-2">Issue 1-2</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 5 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/5/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/5/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/5/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/5/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 4 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/4/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/4/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/4/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 3 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/3/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/3/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/3/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 2 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/2/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/2/2-3">Issue 2-3</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 1 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/1/3-4">Issue 3-4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/1/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/1/1">Issue 1</a></li> </ul> </li> </ul> </div> <div class="view-control-section"> <a class="view-more has-hidden-items" href="#">Show more</a> </div> </div> <div class="ad-block"> <div id="journal-sidebar-ad" data-mercury="full" class="sidebar-advert"><div> </div> <div> <br /> </div> <div> <a href="https://journals.sagepub.com/ios-press-info"><img src="/fragr/images/J24_4405 IOS Press Banner Ad Sage-IOS logo swap_moving_268x268.jpg" /></a> </div> <div> <br /> </div></div> </div> </div> </div> <div class="citation-popup-container"></div> </div> <div id="footer" class="footer block"> <a href="#header-skiplink" class="skiplinks">Go to header</a><a href="#nav-skiplink" class="skiplinks">Go to navigation</a><a href="#search-bar" class="skiplinks">Go to search</a><a href="#content" class="skiplinks">Go to contents</a><a href="#footer-skiplink" class="skiplinks">Go to footer</a> <a href="#content" class="skiplinks" id="footer-skiplink">In footer section. Select this link to jump to content</a> <div class="footer-primary container clearfix"> <div class="col-1by3 col"> <div class="spacing"> <ul> <li> <a href="https://content.iospress.com:443/sgk-login">Administrator log in</a> <p> <a href="https://shibboleth2sp.ios.semcs.net/shib?dest=https%3A%2F%2Fcontent.iospress.com%3A443%2FSHIBBOLETH%3Fdest%3Dhttps%253A%252F%252Fcontent.iospress.com%252Fjournals%252Fjournal-of-computer-security%252F19%252F3">Shibboleth log in</a> </p> </a> </li> <li> <a href="https://content.iospress.com:443/journals/">Journals</a> </li> <li> <a href="https://content.iospress.com:443/page/help">Help</a> </li> <li> <a href="https://content.iospress.com:443/page/about">About us</a> </li> <li> <a href="https://content.iospress.com:443/page/contact">Contact us</a> </li> </ul> </div> </div> <div class="col-1by3 col"> <div class="spacing"> <ul class="legal-links"> <li> <a href="https://content.iospress.com:443/page/terms" id="terms-of-use">Terms & conditions</a> </li> <li> <a href="https://content.iospress.com:443/page/privacy" id="cookies-hidden">Privacy policy</a> </li> <li> <span class="copy-right"> Copyright ©2025 IOS Press All rights reserved. </span> </li> </ul> </div> </div> <div class="col-1by3 col"> <div class="spacing last"> <ul class="social-media-tags"> <li><strong>Join our network: </strong></li> <li> <a href="https://twitter.com/iospress_stm" target="_blank"><i class="icon-twitter icon icon-big"></i>Twitter</a> </li> <li> <a href="https://www.facebook.com/publisheriospress" target="_blank"><i class="icon-facebook icon icon-big"></i>Facebook</a> </li> <li> <a href="https://www.linkedin.com/company/iospress" target="_blank"><i class="icon-linkedin icon icon-big"></i>LinkedIn</a> </li> </ul> </div> </div> </div><div class="footer-secondary"> <div class="container block"> <div class="col col-1by3"> <div class="spacing"> <h2>North America</h2> <p> IOS Press, Inc. <br/> 6751 Tepper Drive <br /> Clifton, VA 20124 <br /> USA <br /> </p> <p> Tel: +1 703 830 6300<br/> Fax: +1 703 830 2300 <br /> <a href="/cdn-cgi/l/email-protection#a9dac8c5ccdae9c0c6dad9dbccdada87cac6c4"><span class="__cf_email__" data-cfemail="0774666b6274476e687477756274742964686a">[email protected]</span></a> <br /> </p> <p class="info"> For editorial issues, like the status of your submitted paper or proposals, write to <a href="/cdn-cgi/l/email-protection#ef8a8b869b809d868e83af86809c9f9d8a9c9cc18183"><span class="__cf_email__" data-cfemail="2247464b564d504b434e624b4d5152504751510c4c4e">[email protected]</span></a> </p> </div> </div> <div class="col col-1by3"> <div class="spacing"> <h2>Europe</h2> <p> IOS Press <br/> Nieuwe Hemweg 6B <br /> 1013 BG Amsterdam <br /> The Netherlands <br /> </p> <p> Tel: +31 20 688 3355 <br/> Fax: +31 20 687 0091 <br /> <a href="/cdn-cgi/l/email-protection#b1d8dfd7def1d8dec2c1c3d4c2c29fdfdd"><span class="__cf_email__" data-cfemail="fc95929a93bc95938f8c8e998f8fd29290">[email protected]</span></a> <br /> </p> <p> For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office <a href="/cdn-cgi/l/email-protection#4b22252d240b2224383b392e3838652527"><span class="__cf_email__" data-cfemail="87eee9e1e8c7eee8f4f7f5e2f4f4a9e9eb">[email protected]</span></a> <br /> </p> </div> </div> <div class="col col-1by3"> <div class="spacing last"> <h2>Asia</h2> <p> Inspirees International (China Office) <br /> Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901 <br /> 100025, Beijing <br /> China <br /> <br /> Free service line: 400 661 8717 <br /> Fax: +86 10 8446 7947<br/> <a href="/cdn-cgi/l/email-protection#f99a91909798b990968a898b9c8a8ad79a97"><span class="__cf_email__" data-cfemail="ea898283848baa8385999a988f9999c48984">[email protected]</span></a> <br /> </p> <p> For editorial issues, like the status of your submitted paper or proposals, write to <a href="/cdn-cgi/l/email-protection#8feaebe6fbe0fde6eee3cfe6e0fcfffdeafcfca1e1e3"><span class="__cf_email__" data-cfemail="e1848588958e9388808da1888e929193849292cf8f8d">[email protected]</span></a> </p> <p> 如果您在出版方面需要帮助或有任何建, 件至: <a href="/cdn-cgi/l/email-protection#cfaaaba6bba0bda6aea38fa6a0bcbfbdaabcbce1a1a3"><span class="__cf_email__" data-cfemail="2d48494459425f444c416d44425e5d5f485e5e034341">[email protected]</span></a> <br /> </p> </div> </div> </div> </div><div class="container padded footer-credits block"> <div class="col col-1by2"> <img class="logo" src="https://content.iospress.com:443/static/img/mock_up_footer_new.png@2.6.8-2-gb19ff93" alt="IOS press, Impacting the world of science, Books & Journals, Online & Print"/> </div> <div class="col col-1by2 semantico-credits">Built on the Scolaris platform by: <a href="http://www.semantico.com"><img width="120" src="https://content.iospress.com:443/static/img/sem_logo.png@2.6.8-2-gb19ff93" alt="Semantico" /></a></div> </div> </div> <!--[if lt IE 8]> <script src="https://content.iospress.com:443/static/js/source/vendor/json3.js@2.6.8-2-gb19ff93" ></script> <script src="https://content.iospress.com:443/static/js/source/vendor/storage.js@2.6.8-2-gb19ff93" ></script> <!<![endif]--> <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="https://content.iospress.com:443/static/js/compiled/compiled.min.js@2.6.8-2-gb19ff93"></script> <script src="//cdn.mathjax.org/mathjax/latest/MathJax.js?config=MML_HTMLorMML" async></script> </body> </html> <!-- com.semantico.sgk.client.AuthInfoImpl@bca8457[accountId=<null>,relatedAccountIds=[],accountType=<null>,authCredentials=[],roamingPassportCredentialType=<null>,roamingPassportCredentialValue=<null>,roamingPassportDateSet=<null>,roamingPassportDateExpires=<null>,roamingPassportUsed=false,baseUrl=<null>,contentUnits={},failOpen=false,organisation=<null>,preferences={},products=[],requestedUrl=<null>,siteId=<null>,secondarySiteIds=<null>,userId=<null>,subscribedProductUrls={},subscribedSiteIds=[],secondarySiteProducts={},secondarySiteContentUnitTypes={},subsIdContentUnits={},accIdSubsIds={},subsIdType={},subsIdPreferences={},subsIdConcurrencyType={}] --> <!-- mvn: 2.6.9-SNAPSHOT --> <!-- git: 2.6.8-2-gb19ff93 --> <!-- cspiosadmin30xa.cloud.ios.semcs.net --> <!-- loggedInP13n: java.lang.Boolean@122a4532[value=false] --> <!-- loggedInFragr: false --> <!-- client ip: 8.222.208.146 --> <!-- ecommerce: true --> <!-- shibboleth: true --> <!-- default-counter: true -->