CINXE.COM
Journal of Computer Security - Volume 18, issue 6 - Journals - IOS Press
<!doctype html> <!--[if lte IE 8]> <html class="no-js oldie" xmlns:mml="http://www.w3.org/1998/Math/MathML" lang="en"> <![endif]--> <!--[if gt IE 8]><!--> <html class="no-js" xmlns:mml="http://www.w3.org/1998/Math/MathML" lang="en"> <!--<![endif]--> <head> <meta charset="utf-8"> <title>Journal of Computer Security - Volume 18, issue 6 - Journals - IOS Press</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <!-- These tags have been added for Google Scholar. --> <!-- see: http://scholar.google.com/intl/en/scholar/inclusion.html --> <!-- Three fields are required at a minimum: title, at least one author, publication date --> <meta name="citation_title" content="Journal of Computer Security - Volume 18, issue 6 - Journals"> <meta name="citation_journal_title" content="Journal of Computer Security"> <meta name="citation_issn" content="0926-227X"/> <meta name="citation_volume" content="18"/> <meta name="citation_issue" content="6"/> <meta name="citation_publisher" content="IOS Press"> <meta name="format-detection" content="telephone=no" /> <link rel="search" href="/opensearch.xml?title=Scolaris&autocompletePath=%2Fautocomplete%3Fq%3D%7BsearchTerms%7D" type="application/opensearchdescription+xml" title="Scolaris" /> <link href='//fonts.googleapis.com/css?family=PT+Sans:400,700%7CPT+Serif:400,700' rel='stylesheet' type='text/css'> <link rel="stylesheet" href="https://content.iospress.com:443/static/less/journals.less.css@2.6.8-2-gb19ff93" /> <script src="https://content.iospress.com:443/static/js/libs/modernizr-2.5.3.min.js@2.6.8-2-gb19ff93"></script> <link rel="shortcut icon" href="https://content.iospress.com:443/static/img/favicon.ico@2.6.8-2-gb19ff93" /> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-PJ8NZ9C');</script> <!-- End Google Tag Manager --> </head> <body class="page-journals loading" data-baseurl="https://content.iospress.com:443/" data-git="@2.6.8-2-gb19ff93" data-p13n="no" data-saved-alerts="true" data-ecommerce="true" data-shibboleth="true" data-default-counter="true" > <div class="no-js-message"> <i class="icon-warning-sign" role="presentation"></i> You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly. </div> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-PJ8NZ9C" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'GTM-PJ8NZ9C', 'auto'); ga('send', 'pageview'); </script> <!-- End Google Tag Manager (noscript) --> <a href="#header-skiplink" class="skiplinks">Go to header</a><a href="#nav-skiplink" class="skiplinks">Go to navigation</a><a href="#search-bar" class="skiplinks">Go to search</a><a href="#content" class="skiplinks">Go to contents</a><a href="#footer-skiplink" class="skiplinks">Go to footer</a> <div class="header-block"> <header id="header" class="header block"> <a href="#nav-skiplink" class="skiplinks" id="header-skiplink">In header section. Select this link to jump to navigation</a> <div class="container"> <div class="logo" style="width: 35%"> <a href="https://content.iospress.com:443/" title="Home" class="header-home-link"> <img src="https://content.iospress.com:443/static/img/latest_header_img.png@2.6.8-2-gb19ff93" alt="IOS Press" style="max-width: 80%"/> </a> </div> <div class="header-menu clearfix"> <ul class=""> <li class=""><a href="https://content.iospress.com:443/page/help">Help</a></li> <li class=""><a href="https://content.iospress.com:443/page/about">About us</a></li> <li class=""><a href="https://content.iospress.com:443/page/contact">Contact us</a></li> </ul> </div> </div> </header> <nav id="nav" class="nav"> <a href="#content" class="skiplinks" id="nav-skiplink">In navigation section. Select this link to jump to content</a> <div class="menu-mobile js-toggle-handle"> <a class="menu-mobile-text" href="#" title="Main menu"> Menu</a> </div> <div class="container nav-menu-dropdown toggle-section clearfix"> <ul class="nav-item nav-main"> <!--Add selected class if you want to display the nav for the current page as selected --> <li class="nav-item"><a href="https://content.iospress.com:443/">Home</a></li> <li class="nav-item selected"><a href="https://content.iospress.com:443/journals/">Journals</a></li> </ul> <ul class="nav-item nav-sp-side nav-sub clearfix"> <li> <form class="getCartForm" id="getCart" method="get" action="https://content.iospress.com:443/cart"> <button class="getCartButton"> <i class="icon-shopping-cart"></i> Cart <span class="shopping-cart"> </span> </button> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/18/6" /> <span class="currency-section"> <span class="selected-currency">€</span> <button class="currency-change" data-currency="US_DOLLAR"><span class="visuallyhidden">title="Change currency to USD - US Dollar"</span>$</button> </span> </form> </li> <li> <a id="p13n-menu" href="/login?dest=https://content.iospress.com:443/" data-recaptchasitekey="6LfnJVIUAAAAAE-bUOMg0MJGki4lqSvDmhJp19fN"> Log in / Register </a> <div id="p13n-dd" class="p13n-dd"></div> <div class="p13n-modal-overlay"></div> <div id="p13n-history" data-uri="https://content.iospress.com:443/checkout/purchase-history"></div> </li> </ul> </div> </nav> <div id="search" class="search-complex" role="search"> <div class="container"> <form id="search-form" action="https://content.iospress.com:443/search" class="search-form block clearfix"> <div class="wrap-input clearfix"> <i role="presentation" class="icon-search"></i> <label for="search-bar" class="visuallyhidden">Search</label> <input id="search-bar" type="search" name="q" placeholder="Search" class="search-query search-input focused" value="" required="required"> <button type="submit" class="search-btn btn">Search</button> <input name="published_between" type="hidden" /> <input name="from_year" type="hidden" /> <input name="to_year" type="hidden"/> </div> </form> <div class="search-row second-search-row clearfix"> <form id="peer-review-form"> <label class="search-label published-label" for="published-between"> <input id="published-between" name="published_between" type="checkbox" /> Published between: </label> <label class="visuallyhidden" for="from-year">Published from year:</label> <input class="tinput search-year search-year-from" id="from-year" name="from_year" type="text" placeholder="YYYY" pattern="\d{4,4}" /> <span>and</span> <label class="visuallyhidden" for="to-year">Published to year:</label> <input class="tinput search-year" id="to-year" name="to_year" type="text" placeholder="YYYY" pattern="\d{4,4}" /> <a class="search-syntax" href="#">Search syntax help</a> </form> </div> <div id="search-syntax" class="search-helptext"> <div class='container'> <div class="search-row search-syntax-row clearfix"> <div class="search-syntax-content"> <p class='intro'>Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.</p> <dl> <dt>Boolean operators</dt> <dd>This <strong>OR</strong> that<br />This <strong>AND</strong> that<br />This <strong>NOT</strong> that</dd> <dt>Must include "This" and "That"</dt> <dd>This That</dd> <dt class="grouped">Must not include "That"</dt> <dd class="grouped">This -That</dd> <dt class="grouped">"This" is optional</dt> <dd class="grouped">This +That</dd> <dt>Exact phrase "This That"</dt> <dd>"This That"</dd> <dt>Grouping</dt> <dd>(this <strong>AND</strong> that) <strong>OR</strong> (that <strong>AND</strong> other)</dd> </dl> </div> </div> </div> </div> </div> </div> </div> <div class="container main-container"> <a href="#nav-skiplink" class="skiplinks" id="content">In content section. Select this link to jump to navigation</a> <script> ga('set', 'dimension3',"Journal of Computer Security"); ga('set', 'metric2', 1 ); ga('set', 'dimension4',"Volume 18"); ga('set', 'metric3', 1 ); ga('set', 'metric4', 1 ); ga('set', 'dimension5',"Issue 6"); ga('send', 'pageview', "/Journal of Computer Security/"); </script> <script>window.latestLoadTimestamp=1739893923824;</script> <div class="block journal-overview shadow border"> <div class="journal-overview-header block"> <div class="main col"><h1>Journal of Computer Security - Volume 18, issue 6</h1></div> <span class="main col"><div class="pricing-journal"> <p>Purchase individual online access for 1 year to this journal.</p> <strong>Price: EUR 260.00</strong> <form class="add-to-cart-form" id="add-JournalId_jcs" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/18/6" /> <input type="hidden" name="id" value="JournalId_jcs" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div></span> <span class="sidebar col" data-toc="Journal of Computer Security" data-toc-url="q=s2_parent_title_id%3Ajournal-of-computer-security" data-toc-journal-uri="journals/journal-of-computer-security" data-toc-q="s2_parent_title_id:journal-of-computer-security" data-toc-journal-name="Journal of Computer Security"> <span class="p13n-toc"> <button class="btn btn-p13n save-toc open-p13n-modal">Enable new issue alert</button> </span> </span> </div> <div class="journal-info block"> <div class="main col"> <div class="journal-cover col col-1by4"> <div class="journal-cover-img"> <img id="journal-of-computer-security-image" data-mercury="image" src="/fragr/images/JCS_21.jpg" /> </div> <div id="journal-of-computer-security-data" data-mercury="full" class="journals-data">ISSN 0926-227X (P) <br />ISSN 1875-8924 (E) <dl> </dl></div> </div> <div class="journal-details col col-3by4"> <div id="journal-of-computer-security-above-fold" data-mercury="full" class="clearfix above-fold details"><p><b>Impact Factor 2024: 0.9</b></p> <p>The <i>Journal of Computer Security</i> presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems. It also provides a forum for ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community.</p></div> <div id="journal-of-computer-security-below-fold" data-mercury="full" class="clearfix below-fold details toggle-section"><p>The journal provides an opportunity to publish articles of greater depth and length than is possible in the proceedings of various existing conferences, while addressing an audience of researchers in computer security who can be assumed to have a more specialized background than the readership of other archival publications. The journal welcomes contributions on all aspects of computer security: confidentiality, integrity, and assurance of service - that is, protection against unauthorized disclosure or modification of sensitive information, or denial of service. Of interest is a precise understanding of security policies through modelling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware systems implementing them.</p></div> <button class="btn btn-link js-toggle-handle"><span class="toggle-text-handle">Show more</span><span class="toggle-text-handle toggle-text-hide">Show less</span></button> </div> </div> <div class="sidebar col"> <div id="journal-of-computer-security-action-links" data-mercury="full" class="action-links"><a target="_blank" href="http://www.iospress.nl/recommend-this-title/?title=Journal%20of%20Computer%20Security&url=www.iospress.nl/journal/journal-of-computer-security/"></a> <a href="https://journals.sagepub.com/home/jcu" target="_blank"><img src="/fragr/images/J25_4629 IOS have moved ad for HW platform_268x268.jpg" /></a> <br /> <br /> <a href="http://www.iospress.nl/journal/journal-of-computer-security/?tab=submission-of-manuscripts"></a></div> </div> </div> </div> <div class="volume-listing main col"> <div class="col-spacing"> <div class="search-content border shadow"> <div class="search-result-header clearfix"> <div class="search-results-bulk-action bulk-action clearfix"> <button id="mark-toggle" class="btn-link mark-toggle"><i class="icon-check-empty" id="mark-all"></i><span> Mark all</span></button> <form class="add-to-cart-form add-marked-to-cart" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/18/6" /> <button class="btn btn-link btn-cart add-multiple disabled" disabled>Add marked to cart</button> </form> <form class="add-marked get-citation" method="post"> <button class="btn btn-link cite-multiple disabled" disabled>Export marked citations</button> </form> </div> </div> <div id="article-list"> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs390"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs390" data-itemid="ArticleId_jcs390"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs390" data-p13n-articleid="journal-of-computer-security/jcs390" data-p13n-title=" Editorial " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs390"> Editorial </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Focardi%2C+Riccardo%22%29">Focardi, Riccardo</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Editorial </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2009-0390 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 18, no. 6, pp. 969-969, 2010 </p> </div> <div class="pricing"> <a href="https://content.iospress.com:443/download/journal-of-computer-security/jcs390?id=journal-of-computer-security%2Fjcs390" class="btn btn-download btn-right get-pdf" target="_blank" data-articleid="journal-of-computer-security/jcs390" data-journal="Journal of Computer Security" data-volume="Volume 18" data-issue="Issue 6" data-article="Editorial"> <i class="icon-download-alt" role="presentation"></i>Get PDF </a> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs387"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs387" data-itemid="ArticleId_jcs387"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs387" data-p13n-articleid="journal-of-computer-security/jcs387" data-p13n-title=" Verifying resource access control on mobile interactive devices " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs387"> Verifying resource access control on mobile interactive devices </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Besson%2C+Fr%C3%A9d%C3%A9ric%22%29">Besson, Frédéric</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Dufay%2C+Guillaume%22%29">Dufay, Guillaume</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Jensen%2C+Thomas%22%29">Jensen, Thomas</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Pichardie%2C+David%22%29">Pichardie, David</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Java-enabled mobile telephones. We extend the Java model to include access control permissions with multiplicities in order to allow to use a permission a certain number of times. We define a program model based on control flow graphs together with its operational semantics and provide a formal definition of the basic security policy to enforce viz that an application will always ask</span> <span class="fold-elip">…</span><span class="below-fold hidden" >for a permission before using it to access a resource. A static analysis which enforces the security policy is defined and proved correct. A constraint solving algorithm implementing the analysis is presented. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Resource access control, static analysis </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2009-0387 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 18, no. 6, pp. 971-998, 2010 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs387" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/18/6" /> <input type="hidden" name="id" value="ArticleId_jcs387" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs388"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs388" data-itemid="ArticleId_jcs388"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs388" data-p13n-articleid="journal-of-computer-security/jcs388" data-p13n-title=" Computationally sound analysis of protocols using bilinear pairings " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs388"> Computationally sound analysis of protocols using bilinear pairings </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Kremer%2C+Steve%22%29">Kremer, Steve</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Mazar%C3%A9%2C+Laurent%22%29">Mazaré, Laurent</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>In this paper, we introduce a symbolic model to analyse protocols that use a bilinear pairing between two cyclic groups. This model consists in an extension of the Abadi–Rogaway logic and we prove that the logic is still computationally sound: symbolic indistinguishability implies computational indistinguishability provided that the Bilinear Decisional Diffie–Hellman assumption holds and that the encryption scheme is IND-CPA secure. We illustrate our results on classical protocols using bilinear pairing like Joux tripartite Diffie–Hellman protocol or the TAK-2 and TAK-3 protocols. We also investigate the security of a newly designed variant of the Burmester–Desmedt protocol using bilinear pairings. More</span> <span class="fold-elip">…</span><span class="below-fold hidden" >precisely, we show for each of these protocols that the generated key is indistinguishable from a random element. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Security, formal methods, Dolev–Yao model, computational soundness, bilinear pairing </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2009-0388 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 18, no. 6, pp. 999-1033, 2010 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs388" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/18/6" /> <input type="hidden" name="id" value="ArticleId_jcs388" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs389"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs389" data-itemid="ArticleId_jcs389"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs389" data-p13n-articleid="journal-of-computer-security/jcs389" data-p13n-title=" Inductive trace properties for computational security " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs389"> Inductive trace properties for computational security </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Roy%2C+Arnab%22%29">Roy, Arnab</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Datta%2C+Anupam%22%29">Datta, Anupam</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Derek%2C+Ante%22%29">Derek, Ante</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Mitchell%2C+John+C.%22%29">Mitchell, John C.</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protocol and adversary). Computational secrecy conditions, on the other hand, often are not trace based: the ability to computationally distinguish a system that transmits a secret from one that does not is measured by overall success on the set of all traces of each system. Non-trace-based properties present a challenge for inductive or compositional methods: induction is a natural way of reasoning about traces of a system, but it does not appear directly applicable to non-trace properties. We</span> <span class="fold-elip">…</span><span class="below-fold hidden" >therefore investigate the semantic connection between trace properties that could be established by induction and non-trace-based security requirements. Specifically, we prove that a certain trace property implies computational secrecy and authentication properties, assuming the encryption scheme provides chosen ciphertext security and ciphertext integrity. We also prove a similar theorem for computational secrecy assuming Decisional Diffie–Hellman and a chosen plaintext secure encryption scheme. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Inductive proofs, protocols, computational security </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2009-389 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 18, no. 6, pp. 1035-1073, 2010 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs389" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/18/6" /> <input type="hidden" name="id" value="ArticleId_jcs389" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs391"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs391" data-itemid="ArticleId_jcs391"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs391" data-p13n-articleid="journal-of-computer-security/jcs391" data-p13n-title=" Preface " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs391"> Preface </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Sabelfeld%2C+Andrei%22%29">Sabelfeld, Andrei</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Editorial </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2009-0391 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 18, no. 6, pp. 1075-1075, 2010 </p> </div> <div class="pricing"> <a href="https://content.iospress.com:443/download/journal-of-computer-security/jcs391?id=journal-of-computer-security%2Fjcs391" class="btn btn-download btn-right get-pdf" target="_blank" data-articleid="journal-of-computer-security/jcs391" data-journal="Journal of Computer Security" data-volume="Volume 18" data-issue="Issue 6" data-article="Preface"> <i class="icon-download-alt" role="presentation"></i>Get PDF </a> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs392"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs392" data-itemid="ArticleId_jcs392"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs392" data-p13n-articleid="journal-of-computer-security/jcs392" data-p13n-title=" Computational soundness of symbolic zero-knowledge proofs " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs392"> Computational soundness of symbolic zero-knowledge proofs </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Backes%2C+Michael%22%29">Backes, Michael</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Unruh%2C+Dominique%22%29">Unruh, Dominique</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>The abstraction of cryptographic operations by term algebras, called Dolev–Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significant progress was made in proving that Dolev–Yao models offering the core cryptographic operations such as encryption and digital signatures can be sound with respect to actual cryptographic realizations and security definitions. Recent work, however, has started to extend Dolev–Yao models to more sophisticated operations with unique security features. Zero-knowledge proofs arguably constitute the most amazing such extension. In this paper, we first identify which additional properties a cryptographic (non-interactive) zero-knowledge proof needs to fulfill in</span> <span class="fold-elip">…</span><span class="below-fold hidden" >order to serve as a computationally sound implementation of symbolic (Dolev–Yao style) zero-knowledge proofs; this leads to the novel definition of a symbolically-sound zero-knowledge proof system. We prove that even in the presence of arbitrary active adversaries, such proof systems constitute computationally sound implementations of symbolic zero-knowledge proofs. This yields the first computational soundness result for symbolic zero-knowledge proofs and the first such result against fully active adversaries of Dolev–Yao models that go beyond the core cryptographic operations. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Computational soundness, zero-knowledge, symbolic cryptography </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2009-0392 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 18, no. 6, pp. 1077-1155, 2010 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs392" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/18/6" /> <input type="hidden" name="id" value="ArticleId_jcs392" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs393"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs393" data-itemid="ArticleId_jcs393"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs393" data-p13n-articleid="journal-of-computer-security/jcs393" data-p13n-title=" Hyperproperties " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs393"> Hyperproperties </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Clarkson%2C+Michael+R.%22%29">Clarkson, Michael R.</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Schneider%2C+Fred+B.%22%29">Schneider, Fred B.</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>Trace properties, which have long been used for reasoning about systems, are sets of execution traces. Hyperproperties, introduced here, are sets of trace properties. Hyperproperties can express security policies, such as secure information flow and service level agreements, that trace properties cannot. Safety and liveness are generalized to hyperproperties, and every hyperproperty is shown to be the intersection of a safety hyperproperty and a liveness hyperproperty. A verification technique for safety hyperproperties is given and is shown to generalize prior techniques for verifying secure information flow. Refinement is shown to be applicable with safety hyperproperties. A topological characterization of hyperproperties</span> <span class="fold-elip">…</span><span class="below-fold hidden" >is given. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Security policies, information flow, safety, liveness </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2009-0393 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 18, no. 6, pp. 1157-1210, 2010 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs393" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/18/6" /> <input type="hidden" name="id" value="ArticleId_jcs393" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs394"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs394" data-itemid="ArticleId_jcs394"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs394" data-p13n-articleid="journal-of-computer-security/jcs394" data-p13n-title=" Formal security analysis of PKCS#11 and proprietary extensions " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs394"> Formal security analysis of PKCS#11 and proprietary extensions </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Delaune%2C+St%C3%A9phanie%22%29">Delaune, Stéphanie</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Kremer%2C+Steve%22%29">Kremer, Steve</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Steel%2C+Graham%22%29">Steel, Graham</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>PKCS#11 defines an API for cryptographic devices that has been widely adopted in industry. However, it has been shown to be vulnerable to a variety of attacks that could, for example, compromise the sensitive keys stored on the device. In this paper, we set out a formal model of the operation of the API, which differs from previous security API models notably in that it accounts for non-monotonic mutable global state. We give decidability results for our formalism, and describe an implementation of the resulting decision procedure using the model checker NuSMV. We report some new attacks and prove the</span> <span class="fold-elip">…</span><span class="below-fold hidden" >safety of some configurations of the API in our model. We also analyse proprietary extensions proposed by nCipher (Thales) and Eracom (Safenet), designed to address the shortcomings of PKCS#11. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Security APIs, PKCS#11, cryptographic devices, decidability, model checking </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2009-0394 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 18, no. 6, pp. 1211-1245, 2010 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs394" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/18/6" /> <input type="hidden" name="id" value="ArticleId_jcs394" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs395"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs395" data-itemid="ArticleId_jcs395"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs395" data-p13n-articleid="journal-of-computer-security/jcs395" data-p13n-title=" Finite models for formal security proofs " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs395"> Finite models for formal security proofs </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Goubault-Larrecq%2C+Jean%22%29">Goubault-Larrecq, Jean</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>First-order logic models of security for cryptographic protocols, based on variants of the Dolev–Yao model, are now well-established tools. Given that we have checked a given security protocol π using a given first-order prover, how hard is it to extract a formally checkable proof of it, as required in, e.g., common criteria at the highest evaluation level (EAL7)? We demonstrate that this is surprisingly hard in the general case: the problem is non-recursive. Nonetheless, we show that we can instead extract finite models M from a set S of clauses representing π , automatically, and</span> <span class="fold-elip">…</span><span class="below-fold hidden" >give two ways of doing so. We then define a model-checker testing M ⊧ S , and show how we can instrument it to output a formally checkable proof, e.g., in Coq. Experience on a number of protocols shows that this is practical, and that even complex (secure) protocols modulo equational theories have small finite models, making our approach suitable. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Dolev–Yao model, formal security proof, finite model, tree automaton, ℋ1, inductionless induction </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2009-0395 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 18, no. 6, pp. 1247-1299, 2010 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs395" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/18/6" /> <input type="hidden" name="id" value="ArticleId_jcs395" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs186ai"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs186ai" data-itemid="ArticleId_jcs186ai"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs186ai" data-p13n-articleid="journal-of-computer-security/jcs186ai" data-p13n-title=" Author Index Volume 18 (2010) " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs186ai"> Author Index Volume 18 (2010) </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Article Type:</span> Other </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-2010-18610 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. 18, no. 6, pp. 1301-1305, 2010 </p> </div> <div class="pricing"> <a href="https://content.iospress.com:443/download/journal-of-computer-security/jcs186ai?id=journal-of-computer-security%2Fjcs186ai" class="btn btn-download btn-right get-pdf" target="_blank" data-articleid="journal-of-computer-security/jcs186ai" data-journal="Journal of Computer Security" data-volume="Volume 18" data-issue="Issue 6" data-article="Author Index Volume 18 (2010)"> <i class="icon-download-alt" role="presentation"></i>Get PDF </a> </div> </div> </div> </div> </div> <div class="pagination-bottom"> </div> <div class="citation-popup-container"></div> </div> </div> <div class="sidebar journal-sidebar col"> <div class="volume-list toc folded-section shadow border" id="table-of-content"> <ul> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume Pre-press </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/Pre-press/Pre-press">Issue Pre-press</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 32 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 31 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 30 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 29 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/1">Issue 1</a></li> </ul> </li> </ul> <div class="below-fold"> <ul> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 28 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 27 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 26 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 25 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/4-5">Issue 4-5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 24 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 23 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 22 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 21 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 20 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 19 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/1">Issue 1</a></li> </ul> </li> <li class="active"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-minus"></i>Volume 18 </button> <ul class="toggle-section open"> <li class="active"><span><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/6">Issue 6</a></span></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 17 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 16 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 15 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 14 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 13 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 12 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/3-4">Issue 3-4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 11 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/11/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/11/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/11/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/11/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 10 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/10/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/10/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/10/1-2">Issue 1-2</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 9 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/9/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/9/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/9/1-2">Issue 1-2</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 8 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/8/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/8/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/8/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 7 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/7/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/7/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/7/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 6 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/6/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/6/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/6/1-2">Issue 1-2</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 5 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/5/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/5/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/5/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/5/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 4 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/4/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/4/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/4/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 3 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/3/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/3/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/3/1">Issue 1</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 2 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/2/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/2/2-3">Issue 2-3</a></li> </ul> </li> <li class="hidden"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 1 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/1/3-4">Issue 3-4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/1/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/1/1">Issue 1</a></li> </ul> </li> </ul> </div> <div class="view-control-section"> <a class="view-more has-hidden-items" href="#">Show more</a> </div> </div> <div class="ad-block"> <div id="journal-sidebar-ad" data-mercury="full" class="sidebar-advert"><div> </div> <div> <br /> </div> <div> <a href="https://journals.sagepub.com/ios-press-info"><img src="/fragr/images/J24_4405 IOS Press Banner Ad Sage-IOS logo swap_moving_268x268.jpg" /></a> </div> <div> <br /> </div></div> </div> </div> </div> <div class="citation-popup-container"></div> </div> <div id="footer" class="footer block"> <a href="#header-skiplink" class="skiplinks">Go to header</a><a href="#nav-skiplink" class="skiplinks">Go to navigation</a><a href="#search-bar" class="skiplinks">Go to search</a><a href="#content" class="skiplinks">Go to contents</a><a href="#footer-skiplink" class="skiplinks">Go to footer</a> <a href="#content" class="skiplinks" id="footer-skiplink">In footer section. Select this link to jump to content</a> <div class="footer-primary container clearfix"> <div class="col-1by3 col"> <div class="spacing"> <ul> <li> <a href="https://content.iospress.com:443/sgk-login">Administrator log in</a> <p> <a href="https://shibboleth2sp.ios.semcs.net/shib?dest=https%3A%2F%2Fcontent.iospress.com%3A443%2FSHIBBOLETH%3Fdest%3Dhttps%253A%252F%252Fcontent.iospress.com%252Fjournals%252Fjournal-of-computer-security%252F18%252F6">Shibboleth log in</a> </p> </a> </li> <li> <a href="https://content.iospress.com:443/journals/">Journals</a> </li> <li> <a href="https://content.iospress.com:443/page/help">Help</a> </li> <li> <a href="https://content.iospress.com:443/page/about">About us</a> </li> <li> <a href="https://content.iospress.com:443/page/contact">Contact us</a> </li> </ul> </div> </div> <div class="col-1by3 col"> <div class="spacing"> <ul class="legal-links"> <li> <a href="https://content.iospress.com:443/page/terms" id="terms-of-use">Terms & conditions</a> </li> <li> <a href="https://content.iospress.com:443/page/privacy" id="cookies-hidden">Privacy policy</a> </li> <li> <span class="copy-right"> Copyright ©2025 IOS Press All rights reserved. </span> </li> </ul> </div> </div> <div class="col-1by3 col"> <div class="spacing last"> <ul class="social-media-tags"> <li><strong>Join our network: </strong></li> <li> <a href="https://twitter.com/iospress_stm" target="_blank"><i class="icon-twitter icon icon-big"></i>Twitter</a> </li> <li> <a href="https://www.facebook.com/publisheriospress" target="_blank"><i class="icon-facebook icon icon-big"></i>Facebook</a> </li> <li> <a href="https://www.linkedin.com/company/iospress" target="_blank"><i class="icon-linkedin icon icon-big"></i>LinkedIn</a> </li> </ul> </div> </div> </div><div class="footer-secondary"> <div class="container block"> <div class="col col-1by3"> <div class="spacing"> <h2>North America</h2> <p> IOS Press, Inc. <br/> 6751 Tepper Drive <br /> Clifton, VA 20124 <br /> USA <br /> </p> <p> Tel: +1 703 830 6300<br/> Fax: +1 703 830 2300 <br /> <a href="/cdn-cgi/l/email-protection#89fae8e5ecfac9e0e6faf9fbecfafaa7eae6e4"><span class="__cf_email__" data-cfemail="4e3d2f222b3d0e27213d3e3c2b3d3d602d2123">[email protected]</span></a> <br /> </p> <p class="info"> For editorial issues, like the status of your submitted paper or proposals, write to <a href="/cdn-cgi/l/email-protection#385d5c514c574a5159547851574b484a5d4b4b165654"><span class="__cf_email__" data-cfemail="096c6d607d667b6068654960667a797b6c7a7a276765">[email protected]</span></a> </p> </div> </div> <div class="col col-1by3"> <div class="spacing"> <h2>Europe</h2> <p> IOS Press <br/> Nieuwe Hemweg 6B <br /> 1013 BG Amsterdam <br /> The Netherlands <br /> </p> <p> Tel: +31 20 688 3355 <br/> Fax: +31 20 687 0091 <br /> <a href="/cdn-cgi/l/email-protection#20494e464f60494f5350524553530e4e4c"><span class="__cf_email__" data-cfemail="41282f272e01282e3231332432326f2f2d">[email protected]</span></a> <br /> </p> <p> For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office <a href="/cdn-cgi/l/email-protection#fb92959d94bb9294888b899e8888d59597"><span class="__cf_email__" data-cfemail="98f1f6fef7d8f1f7ebe8eafdebebb6f6f4">[email protected]</span></a> <br /> </p> </div> </div> <div class="col col-1by3"> <div class="spacing last"> <h2>Asia</h2> <p> Inspirees International (China Office) <br /> Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901 <br /> 100025, Beijing <br /> China <br /> <br /> Free service line: 400 661 8717 <br /> Fax: +86 10 8446 7947<br/> <a href="/cdn-cgi/l/email-protection#06656e6f6867466f69757674637575286568"><span class="__cf_email__" data-cfemail="583b303136391831372b282a3d2b2b763b36">[email protected]</span></a> <br /> </p> <p> For editorial issues, like the status of your submitted paper or proposals, write to <a href="/cdn-cgi/l/email-protection#086d6c617c677a6169644861677b787a6d7b7b266664"><span class="__cf_email__" data-cfemail="e98c8d809d869b808885a980869a999b8c9a9ac78785">[email protected]</span></a> </p> <p> 如果您在出版方面需要帮助或有任何建, 件至: <a href="/cdn-cgi/l/email-protection#2346474a574c514a424f634a4c5053514650500d4d4f"><span class="__cf_email__" data-cfemail="2f4a4b465b405d464e436f46405c5f5d4a5c5c014143">[email protected]</span></a> <br /> </p> </div> </div> </div> </div><div class="container padded footer-credits block"> <div class="col col-1by2"> <img class="logo" src="https://content.iospress.com:443/static/img/mock_up_footer_new.png@2.6.8-2-gb19ff93" alt="IOS press, Impacting the world of science, Books & Journals, Online & Print"/> </div> <div class="col col-1by2 semantico-credits">Built on the Scolaris platform by: <a href="http://www.semantico.com"><img width="120" src="https://content.iospress.com:443/static/img/sem_logo.png@2.6.8-2-gb19ff93" alt="Semantico" /></a></div> </div> </div> <!--[if lt IE 8]> <script src="https://content.iospress.com:443/static/js/source/vendor/json3.js@2.6.8-2-gb19ff93" ></script> <script src="https://content.iospress.com:443/static/js/source/vendor/storage.js@2.6.8-2-gb19ff93" ></script> <!<![endif]--> <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="https://content.iospress.com:443/static/js/compiled/compiled.min.js@2.6.8-2-gb19ff93"></script> <script src="//cdn.mathjax.org/mathjax/latest/MathJax.js?config=MML_HTMLorMML" async></script> </body> </html> <!-- com.semantico.sgk.client.AuthInfoImpl@5a898c1e[accountId=<null>,relatedAccountIds=[],accountType=<null>,authCredentials=[],roamingPassportCredentialType=<null>,roamingPassportCredentialValue=<null>,roamingPassportDateSet=<null>,roamingPassportDateExpires=<null>,roamingPassportUsed=false,baseUrl=<null>,contentUnits={},failOpen=false,organisation=<null>,preferences={},products=[],requestedUrl=<null>,siteId=<null>,secondarySiteIds=<null>,userId=<null>,subscribedProductUrls={},subscribedSiteIds=[],secondarySiteProducts={},secondarySiteContentUnitTypes={},subsIdContentUnits={},accIdSubsIds={},subsIdType={},subsIdPreferences={},subsIdConcurrencyType={}] --> <!-- mvn: 2.6.9-SNAPSHOT --> <!-- git: 2.6.8-2-gb19ff93 --> <!-- cspiosadmin30xa.cloud.ios.semcs.net --> <!-- loggedInP13n: java.lang.Boolean@122a4532[value=false] --> <!-- loggedInFragr: false --> <!-- client ip: 8.222.208.146 --> <!-- ecommerce: true --> <!-- shibboleth: true --> <!-- default-counter: true -->