default search action
15th CSFW 2002: Cape Breton, Nova Scotia, Canada
- 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada. IEEE Computer Society 2002, ISBN 0-7695-1689-0
Information Flow I
- Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky:
Approximate Non-Interference. 3-17 - Gavin Lowe:
Quantifying Information Flow. 18-31 - Joseph Y. Halpern, Kevin R. O'Neill:
Secrecy in Multiagent Systems. 32-
Intrusion
- Somesh Jha, Oleg Sheyner, Jeannette M. Wing:
Two Formal Analys s of Attack Graphs. 49-63 - Jean-Philippe Pouzol, Mireille Ducassé:
Formal Specification of Intrusion Signatures and Detection Rules. 64-
Protocols I
- Andrew D. Gordon, Alan Jeffrey:
Types and Effects for Asymmetric Cryptographic Protocols. 77-91 - Joshua D. Guttman:
Security Protocol Design via Authentication Tests. 92-103 - James Heather:
Strand Spaces and Rank Functions: More than Distant Cousins. 104-
Applications of Model-Checking
- Vitaly Shmatikov:
Probabilistic Analysis of Anonymity. 119-128 - Somesh Jha, Thomas W. Reps:
Analysis of SPKI/SDSI Certificates Using Model Checking. 129-
Protocols II
- Philippa J. Broadfoot, A. W. Roscoe:
Capturing Parallel Attacks within the Data Independence Framework. 147-159 - Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner:
Polynomial Fairness and Liveness. 160-174 - Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov:
A Formal Analysis of Some Properties of Kerberos 5 Using MSR. 175-
Games
- Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun:
A Formal Analysis of Syverson?s Rational Exchange Protocol. 193-205 - Steve Kremer, Jean-François Raskin:
Game Analysis of Abuse-free Contract Signing. 206-
Language-Based Security
- Vincent Simonet:
Fine-Grained Information Flow Analysis for a \lambda Calculus with Sum Types. 223-237 - Dominic Duggan:
Cryptographic Types. 238-252 - Anindya Banerjee, David A. Naumann:
Secure Information Flow and Pointer Confinement in a Java-like Language. 253-
Distributed Rights, Access Control, and Watermarking
- Günter Karjoth, Matthias Schunter:
A Privacy Policy Model for Enterprises. 271-281 - Riccardo Pucella, Vicky Weissman:
A Logic for Reasoning about Digital Rights. 282-294 - Nicholas Tran:
Hiding Functions and Computational Security of Image Watermarking Systems. 295-
Information Flow II
- Riccardo Focardi, Sabina Rossi:
Information Flow Security in Dynamic Contexts. 307-319 - François Pottier:
A Simple View of Type-Secure Information Flow in the p-Calculus. 320-330
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.