default search action
21st CSF 2008: Pittsburgh, PA, USA
- Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3182-3
Language-Based Security
- Michele Bugliesi, Riccardo Focardi:
Language Based Secure Communication. 3-16 - Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Sergio Maffeis:
Refinement Types for Secure Implementations. 17-32 - Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett:
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. 33-47
Security Models in Theory and Practice
- Michael R. Clarkson, Fred B. Schneider:
Hyperproperties. 51-65 - Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell, Nicholas Bambos:
Security Decision-Making among Interdependent Organizations. 66-80
Declassification and Erasure
- Gilles Barthe, Salvador Cavadini, Tamara Rezk:
Tractable Enforcement of Declassification Policies. 83-97 - Stephen Chong, Andrew C. Myers:
End-to-End Enforcement of Erasure and Declassification. 98-111
CSF/LICS Joint Invited Talk
- Christoph Sprenger, David A. Basin:
Cryptographically-Sound Protocol-Model Abstractions. 115-129
Authorization Logic I
- Henry DeYoung, Deepak Garg, Frank Pfenning:
An Authorization Logic With Explicit Time. 133-145
Authorization Logic II
- Yuri Gurevich, Itay Neeman:
DKAL: Distributed-Knowledge Authorization Language. 149-162 - Glenn Bruns, Michael Huth:
Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis. 163-176 - Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve Zdancewic:
Evidence-Based Audit. 177-191
Protocol Analysis I
- Michael Backes, Catalin Hritcu, Matteo Maffei:
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. 195-209 - Christopher Dilloway, Gavin Lowe:
Specifying Secure Transport Channels. 210-223 - Jean Goubault-Larrecq:
Towards Producing Formally Checkable Security Proofs, Automatically. 224-238 - Stéphanie Delaune, Steve Kremer, Mark Ryan:
Composition of Password-Based Protocols. 239-251
Cryptographic Foundations
- Michael Backes, Dominique Unruh:
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. 255-269 - Ralf Küsters, Max Tuengerthal:
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation. 270-284
Information Flow and Concurrency
- Tachio Terauchi:
A Type System for Observational Determinism. 287-300 - Ron van der Meyden, Chenyi Zhang:
Information Flow in Systems with Schedulers. 301-312
Protocol Analysis II
- Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh V. Tripunitara:
A Correctness Proof of a Mesh Security Architecture. 315-330 - Stéphanie Delaune, Steve Kremer, Graham Steel:
Formal Analysis of PKCS#11. 331-344
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.