default search action
14th CSFW 2001: Cape Breton, Nova Scotia, Canada
- 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada. IEEE Computer Society 2001, ISBN 0-7695-1146-5
Non-Interference & Information Flow
- Sylvan Pinsky, Edward Zieglar:
Noninterference Equations for Nondeterministic Systems. 3-14 - Steve Zdancewic, Andrew C. Myers:
Robust Declassification. 15-23
Access Control
- Ajay Chander, John C. Mitchell, Drew Dean:
A State-Transition Model of Trust Management and Access Control. 27-43 - Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera:
Revocations-A Classification. 44-58 - Joseph Y. Halpern, Ron van der Meyden:
A Logical Reconstruction of SPKI. 59-70
Protocols I
- Olivier Pereira, Jean-Jacques Quisquater:
A Security Analysis of the Cliques Protocols Suites. 73-81 - Bruno Blanchet:
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. 82-96 - Véronique Cortier, Jonathan K. Millen, Harald Rueß:
Proving Secrecy is Easy Enough. 97-108
Panel
- Andre Scedrov, Ran Canetti, Joshua D. Guttman, David A. Wagner, Michael Waidner:
Relating Cryptography and Cryptographic Protocols. 111-114
Information Flow & Multi-Threading
- Geoffrey Smith:
A New Type System for Secure Information Flow. 115-125 - Heiko Mantel, Andrei Sabelfeld:
A Generic Approach to the Security of Multi-Threaded Programs. 126-142
Protocols II
- Andrew D. Gordon, Alan Jeffrey:
Authenticity by Typing for Security Protocols. 145-159 - Marcelo P. Fiore, Martín Abadi:
Computing Symbolic Models for Verifying Cryptographic Protocols. 160-173 - Michaël Rusinowitch, Mathieu Turuani:
Protocol Insecurity with Finite Number of Sessions is NP-Complete. 174-187
Intrusion Tolerance & Detection
- Peng Liu, Sushil Jajodia:
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. 191-205 - Somesh Jha, Kymie M. C. Tan, Roy A. Maxion:
Markov Chains, Classifiers, and Intrusion Detection. 206-219 - Muriel Roger, Jean Goubault-Larrecq:
Log Auditing through Model-Checking. 220-234
Panel
- Peter Y. A. Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor:
Non-Interference: Who Needs It? 237-238
Logics for Protocol Verification
- Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic:
A Compositional Logic for Protocol Correctness. 241-255 - Eijiro Sumii, Benjamin C. Pierce:
Logical Relations for Encryption. 256-269
Secrecy & Privacy
- Wenliang Du, Mikhail J. Atallah:
Privacy-Preserving Cooperative Scientific Computations. 273-294 - Maritta Heisel, Andreas Pfitzmann, Thomas Santen:
Confidentiality-Preserving Refinement. 295-306
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.