default search action
28th CSF 2015: Verona, Italy
- Cédric Fournet, Michael W. Hicks, Luca Viganò:
IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7538-2 - Carlos Cotrini Jiménez, Thilo Weghorn, David A. Basin, Manuel Clavel:
Analyzing First-Order Role Based Access Control. 3-17 - William C. Garrison III, Adam J. Lee:
Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations. 18-32 - Stefano Calzavara, Alvise Rabitti, Michele Bugliesi:
Compositional Typed Analysis of ARBAC Policies. 33-45 - Anna Lisa Ferrara, Georg Fuchsbauer, Bin Liu, Bogdan Warinschi:
Policy Privacy in Cryptographic Access Control. 46-60 - Hoa Ngo, Jong Kim:
Location Privacy via Differential Private Perturbation of Cloaking Area. 63-74 - Martin Pettai, Peeter Laud:
Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active Adversaries. 75-89 - Michela Chessa, Jens Grossklags, Patrick Loiseau:
A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications. 90-104 - Joshua D. Guttman, Paul D. Rowe:
A Cut Principle for Information Flow. 107-121 - Niklas Broberg, Bart van Delft, David Sands:
The Anatomy and Facets of Dynamic Policies. 122-136 - Aslan Askarov, Stephen Chong, Heiko Mantel:
Hybrid Monitors for Concurrent Noninterference. 137-151 - Gurchetan S. Grewal, Mark Dermot Ryan, Liqun Chen, Michael R. Clarkson:
Du-Vote: Remote Electronic Voting with Untrusted Computers. 155-169 - Rémy Chrétien, Véronique Cortier, Stéphanie Delaune:
Decidability of Trace Equivalence for Protocols with Nonces. 170-184 - Alessandro Bruni, Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson:
Set-Pi: Set Membership p-Calculus. 185-198 - David A. Basin, Sasa Radomirovic, Michael Schläpfer:
A Complete Characterization of Secure Human-Server Communication. 199-213 - Christian Matt, Ueli Maurer:
A Definitional Framework for Functional Encryption. 217-231 - Edelmira Pasarella, Jorge Lobo:
Reasoning about Policy Behavior in Logic-Based Trust Management Systems: Some Complexity Results and an Operational Framework. 232-242 - M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa:
Picking vs. Guessing Secrets: A Game-Theoretic Analysis. 243-257 - Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha:
Program Actions as Actual Causes: A Building Block for Accountability. 261-275 - Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici:
BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. 276-289 - David Nuñez, Isaac Agudo, Javier López:
A Parametric Family of Attack Models for Proxy Re-encryption. 290-301 - Ralf Küsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr:
A Hybrid Approach for Proving Noninterference of Java Programs. 305-319 - Alessandro Armando, Roberto Carbone, Gabriele Costa, Alessio Merlo:
Android Permissions Unleashed. 320-333 - Aslan Askarov, Scott Moore, Christos Dimoulas, Stephen Chong:
Cryptographic Enforcement of Language-Based Information Erasure. 334-348 - Daniel Hedin, Luciano Bello, Andrei Sabelfeld:
Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language. 351-365 - Vineet Rajani, Abhishek Bichhawat, Deepak Garg, Christian Hammer:
Information Flow Control for Event Handling and the DOM in Web Browsers. 366-379 - Christian Müller, Máté Kovács, Helmut Seidl:
An Analysis of Universal Information Flow Based on Self-Composition. 380-393 - Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor:
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. 397-411 - Michael Backes, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi, Kim Pecina:
Symbolic Malleable Zero-Knowledge Proofs. 412-426 - Adam Petcher, Greg Morrisett:
A Mechanized Proof of Security for Searchable Symmetric Encryption. 481-494 - Kui Xu, Danfeng (Daphne) Yao, Barbara G. Ryder, Ke Tian:
Probabilistic Program Modeling for High-Precision Anomaly Classification. 497-511 - Limin Jia, Shayak Sen, Deepak Garg, Anupam Datta:
A Logic of Programs with Interface-Confined Code. 512-525 - Goran Doychev, Boris Köpf:
Rational Protection against Timing Attacks. 526-536 - Daniel Schoepe, Andrei Sabelfeld:
Understanding and Enforcing Opacity. 539-553 - Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing:
A Methodology for Information Flow Experiments. 554-568 - Owen Arden, Jed Liu, Andrew C. Myers:
Flow-Limited Authorization. 569-583
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.