default search action
19th CSFW 2006: Venice, Italy
- 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy. IEEE Computer Society 2006, ISBN 0-7695-2615-2
Information Flow
- Marieke Huisman, Pratik Worah, Kim Sunesen:
A Temporal Logic Characterisation of Observational Determinism. 3 - Peng Li, Steve Zdancewic:
Encoding Information Flow in Haskell. 16 - Stéphanie Delaune, Steve Kremer, Mark Ryan:
Coercion-Resistance and Receipt-Freeness in Electronic Voting. 28-42
Games, Plans, and Transformations
- Shai Rubin, Somesh Jha, Barton P. Miller:
On the Completeness of Attack Mutation Algorithms. 43-56 - Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Types and Effects for Secure Service Orchestration. 57-69 - Krishnendu Chatterjee, Radha Jagadeesan, Corin Pitcher:
Games for Controls. 70-84
Access Control
- Michael J. May, Carl A. Gunter, Insup Lee:
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. 85-97 - Jason Crampton, Keith M. Martin, Peter R. Wild:
On Key Assignment for Hierarchical Access Control. 98-111 - Avik Chaudhuri, Martín Abadi:
Secrecy by Typing and File-Access Control. 112-123 - Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R. Ramakrishnan:
Policy Analysis for Administrative Role Based Access Control. 124-138
Security Protocol Analysis
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse:
Verified Interoperable Implementations of Security Protocols. 139-152 - Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. 153-166 - Aybek Mukhamedov, Mark Dermot Ryan:
Resolve-Impossibility for a Contract-Signing Protocol. 167-176
Language, Interaction, and Change
- Alejandro Russo, Andrei Sabelfeld:
Securing Interaction between Threads and the Scheduler. 177-189 - Kevin R. O'Neill, Michael R. Clarkson, Stephen Chong:
Information-Flow Security for Interactive Programs. 190-201 - Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic:
Managing Policy Updates in Security-Typed Languages. 202-216
Language, Obfuscation, and Robustness
- Daniel Hedin, David Sands:
Noninterference in the Presence of Non-Opaque Pointers. 217-229 - Riccardo Pucella, Fred B. Schneider:
Independence From Obfuscation: A Semantic Framework for Dive. 230-241 - Stephen Chong, Andrew C. Myers:
Decentralized Robustness. 242-256
Authorization and Trust
- Antonio Lain, Miranda Mowbray:
Distributed Authorization Using Delegation with Acyclic Paths. 257-269 - Hongbin Zhou, Simon N. Foley:
A Framework for Establishing Decentralized Secure Coalitions. 270-282 - Deepak Garg, Frank Pfenning:
Non-Interference in Constructive Authorization Logic. 283-296
Protocols and Cryptographic Foundations
- Kim-Kwang Raymond Choo:
Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. 297-308 - Ralf Küsters:
Simulation-Based Security with Inexhaustible Interactive Turing Machines. 309-320 - Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi:
Computationally Sound Compositional Logic for Key Exchange Protocols. 321-334
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.