Abstract is missing.
- A Formal Framework and Evaluation Method for Network Denial of ServiceCatherine Meadows. 4-13 [doi]
- I/O Automaton Models and Proofs for Shared-Key Communication SystemsNancy A. Lynch. 14-29 [doi]
- Safe Simplifying Transformations for Security ProtocolsMei Lin Hui, Gavin Lowe. 32-43 [doi]
- A Meta-Notation for Protocol AnalysisIliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov. 55-69 [doi]
- Mixed Strand SpacesF. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman. 72-82 [doi]
- Honest Functions and their Application to the Analysis of Cryptographic ProtocolsAlfred P. Maneki. 83-89 [doi]
- Formalization and Proof of Secrecy PropertiesDennis M. Volpano. 92-95 [doi]
- Authentication via Localized NamesChiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami. 98-110 [doi]
- A Logic for SDSI s Linked Local Name SpacesJoseph Y. Halpern, Ron van der Meyden. 111-122 [doi]
- Trusted System ConstructionColin O Halloran. 124-135 [doi]
- Secure Composition of Insecure ComponentsPeter Sewell, Jan Vitek. 136-150 [doi]
- Security Function InteractionsPierre Bieber. 151-160 [doi]
- A Logic-based Knowledge Representation for Authorization with DelegationNinghui Li, Joan Feigenbaum, Benjamin N. Grosof. 162-174 [doi]
- A Logical Framework for Reasoning on Data Access Control PoliciesElisa Bertino, Elena Ferrari, Francesco Buccafurri, Pasquale Rullo. 175-189 [doi]
- Athena: A New Efficient Automatic Checker for Security Protocol AnalysisDawn Xiaodong Song. 192-202 [doi]
- CVS: A Compiler for the Analysis of Cryptographic ProtocolsAntonio Durante, Riccardo Focardi, Roberto Gorrieri. 203-212 [doi]
- Process Algebra and Non-InterferencePeter Y. A. Ryan, Steve A. Schneider. 214-227 [doi]
- What Is Intransitive Noninterference?A. W. Roscoe, M. H. Goldsmith. 228-238 [doi]