Abstract is missing.
- Preface [doi]
- Committees [doi]
- Practical Information-flow Control in Web-Based Information SystemsPeng Li, Steve Zdancewic. 2-15 [doi]
- Achieving Information Flow Security through Precise Control of EffectsWilliam L. Harrison, James Hook. 16-30 [doi]
- Belief in Information FlowMichael R. Clarkson, Andrew C. Myers, Fred B. Schneider. 31-45 [doi]
- An Encapsulated Authentication Logic for Reasoning about Key Distribution ProtocolsIliano Cervesato, Catherine Meadows, Dusko Pavlovic. 48-61 [doi]
- Deciding Knowledge in Security Protocols under (Many More) Equational TheoriesMartín Abadi, Véronique Cortier. 62-76 [doi]
- A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment SystemMichael Backes, Markus Dürmuth. 78-93 [doi]
- Compositional Analysis of Contract Signing ProtocolsMichael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani. 94-110 [doi]
- Analysis of Typed Analyses of Authentication ProtocolsMichele Bugliesi, Riccardo Focardi, Matteo Maffei. 112-125 [doi]
- Temporal Rank Functions for Forward SecrecyRob Delicata, Steve A. Schneider. 126-139 [doi]
- Reconstruction of Attacks against Cryptographic ProtocolsXavier Allamigeon, Bruno Blanchet. 140-154 [doi]
- Polynomial Runtime in Simulatability DefinitionsDennis Hofheinz, Jörn Müller-Quade, Dominique Unruh. 156-169 [doi]
- Computational and Information-Theoretic Soundness and Completeness of Formal EncryptionPedro Adão, Gergei Bana, Andre Scedrov. 170-184 [doi]
- Nomad: A Security Model with Non Atomic Actions and DeadlinesFrédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans. 186-196 [doi]
- Type Annotations to Improve Stack-Based Access ControlTian Zhao, John Tang Boyland. 197-210 [doi]
- Enforcing Secure Service CompositionMassimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari. 211-223 [doi]
- On Declassification and the Non-Disclosure PolicyAna Almeida Matos, Gérard Boudol. 226-240 [doi]
- Language-Based Information ErasureStephen Chong, Andrew C. Myers. 241-254 [doi]
- Dimensions and Principles of DeclassificationAndrei Sabelfeld, David Sands. 255-269 [doi]
- End-to-End Availability Policies and NoninterferenceLantian Zheng, Andrew C. Myers. 272-286 [doi]
- Game-Based Analysis of Denial-of-Service Prevention ProtocolsAjay Mahimkar, Vitaly Shmatikov. 287-301 [doi]