Abstract is missing.
- A Temporal Logic Characterisation of Oservational DeterminismMarieke Huisman, Pratik Worah, Kim Sunesen. 3 [doi]
- Encoding Information Flow in HaskellPeng Li, Steve Zdancewic. 16 [doi]
- Coercion-Resistance and Receipt-Freeness in Electronic VotingStéphanie Delaune, Steve Kremer, Mark Ryan. 28-42 [doi]
- On the Completeness of Attack Mutation AlgorithmsShai Rubin, Somesh Jha, Barton P. Miller. 43-56 [doi]
- Types and Effects for Secure Service OrchestrationMassimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari. 57-69 [doi]
- Games for ControlsKrishnendu Chatterjee, Radha Jagadeesan, Corin Pitcher. 70-84 [doi]
- Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy PoliciesMichael J. May, Carl A. Gunter, Insup Lee. 85-97 [doi]
- On Key Assignment for Hierarchical Access ControlJason Crampton, Keith M. Martin, Peter R. Wild. 98-111 [doi]
- Secrecy by Typing and File-Access ControlAvik Chaudhuri, Martín Abadi. 112-123 [doi]
- Policy Analysis for Administrative Role Based Access ControlAmit Sasturkar, Ping Yang, Scott D. Stoller, C. R. Ramakrishnan. 124-138 [doi]
- Verified Interoperable Implementations of Security ProtocolsKarthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse. 139-152 [doi]
- Cryptographically Sound Theorem ProvingChristoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner. 153-166 [doi]
- Resolve-Impossibility for a Contract-Signing ProtocolAybek Mukhamedov, Mark Dermot Ryan. 167-176 [doi]
- Securing Interaction between Threads and the SchedulerAlejandro Russo, Andrei Sabelfeld. 177-189 [doi]
- Information-Flow Security for Interactive ProgramsKevin R. O Neill, Michael R. Clarkson, Stephen Chong. 190-201 [doi]
- Managing Policy Updates in Security-Typed LanguagesNikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic. 202-216 [doi]
- Noninterference in the Presence of Non-Opaque PointersDaniel Hedin, David Sands. 217-229 [doi]
- Independence From Obfuscation: A Semantic Framework for DiveRiccardo Pucella, Fred B. Schneider. 230-241 [doi]
- Decentralized RobustnessStephen Chong, Andrew C. Myers. 242-256 [doi]
- Distributed Authorization Using Delegation with Acyclic PathsAntonio Lain, Miranda Mowbray. 257-269 [doi]
- A Framework for Establishing Decentralized Secure CoalitionsHongbin Zhou, Simon N. Foley. 270-282 [doi]
- Non-Interference in Constructive Authorization LogicDeepak Garg, Frank Pfenning. 283-296 [doi]
- Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem SettingKim-Kwang Raymond Choo. 297-308 [doi]
- Simulation-Based Security with Inexhaustible Interactive Turing MachinesRalf Küsters. 309-320 [doi]
- Computationally Sound Compositional Logic for Key Exchange ProtocolsAnupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi. 321-334 [doi]