Abstract is missing.
- Information-Flow Security for a Core of JavaScriptDaniel Hedin, Andrei Sabelfeld. 3-18 [doi]
- Secure Information Flow for Concurrent Programs under Total Store OrderJeffrey A. Vaughan, Todd D. Millstein. 19-29 [doi]
- ENCoVer: Symbolic Exploration for Information Flow SecurityMusard Balliu, Mads Dam, Gurvan Le Guernic. 30-44 [doi]
- Information-Flow Control for Programming on Encrypted DataJohn C. Mitchell, Rahul Sharma 0001, Deian Stefan, Joe Zimmerman. 45-60 [doi]
- Symbolic Analysis of Cryptographic Protocols Containing Bilinear PairingsAlisa Pankova, Peeter Laud. 63-77 [doi]
- Automated Analysis of Diffie-Hellman Protocols and Advanced Security PropertiesBenedikt Schmidt, Simon Meier, Cas J. F. Cremers, David A. Basin. 78-94 [doi]
- Verifying Privacy-Type Properties in a Modular WayMyrto Arapinis, Vincent Cheval, Stéphanie Delaune. 95-109 [doi]
- Security Analysis of Role-Based Access Control through Program VerificationAnna Lisa Ferrara, P. Madhusudan, Gennaro Parlato. 113-125 [doi]
- Gran: Model Checking Grsecurity RBAC PoliciesMichele Bugliesi, Stefano Calzavara, Riccardo Focardi, Marco Squarcina. 126-138 [doi]
- Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and AbductionValerio Genovese, Deepak Garg, Daniele Rispoli. 139-153 [doi]
- Mashic Compiler: Mashup Sandboxing Based on Inter-frame CommunicationZhengqin Luo, Tamara Rezk. 157-170 [doi]
- Secure Compilation to Modern ProcessorsPieter Agten, Raoul Strackx, Bart Jacobs, Frank Piessens. 171-185 [doi]
- Cache-Leakage Resilient OS Isolation in an Idealized Model of VirtualizationGilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna. 186-197 [doi]
- A Framework for the Cryptographic Verification of Java-Like ProgramsRalf Küsters, Tomasz Truderung, Juergen Graf. 198-212 [doi]
- Constructing Optimistic Multi-party Contract Signing ProtocolsBarbara Kordy, Sasa Radomirovic. 215-229 [doi]
- Refining Key EstablishmentChristoph Sprenger, David A. Basin. 230-246 [doi]
- Discovering Concrete Attacks on Website Authorization by Formal AnalysisChetan Bansal, Karthikeyan Bhargavan, Sergio Maffeis. 247-262 [doi]
- Measuring Information Leakage Using Generalized Gain FunctionsMário S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Geoffrey Smith. 265-279 [doi]
- The Thermodynamics of ConfidentialityPasquale Malacaria, Fabrizio Smeraldi. 280-290 [doi]
- Securing Interactive ProgramsWillard Rafnsson, Daniel Hedin, Andrei Sabelfeld. 293-307 [doi]
- Learning is Change in Knowledge: Knowledge-Based Security for Dynamic PoliciesAslan Askarov, Stephen Chong. 308-322 [doi]
- Automatically Verified Mechanized Proof of One-Encryption Key ExchangeBruno Blanchet. 325-339 [doi]
- Generic Indifferentiability Proofs of Hash DesignsMarion Daubignard, Pierre-Alain Fouque, Yassine Lakhnech. 340-353 [doi]
- Verified Security of Merkle-DamgårdMichael Backes, Gilles Barthe, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa, Santiago Zanella Béguelin. 354-368 [doi]
- Provably Secure and Practical Onion RoutingMichael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi. 369-385 [doi]