Abstract is missing.
- A Theory of Information-Flow LabelsBenoît Montagu, Benjamin C. Pierce, Randy Pollack. 3-17 [doi]
- Precise Enforcement of Confidentiality for Reactive SystemsDante Zanarini, Mauro Jaskelioff, Alejandro Russo. 18-32 [doi]
- Secure Multi-execution: Fine-Grained, Declassification-Aware, and TransparentWillard Rafnsson, Andrei Sabelfeld. 33-48 [doi]
- Memory Trace Oblivious Program ExecutionChang Liu, Michael Hicks, Elaine Shi. 51-65 [doi]
- Oblivious Program Execution and Path-Sensitive Non-interferenceJérémy Planul, John C. Mitchell. 66-80 [doi]
- Security and Privacy by Declarative DesignMatteo Maffei, Kim Pecina, Manuel Reinert. 81-96 [doi]
- Type-Based Analysis of Generic Key Management APIsPedro Adão, Riccardo Focardi, Flaminia L. Luccio. 97-111 [doi]
- Cryptographically Enforced RBACAnna Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi. 115-129 [doi]
- Quantum Information-Flow Security: Noninterference and Access ControlMingsheng Ying, Yuan Feng, Nengkun Yu. 130-144 [doi]
- Application-Sensitive Access Control Evaluation Using Parameterized ExpressivenessTimothy L. Hinrichs, Diego Martinoia, William C. Garrison III, Adam J. Lee, Alessandro Panebianco, Lenore D. Zuck. 145-160 [doi]
- AnoA: A Framework for Analyzing Anonymous Communication ProtocolsMichael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi. 163-178 [doi]
- A Trust Framework for Evaluating GNSS Signal IntegrityXihui Chen, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang. 179-192 [doi]
- Probabilistic Point-to-Point Information LeakageTom Chothia, Yusuke Kawamoto, Chris Novakovic, David Parker. 193-205 [doi]
- Information Flow Analysis for a Dynamically Typed Language with Staged MetaprogrammingMartin Lester 0001, Luke Ong, Max Schäfer. 209-223 [doi]
- Gradual Security Typing with ReferencesLuminous Fennell, Peter Thiemann. 224-239 [doi]
- Hybrid Information Flow Monitoring against Web TrackingFrédéric Besson, Nataliia Bielova, Thomas P. Jensen. 240-254 [doi]
- Symbolic Universal ComposabilityFlorian Böhl, Dominique Unruh. 257-271 [doi]
- Differential Privacy by Typing in Security ProtocolsFabienne Eigner, Matteo Maffei. 272-286 [doi]
- Verified Computational Differential Privacy with Applications to Smart MeteringGilles Barthe, George Danezis, Benjamin Grégoire, César Kunz, Santiago Zanella Béguelin. 287-301 [doi]