Abstract is missing.
- Security Issues in the Tuple-Space Coordination ModelMario Bravetti, Nadia Busi, Roberto Gorrieri, Roberto Lucchi, Gianluigi Zavattaro. 1-12 [doi]
- Information Flow Analysis for Probabilistic Timed AutomataRuggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina. 13-26 [doi]
- Dynamic Security Labels and Noninterference (Extended Abstract)Lantian Zheng, Andrew C. Myers. 27-40 [doi]
- Formal Analysis of a Fair Payment ProtocolJan Cederquist, Muhammad Torabi Dashti. 41-54 [doi]
- Pattern-Matching Spi-CalculusChristian Haack, Alan Jeffrey. 55-70 [doi]
- Decidability of Opacity with Non-Atomic KeysLaurent Mazaré. 71-84 [doi]
- Virtual Analysis and Reduction of Side-Channel Vulnerabilities of SmartcardsJerry den Hartog, Erik P. de Vink. 85-98 [doi]
- Family SecretsJames Heather, Jonathan Y. Clark. 99-114 [doi]
- An Interactive Trust Management and Negotiation SchemeHristo Koshutanski, Fabio Massacci. 115-128 [doi]
- Complementing Computational Protocol Analysis with Formal SpecificationsKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland. 129-144 [doi]
- A Trust Model with Statistical FoundationJianqiang Shi, Gregor von Bochmann, Carlisle M. Adams. 145-158 [doi]
- Modelling Dynamic Opacity Using Petri Nets with Silent ActionsJeremy Bryans, Maciej Koutny, Peter Y. A. Ryan. 159-172 [doi]
- Reasoning about Secure Interoperation Using Soft ConstraintsStefano Bistarelli, Simon N. Foley, Barry O Sullivan. 173-186 [doi]
- A Logic for Auditing Accountability in Decentralized SystemsRicardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu. 187-201 [doi]
- A Formal Approach to Specify and Deploy a Network Security PolicyFrédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège. 203-218 [doi]
- Discretionary Overriding of Access Control in the Privilege CalculusErik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot. 219-232 [doi]
- A Formal Model for Parameterized Role-Based Access ControlAli E. Abdallah, Etienne J. Khayat. 233-246 [doi]