Abstract is missing.
- A Policy Model for Secure Information FlowAdedayo Adetoye, Atta Badii. 1-17 [doi]
- A General Framework for Nondeterministic, Probabilistic, and Stochastic NoninterferenceAlessandro Aldini, Marco Bernardo. 18-33 [doi]
- Validating Security Protocols under the General AttackerWihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna. 34-51 [doi]
- Usage AutomataMassimo Bartoletti. 52-69 [doi]
- Static Detection of Logic Flaws in Service-Oriented ApplicationsChiara Bodei, Linda Brodo, Roberto Bruni. 70-87 [doi]
- Improving the Semantics of Imperfect SecurityNiklas Broberg, David Sands. 88-91 [doi]
- Analysing PKCS#11 Key Management APIs with Unbounded Fresh DataSibylle B. Fröschle, Graham Steel. 92-106 [doi]
- Transformations between Cryptographic ProtocolsJoshua D. Guttman. 107-123 [doi]
- Formal Validation of OFEPSP+ with AVISPAJorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, BenjamÃn Ramos. 124-137 [doi]
- On the Automated Correction of Protocols with Improper Message EncodingDieter Hutter, Raul Monroy. 138-154 [doi]
- Finite Models in FOL-Based Crypto-Protocol VerificationJan Jürjens, Tjark Weber. 155-172 [doi]
- Towards a Type System for Security APIsGavin Keighren, David Aspinall, Graham Steel. 173-192 [doi]
- Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive CorruptionLaurent Mazaré, Bogdan Warinschi. 193-210 [doi]
- How Many Election Officials Does It Take to Change an Election?Peter Y. A. Ryan. 211-221 [doi]