Abstract is missing.
- Fast automatic synthesis of security protocols using backward searchHongbin Zhou, Simon N. Foley. 1-10 [doi]
- Secure protocol compositionAnupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic. 11-23 [doi]
- Using interval logics for temporal analysis of security protocolsMichael R. Hansen, Robin Sharp. 24-31 [doi]
- A compositional framework for access control policies enforcementFrançois Siewe, Antonio Cau, Hussein Zedan. 32-42 [doi]
- Representation and analysis of coordinated attacksSviatoslav Braynov, Murtuza Jadliwala. 43-51 [doi]
- Algebraic specification of network security risk managementMohamed Hamdi, Noureddine Boudriga. 52-60 [doi]
- Relating cryptography and formal methods: a panelMichael Backes, Catherine Meadows, John C. Mitchell. 61-66 [doi]
- Formal access control analysis in the software development processManuel Koch, Francesco Parisi-Presicce. 67-76 [doi]
- authUML: a three-phased framework to analyze access control specifications in use casesKhaled Alghathbar, Duminda Wijesekera. 77-86 [doi]