Abstract is missing.
- Authenticity by tagging and typingMichele Bugliesi, Riccardo Focardi, Matteo Maffei. 1-12 [doi]
- Formally verifying information flow type systems for concurrent and thread systemsGilles Barthe, Leonor Prensa Nieto. 13-22 [doi]
- Timed model checking of security protocolsRicardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader. 23-32 [doi]
- Stepwise development of security protocols: a speech act-oriented approachPhan Minh Dung, Phan Minh Thang. 33-44 [doi]
- A logic-based framework for attribute based access controlLingyu Wang, Duminda Wijesekera, Sushil Jajodia. 45-55 [doi]
- Synthesising verified access control systems in XACMLNan Zhang 0003, Mark Ryan, Dimitar P. Guelev. 56-65 [doi]
- Automatic analysis of firewall and network intrusion detection system configurationsTomás E. Uribe, Steven Cheung. 66-74 [doi]
- MAC and UML for secure software designThuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl. 75-85 [doi]
- Lessons learned using alloy to formally specify MLS-PCA trusted security architectureBrant Hashii. 86-95 [doi]