Abstract is missing.
- Formal methods in security engineering: where we ve been, where we are, where we need to goJohn McLean. 1 [doi]
- Verification condition generation for conditional information flowTorben Amtoft, Anindya Banerjee. 2-11 [doi]
- A simple and expressive semantic framework for policy composition in access controlGlenn Bruns, Daniel S. Dantas, Michael Huth. 12-21 [doi]
- Formal correctness of conflict detection for firewallsVenanzio Capretta, Bernard Stepien, Amy P. Felty, Stan Matwin. 22-30 [doi]
- Security policy compliance with violation managementJulien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix. 31-40 [doi]
- Cryptol: specification, implementation and verification of high-grade cryptographic applicationsJeff Lewis. 41 [doi]
- Security policy analysis using deductive spreadsheetsAnu Singh, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren. 42-50 [doi]
- A calculus of challenges and responsesMichael Backes, Agostino Cortesi, Riccardo Focardi, Matteo Maffei. 51-60 [doi]
- Selecting theories and nonce generation for recursive protocolsKlaas Ole Kürtz, Ralf Küsters, Thomas Wilke. 61-70 [doi]
- Weaving rewrite-based access control policiesAnderson Santana de Oliveira, Eric Ke Wang, Claude Kirchner, Hélène Kirchner. 71-80 [doi]