Abstract is missing.
- Noninterference Equations for Nondeterministic SystemsSylvan Pinsky, Edward Zieglar. 3-4 [doi]
- Robust DeclassificationSteve Zdancewic, Andrew C. Myers. 15 [doi]
- A State-Transition Model of Trust Management and Access ControlAjay Chander, John C. Mitchell, Drew Dean. 27-43 [doi]
- Revocations-A ClassificationÅsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera. 44-58 [doi]
- A Logical Reconstruction of SPKIJoseph Y. Halpern, Ron van der Meyden. 59 [doi]
- A Security Analysis of the Cliques Protocols SuitesOlivier Pereira, Jean-Jacques Quisquater. 73-81 [doi]
- An Efficient Cryptographic Protocol Verifier Based on Prolog RulesBruno Blanchet. 82-96 [doi]
- Proving Secrecy is Easy EnoughVéronique Cortier, Jonathan K. Millen, Harald Rueß. 97 [doi]
- Relating Cryptography and Cryptographic ProtocolsAndre Scedrov, Ran Canetti, Joshua D. Guttman, David Wagner, Michael Waidner. 111-114 [doi]
- A New Type System for Secure Information FlowGeoffrey Smith. 115-125 [doi]
- A Generic Approach to the Security of Multi-Threaded ProgramsHeiko Mantel, Andrei Sabelfeld. 126 [doi]
- Authenticity by Typing for Security ProtocolsAndrew D. Gordon, Alan Jeffrey. 145-159 [doi]
- Computing Symbolic Models for Verifying Cryptographic ProtocolsMarcelo P. Fiore, Martín Abadi. 160-173 [doi]
- Protocol Insecurity with Finite Number of Sessions is NP-CompleteMichaël Rusinowitch, Mathieu Turuani. 174 [doi]
- Multi-Phase Damage Confinement in Database Systems for Intrusion TolerancePeng Liu, Sushil Jajodia. 191-205 [doi]
- Markov Chains, Classifiers, and Intrusion DetectionSomesh Jha, Kymie M. C. Tan, Roy A. Maxion. 206-219 [doi]
- Log Auditing through Model-CheckingMuriel Roger, Jean Goubault-Larrecq. 220 [doi]
- Non-Interference: Who Needs It?Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor. 237 [doi]
- A Compositional Logic for Protocol CorrectnessNancy A. Durgin, John C. Mitchell, Dusko Pavlovic. 241 [doi]
- Logical Relations for EncryptionEijiro Sumii, Benjamin C. Pierce. 256-269 [doi]
- Privacy-Preserving Cooperative Scientific ComputationsWenliang Du, Mikhail J. Atallah. 273-294 [doi]
- Confidentiality-Preserving RefinementMaritta Heisel, Andreas Pfitzmann, Thomas Santen. 295-306 [doi]