Abstract is missing.
- Approximate Non-InterferenceAlessandra Di Pierro, Chris Hankin, Herbert Wiklicky. 3-17 [doi]
- Quantifying Information FlowGavin Lowe. 18-31 [doi]
- Secrecy in Multiagent SystemsJoseph Y. Halpern, Kevin R. O Neill. 32 [doi]
- Two Formal Analys s of Attack GraphsSomesh Jha, Oleg Sheyner, Jeannette M. Wing. 49-63 [doi]
- Formal Specification of Intrusion Signatures and Detection RulesJean-Philippe Pouzol, Mireille Ducassé. 64 [doi]
- Types and Effects for Asymmetric Cryptographic ProtocolsAndrew D. Gordon, Alan Jeffrey. 77-91 [doi]
- Security Protocol Design via Authentication TestsJoshua D. Guttman. 92-103 [doi]
- Strand Spaces and Rank Functions: More than Distant CousinsJames Heather. 104 [doi]
- Probabilistic Analysis of AnonymityVitaly Shmatikov. 119-128 [doi]
- Analysis of SPKI/SDSI Certificates Using Model CheckingSomesh Jha, Thomas W. Reps. 129 [doi]
- Capturing Parallel Attacks within the Data Independence FrameworkPhilippa J. Broadfoot, A. W. Roscoe. 147-159 [doi]
- Polynomial Fairness and LivenessMichael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner. 160-174 [doi]
- A Formal Analysis of Some Properties of Kerberos 5 Using MSRFrederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov. 175 [doi]
- A Formal Analysis of Syverson?s Rational Exchange ProtocolLevente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun. 193-205 [doi]
- Game Analysis of Abuse-free Contract SigningSteve Kremer, Jean-François Raskin. 206 [doi]
- Fine-Grained Information Flow Analysis for a /lambda Calculus with Sum TypesVincent Simonet. 223-237 [doi]
- Cryptographic TypesDominic Duggan. 238-252 [doi]
- Secure Information Flow and Pointer Confinement in a Java-like LanguageAnindya Banerjee, David A. Naumann. 253 [doi]
- A Privacy Policy Model for EnterprisesGünter Karjoth, Matthias Schunter. 271-281 [doi]
- A Logic for Reasoning about Digital RightsRiccardo Pucella, Vicky Weissman. 282-294 [doi]
- Hiding Functions and Computational Security of Image Watermarking SystemsNicholas Tran. 295 [doi]
- Information Flow Security in Dynamic ContextsRiccardo Focardi, Sabina Rossi. 307-319 [doi]
- A Simple View of Type-Secure Information Flow in the p-CalculusFrançois Pottier. 320-330 [doi]