Abstract is missing.
- A Theory of Dictionary Attacks and its ComplexityStéphanie Delaune, Florent Jacquemard. 2-15 [doi]
- Generic Insecurity of Cliques-Type Authenticated Group Key Agreement ProtocolsOlivier Pereira, Jean-Jacques Quisquater. 16-19 [doi]
- Abstraction and Refinement in Protocol DerivationAnupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic. 30 [doi]
- A Distributed Calculus for Ro^le-Based Access ControlChiara Braghin, Daniele Gorla, Vladimiro Sassone. 48-60 [doi]
- From Stack Inspection to Access Control: A Security Analysis for LibrariesFrédéric Besson, Tomasz Blanc, Cédric Fournet, Andrew D. Gordon. 61 [doi]
- Selecting Appropriate Counter-Measures in an Intrusion Detection FrameworkFrédéric Cuppens, Sylvain Gombault, Thierry Sans. 78-87 [doi]
- Using Active Learning in Intrusion DetectionMagnus Almgren, Erland Jonsson. 88 [doi]
- Secure Information Flow by Self-CompositionGilles Barthe, Pedro R. D Argenio, Tamara Rezk. 100-114 [doi]
- Lenient Array Operations for Practical Secure Information FlowZhenyue Deng, Geoffrey Smith. 115 [doi]
- Owned Policies for Information SecurityHubie Chen, Stephen Chong. 126-138 [doi]
- Cassandra: Flexible Trust Management, Applied to Electronic Health RecordsMoritz Y. Becker, Peter Sewell. 139-154 [doi]
- The Consistency of Task-Based Authorization Constraints in Workflow SystemsKaijun Tan, Jason Crampton, Carl A. Gunter. 155 [doi]
- Enforcing Robust DeclassificationAndrew C. Myers, Andrei Sabelfeld, Steve Zdancewic. 172-186 [doi]
- Modelling Downgrading in Information Flow SecurityAnnalisa Bossi, Carla Piazza, Sabina Rossi. 187 [doi]
- Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic LibraryMichael Backes, Birgit Pfitzmann. 204-218 [doi]
- Universally Composable Signature, Certification, and AuthenticationRan Canetti. 219 [doi]
- By Reason and Authority: A System for Authorization of Proof-Carrying CodeNathan Whitehead, Martín Abadi, George C. Necula. 236-250 [doi]
- A Formal Foundation for XrMLJoseph Y. Halpern, Vicky Weissman. 251 [doi]
- Formal Analysis of Multi-Party Contract SigningRohit Chadha, Steve Kremer, Andre Scedrov. 266-265 [doi]
- Symbolic Model Checking the Knowledge of the Dining CryptographersRon van der Meyden, Kaile Su. 280 [doi]