Abstract is missing.
- Design and Semantics of a Decentralized Authorization LanguageMoritz Y. Becker, Cédric Fournet, Andrew D. Gordon. 3-15 [doi]
- Do As I SaY! Programmatic Access Control with Explicit IdentitiesAndrew Cirillo, Radha Jagadeesan, Corin Pitcher, James Riely. 16-30 [doi]
- A Type Discipline for Authorization in Distributed SystemsCédric Fournet, Andrew D. Gordon, Sergio Maffeis. 31-48 [doi]
- Security Analysis of Voice-over-IP ProtocolsPrateek Gupta, Vitaly Shmatikov. 49-63 [doi]
- Reasoning about Concurrency for Security TunnelsAlwyn Goodloe, Carl A. Gunter. 64-78 [doi]
- A Formal Theory of Key ConjuringVéronique Cortier, Stéphanie Delaune, Graham Steel. 79-96 [doi]
- Computationally Sound Mechanized Proofs of Correspondence AssertionsBruno Blanchet. 97-111 [doi]
- Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key CyclesMichael Backes, Birgit Pfitzmann, Andre Scedrov. 112-124 [doi]
- Compositional Security for Task-PIOAsRan Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira. 125-139 [doi]
- Approximated Computationally Bounded Simulation Relations for Probabilistic AutomataRoberto Segala, Andrea Turrini. 140-156 [doi]
- Implementing STV securely in Pret a VoterJames Heather. 157-169 [doi]
- Secure Implementations for Typed Session AbstractionsRicardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer. 170-186 [doi]
- A Library for Secure Multi-threaded Information Flow in HaskellTa-Chung Tsai, Alejandro Russo, John Hughes. 187-202 [doi]
- Dynamic Dependency Monitoring to Secure Information FlowParitosh Shroff, Scott F. Smith, Mark Thober. 203-217 [doi]
- Automaton-based Confidentiality Monitoring of Concurrent ProgramsGurvan Le Guernic. 218-232 [doi]
- Secure information flow and program logicsLennart Beringer, Martin Hofmann. 233-248 [doi]
- A flow-sensitive analysis of privacy propertiesHanne Riis Nielson, Flemming Nielson. 249-264 [doi]
- Collaborative Planning With PrivacyMax I. Kanovich, Paul Rowe, Andre Scedrov. 265-278 [doi]
- Privacy and Utility in Business ProcessesAdam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram. 279-294 [doi]
- Electing the Doge of Venice: Analysis of a 13th Century ProtocolMiranda Mowbray, Dieter Gollmann. 295-310 [doi]
- Creating Vulnerability Signatures Using Weakest PreconditionsDavid Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song. 311-325 [doi]
- Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic FrameworkHeiko Mantel, Henning Sudbrock. 326-340 [doi]
- Probability of Error in Information-Hiding ProtocolsKonstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden. 341-354 [doi]
- Causality-based Abstraction of Multiplicity in Security ProtocolsMichael Backes, Agostino Cortesi, Matteo Maffei. 355-369 [doi]
- The Insecurity Problem: Tackling Unbounded DataSibylle B. Fröschle. 370-384 [doi]
- LTL Model Checking for Security ProtocolsAlessandro Armando, Roberto Carbone, Luca Compagna. 385-396 [doi]