Abstract is missing.
- Language Based Secure CommunicationMichele Bugliesi, Riccardo Focardi. 3-16 [doi]
- Refinement Types for Secure ImplementationsJesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Sergio Maffeis. 17-32 [doi]
- A Trust Management Approach for Flexible Policy Management in Security-Typed LanguagesSruthi Bandhakavi, William H. Winsborough, Marianne Winslett. 33-47 [doi]
- HyperpropertiesMichael R. Clarkson, Fred B. Schneider. 51-65 [doi]
- Security Decision-Making among Interdependent OrganizationsReiko Ann Miura-Ko, Benjamin Yolken, John Mitchell, Nicholas Bambos. 66-80 [doi]
- Tractable Enforcement of Declassification PoliciesGilles Barthe, Salvador Cavadini, Tamara Rezk. 83-97 [doi]
- End-to-End Enforcement of Erasure and DeclassificationStephen Chong, Andrew C. Myers. 98-111 [doi]
- Cryptographically-Sound Protocol-Model AbstractionsChristoph Sprenger, David A. Basin. 115-129 [doi]
- An Authorization Logic With Explicit TimeHenry DeYoung, Deepak Garg, Frank Pfenning. 133-145 [doi]
- DKAL: Distributed-Knowledge Authorization LanguageYuri Gurevich, Itay Neeman. 149-162 [doi]
- Access-Control Policies via Belnap Logic: Effective and Efficient Composition and AnalysisGlenn Bruns, Michael Huth. 163-176 [doi]
- Evidence-Based AuditJeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve Zdancewic. 177-191 [doi]
- Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-CalculusMichael Backes, Catalin Hritcu, Matteo Maffei. 195-209 [doi]
- Specifying Secure Transport ChannelsChristopher Dilloway, Gavin Lowe. 210-223 [doi]
- Towards Producing Formally Checkable Security Proofs, AutomaticallyJean Goubault-Larrecq. 224-238 [doi]
- Composition of Password-Based ProtocolsStéphanie Delaune, Steve Kremer, Mark Ryan. 239-251 [doi]
- Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active AttackersMichael Backes, Dominique Unruh. 255-269 [doi]
- Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local ComputationRalf Küsters, Max Tuengerthal. 270-284 [doi]
- A Type System for Observational DeterminismTachio Terauchi. 287-300 [doi]
- Information Flow in Systems with SchedulersRon van der Meyden, Chenyi Zhang. 301-312 [doi]
- A Correctness Proof of a Mesh Security ArchitectureDoug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh V. Tripunitara. 315-330 [doi]
- Formal Analysis of PKCS#11Stéphanie Delaune, Steve Kremer, Graham Steel. 331-344 [doi]