Abstract is missing.
- Declarative Policies for Capability ControlChristos Dimoulas, Scott Moore, Aslan Askarov, Stephen Chong. 3-17 [doi]
- Portable Software Fault IsolationJoshua A. Kroll, Gordon Stewart, Andrew W. Appel. 18-32 [doi]
- Certificates for Verifiable ForensicsRadha Jagadeesan, C. M. Lubinski, Corin Pitcher, James Riely, Charles Winebrinner. 33-47 [doi]
- Information Flow Monitoring as Abstract Interpretation for Relational LogicAndrey Chudnov, George Kuan, David A. Naumann. 48-62 [doi]
- On Dynamic Flow-Sensitive Floating-Label SystemsPablo Buiras, Deian Stefan, Alejandro Russo. 65-79 [doi]
- Noninterference under Weak Memory ModelsHeiko Mantel, Matthias Perner, Jens Sauer. 80-94 [doi]
- Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk AwarenessMarian Harbach, Sascha Fahl, Matthew Smith. 97-110 [doi]
- How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of TimingJens Grossklags, David Reitter. 111-122 [doi]
- Attribute-Based Encryption for Access Control Using Elementary OperationsJason Crampton, Alexandre Pinto. 125-139 [doi]
- Automated Analysis and Synthesis of Block-Cipher Modes of OperationAlex J. Malozemoff, Jonathan Katz, Matthew D. Green. 140-152 [doi]
- Certified Synthesis of Efficient Batch VerifiersJoseph A. Akinyele, Gilles Barthe, Benjamin Grégoire, Benedikt Schmidt, Pierre-Yves Strub. 153-165 [doi]
- A Peered Bulletin Board for Robust Use in Verifiable Voting SystemsChris Culnane, Steve A. Schneider. 169-183 [doi]
- From Input Private to Universally Composable Secure Multi-party Computation PrimitivesDan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen. 184-198 [doi]
- Malleable Signatures: New Definitions and Delegatable Anonymous CredentialsMelissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn. 199-213 [doi]
- Decidability for Lightweight Diffie-Hellman ProtocolsDaniel J. Dougherty, Joshua D. Guttman. 217-231 [doi]
- Modeling Diffie-Hellman Derivability for Automated AnalysisMoses Liskov, F. Javier Thayer. 232-243 [doi]
- Actor Key Compromise: Consequences and CountermeasuresDavid A. Basin, Cas J. F. Cremers, Marko Horvat. 244-258 [doi]
- A Sound Abstraction of the Parsing ProblemSebastian Mödersheim, Georgios Katsoris. 259-273 [doi]
- Compositional Information-Flow Security for Interactive SystemsWillard Rafnsson, Andrei Sabelfeld. 277-292 [doi]
- Stateful Declassification Policies for Event-Driven ProgramsMathy Vanhoef, Willem De Groef, Dominique Devriese, Frank Piessens, Tamara Rezk. 293-307 [doi]
- Additive and Multiplicative Notions of Leakage, and Their CapacitiesMário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith. 308-322 [doi]
- The Complexity of Estimating Systematic Risk in NetworksBenjamin Johnson, Aron Laszka, Jens Grossklags. 325-336 [doi]
- Automated Generation of Attack TreesRoberto Vigo, Flemming Nielson, Hanne Riis Nielson. 337-350 [doi]
- Mignis: A Semantic Based Tool for Firewall ConfigurationPedro Adão, C. Bozzato, G. Dei Rossi, Riccardo Focardi, Flaminia L. Luccio. 351-365 [doi]
- Provably Sound Browser-Based Enforcement of Web Session IntegrityMichele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro Tempesta. 366-380 [doi]
- TUC: Time-Sensitive and Modular Analysis of Anonymous CommunicationMichael Backes, Praveen Manoharan, Esfandiar Mohammadi. 383-397 [doi]
- Differential Privacy: An Economic Method for Choosing EpsilonJustin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C. Pierce, Aaron Roth. 398-410 [doi]
- Proving Differential Privacy in Hoare LogicGilles Barthe, Marco Gaboardi, Emilio Jesús Gallego Arias, Justin Hsu, César Kunz, Pierre-Yves Strub. 411-424 [doi]
- Balancing Societal Security and Individual Privacy: Accountable Escrow SystemJia Liu, Mark Dermot Ryan, Liqun Chen. 427-440 [doi]