Abstract is missing.
- Trustworthy Services and the Biological AnalogyMichael K. Reiter. 1 [doi]
- Security of Multithreaded Programs by CompilationGilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld. 2-18 [doi]
- Efficient Proving for Practical Distributed Access-Control SystemsLujo Bauer, Scott Garriss, Michael K. Reiter. 19-37 [doi]
- Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter ControlPaul Z. Kolano. 38-54 [doi]
- Pragmatic XML Access Control Using Off-the-Shelf RDBMSBo Luo, Dongwon Lee, Peng Liu. 55-71 [doi]
- Conditional Privacy-Aware Role Based Access ControlQun Ni, Dan Lin, Elisa Bertino, Jorge Lobo. 72-89 [doi]
- Satisfiability and Resiliency in Workflow SystemsQihua Wang, Ninghui Li. 90-105 [doi]
- Completeness of the Authentication TestsShaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer. 106-121 [doi]
- SilentKnock: Practical, Provably Undetectable AuthenticationEugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra. 122-138 [doi]
- Generalized Key Delegation for Hierarchical Identity-Based EncryptionMichel Abdalla, Eike Kiltz, Gregory Neven. 139-154 [doi]
- Change-Impact Analysis of Firewall PoliciesAlex X. Liu. 155-170 [doi]
- Fragmentation and Encryption to Enforce Privacy in Data StorageValentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 171-186 [doi]
- Information Confinement, Privacy, and Security in RFID SystemsRoberto Di Pietro, Refik Molva. 187-202 [doi]
- A Logic for State-Modifying Authorization PoliciesMoritz Y. Becker, Sebastian Nanz. 203-218 [doi]
- Inductive Proofs of Computational SecrecyArnab Roy, Anupam Datta, Ante Derek, John C. Mitchell. 219-234 [doi]
- What, Indeed, Is Intransitive Noninterference?Ron van der Meyden. 235-250 [doi]
- Traceability and Integrity of Execution in Distributed Workflow Management SystemsFrederic Montagut, Refik Molva. 251-266 [doi]
- Dynamic Information Flow Control Architecture for Web ApplicationsSachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudo, Kazuko Oyanagi. 267-282 [doi]
- Cloak: A Ten-Fold Way for Reliable Covert CommunicationsXiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang. 283-298 [doi]
- Efficient Password-Based Authenticated Key Exchange Without Public InformationJun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu. 299-310 [doi]
- Improved Anonymous Timed-Release EncryptionKonstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides. 311-326 [doi]
- Encryption Techniques for Secure Database OutsourcingSergei Evdokimov, Oliver Günther. 327-342 [doi]
- Click Passwords Under InvestigationKrzysztof Golofit. 343-358 [doi]
- Graphical Password Authentication Using Cued Click PointsSonia Chiasson, Paul C. van Oorschot, Robert Biddle. 359-374 [doi]
- Obligations and Their Interaction with ProgramsDaniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi. 375-389 [doi]
- On the Privacy of Concealed Data AggregationAldar C.-F. Chan, Claude Castelluccia. 390-405 [doi]
- Synthesizing Secure ProtocolsVéronique Cortier, Bogdan Warinschi, Eugen Zalinescu. 406-421 [doi]
- A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing ProtocolsVéronique Cortier, Ralf Küsters, Bogdan Warinschi. 422-437 [doi]
- Security Evaluation of Scenarios Based on the TCG s TPM SpecificationSigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga. 438-453 [doi]
- Analyzing Side Channel Leakage of Masked Implementations with Stochastic MethodsKerstin Lemke-Rust, Christof Paar. 454-468 [doi]
- Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast LinksAndré Adelsbach, Ulrich Greveler. 469-484 [doi]
- Towards Modeling Trust Based Decisions: A Game Theoretic ApproachVidyaraman Sankaranarayanan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya. 485-500 [doi]
- Extending the Common Services of eduGAIN with a Credential Conversion ServiceGabriel López Millán, Óscar Cánovas Reverte, Diego R. López, Antonio F. Gómez-Skarmeta. 501-514 [doi]
- Incorporating Temporal Capabilities in Existing Key Management SchemesMikhail J. Atallah, Marina Blanton, Keith B. Frikken. 515-530 [doi]
- A Policy Language for Distributed Usage ControlManuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter. 531-546 [doi]
- Countering Statistical Disclosure with Receiver-Bound Cover TrafficNayantara Mallesh, Matthew Wright. 547-562 [doi]
- Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous AttackHongxia Jin, Jeffery Lotspiech. 563-577 [doi]
- Modular Access Control Via Strategic RewritingDaniel J. Dougherty, Claude Kirchner, Hélène Kirchner, Anderson Santana de Oliveira. 578-593 [doi]
- On the Automated Correction of Security Protocols Susceptible to a Replay AttackJuan Carlos López Pimentel, Raul Monroy, Dieter Hutter. 594-609 [doi]
- Adaptive Soundness of Static EquivalenceSteve Kremer, Laurent Mazaré. 610-625 [doi]