Abstract is missing.
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational PropertiesSantiago Escobar, Catherine Meadows, José Meseguer. 1-50 [doi]
- An Introduction to Certificate TranslationGilles Barthe, César Kunz. 51-95 [doi]
- Federated Identity ManagementDavid W. Chadwick. 96-120 [doi]
- Electronic Voting in the Netherlands: From Early Adoption to Early AbolishmentBart Jacobs, Wolter Pieters. 121-144 [doi]
- Logic in Access Control (Tutorial Notes)MartÃn Abadi. 145-165 [doi]
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security ProtocolsSebastian Mödersheim, Luca Viganò. 166-194 [doi]
- Verification of Concurrent Programs with ChaliceK. Rustan M. Leino, Peter Müller, Jan Smans. 195-222 [doi]
- Certified Static Analysis by Abstract InterpretationFrédéric Besson, David Cachera, Thomas P. Jensen, David Pichardie. 223-257 [doi]
- Resource Usage Analysis and Its Application to Resource CertificationElvira Albert, Puri Arenas, Samir Genaim, Germán Puebla, Damiano Zanardini. 258-288 [doi]
- Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor NetworksJavier Lopez, Rodrigo Roman, Cristina Alcaraz. 289-338 [doi]