Abstract is missing.
- Strategic Games on Defense TreesStefano Bistarelli, Marco Dall Aglio, Pamela Peretti. 1-15 [doi]
- Timed Calculus of Cryptographic CommunicationJohannes Borgström, Olga Grinchtein, Simon Kramer. 16-30 [doi]
- A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security RiskGyrd Brændeland, Ketil Stølen. 31-46 [doi]
- Game-Based Criterion Partition Applied to Computational Soundness of Adaptive SecurityMarion Daubignard, Romain Janvier, Yassine Lakhnech, Laurent Mazaré. 47-64 [doi]
- Measuring Anonymity with Relative EntropyYuxin Deng, Jun Pang, Peng Wu 0002. 65-79 [doi]
- Formalizing and Analyzing Sender InvariancePaul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò, David A. Basin. 80-95 [doi]
- From Simulations to Theorems: A Position Paper on Research in the Field of Computational TrustKarl Krukow, Mogens Nielsen. 96-111 [doi]
- A Tool for the Synthesis of Controller ProgramsIlaria Matteucci. 112-126 [doi]
- Where Can an Insider Attack?Christian W. Probst, René Rydhof Hansen, Flemming Nielson. 127-142 [doi]
- Maintaining Information Flow Security Under Refinement and TransformationFredrik Seehusen, Ketil Stølen. 143-157 [doi]
- A Classification of Delegation Schemes for Attribute AuthorityLudwig Seitz, Erik Rissanen, Babak Sadighi Firozabadi. 158-169 [doi]
- Program Partitioning Using Dynamic Trust ModelsDan Søndergaard, Christian W. Probst, Christian Damsgaard Jensen, René Rydhof Hansen. 170-184 [doi]
- Locality-Based Security PoliciesTerkel K. Tolstrup, Flemming Nielson, René Rydhof Hansen. 185-201 [doi]
- A Theorem-Proving Approach to Verification of Fair Non-repudiation ProtocolsKun Wei, James Heather. 202-219 [doi]
- A Formal Specification of the MIDP 2.0 Security ModelSantiago Zanella Béguelin, Gustavo Betarte, Carlos Luna. 220-234 [doi]
- A Comparison of Semantic Models for NoninterferenceRon van der Meyden, Chenyi Zhang. 235-249 [doi]
- Hiding Information in Multi Level Security SystemsDanièle Beauquier, Ruggero Lanotte. 250-269 [doi]
- A New Trust Model Based on Advanced D-S Evidence Theory for P2P NetworksChunqi Tian, Shihong Zou, Wendong Wang, Shiduan Cheng. 270-284 [doi]