Abstract is missing.
- Handling declared information leakage: extended abstractRachid Echahed, Frédéric Prost. 1-4 [doi]
- Policy framings for access controlMassimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari. 5-11 [doi]
- Specifying Kerberos 5 cross-realm authenticationIliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad. 12-26 [doi]
- Using static analysis to validate the SAML single sign-on protocolSteffen M. Hansen, Jakob Skriver, Hanne Riis Nielson. 27-40 [doi]
- Inferring authentication tagsRiccardo Focardi, Matteo Maffei, Francesco Placella. 41-49 [doi]
- Statically checking confidentiality via dynamic labelsBart Jacobs, Wolter Pieters, Martijn Warnier. 50-56 [doi]
- Enterprise privacy promises and enforcementAdam Barth, John C. Mitchell. 58-66 [doi]
- Formal prototyping in early stages of protocol designAlwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr. 67-80 [doi]
- A variant of the Chaum voter-verifiable schemePeter Y. A. Ryan. 81-88 [doi]