Abstract is missing.
- Faceted Dynamic Information Flow via Control and Data MonadsThomas Schmitz, Dustin Rhodes, Thomas H. Austin, Kenneth Knowles, Cormac Flanagan. 3-23 [doi]
- A Taxonomy of Information Flow MonitorsNataliia Bielova, Tamara Rezk. 46-67 [doi]
- On Improvements of Low-Deterministic SecurityJoachim Breitner, Jürgen Graf, Martin Hecker, Martin Mohr, Gregor Snelting. 68-88 [doi]
- Tool Demonstration: JOANAJürgen Graf, Martin Hecker, Martin Mohr, Gregor Snelting. 89-93 [doi]
- Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case StudyQuoc Huy Do 0002, Eduard Kamburjan, Nathan Wasser. 97-115 [doi]
- Towards a Comprehensive Model of Isolation for Mitigating Illicit ChannelsKevin Falzon, Eric Bodden. 116-138 [doi]
- Correct Audit Logging: Theory and PracticeSepehr Amir-Mohammadian, Stephen Chong, Christian Skalka. 139-162 [doi]
- The Value of Attack-Defence DiagramsHolger Hermanns, Julia Krämer, Jan Krcál, Mariëlle Stoelinga. 163-185 [doi]
- Composing Protocols with Randomized ActionsMatthew S. Bauer, Rohit Chadha, Mahesh Viswanathan 0001. 189-210 [doi]
- Bounding the Number of Agents, for Equivalence TooVéronique Cortier, Antoine Dallon, Stéphanie Delaune. 211-232 [doi]
- AIF-ω: Set-Based Protocol Abstraction with Countable FamiliesSebastian Mödersheim, Alessandro Bruni. 233-253 [doi]
- Computational Soundness Results for Stateful Applied π CalculusJianxiong Shao, Yu Qin, Dengguo Feng. 254-275 [doi]