default search action
20th CSF 2007: Venice, Italy
- 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy. IEEE Computer Society 2007, ISBN 0-7695-2819-8
Authorization
- Moritz Y. Becker, Cédric Fournet, Andrew D. Gordon:
Design and Semantics of a Decentralized Authorization Language. 3-15 - Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, James Riely:
Do As I SaY! Programmatic Access Control with Explicit Identities. 16-30 - Cédric Fournet, Andy Gordon, Sergio Maffeis:
A Type Discipline for Authorization in Distributed Systems. 31-48
Multi-layer protocols and key conjuring
- Prateek Gupta, Vitaly Shmatikov:
Security Analysis of Voice-over-IP Protocols. 49-63 - Alwyn Goodloe, Carl A. Gunter:
Reasoning about Concurrency for Security Tunnels. 64-78 - Véronique Cortier, Stéphanie Delaune, Graham Steel:
A Formal Theory of Key Conjuring. 79-96
Protocols and cryptographic foundations
- Bruno Blanchet:
Computationally Sound Mechanized Proofs of Correspondence Assertions. 97-111 - Michael Backes, Birgit Pfitzmann, Andre Scedrov:
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. 112-124 - Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira:
Compositional Security for Task-PIOAs. 125-139 - Roberto Segala, Andrea Turrini:
Approximated Computationally Bounded Simulation Relations for Probabilistic Automata. 140-156
Secure implementation
- James Heather:
Implementing STV securely in Pret a Voter. 157-169 - Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer:
Secure Implementations for Typed Session Abstractions. 170-186 - Ta-Chung Tsai, Alejandro Russo, John Hughes:
A Library for Secure Multi-threaded Information Flow in Haskell. 187-202
Information flow
- Paritosh Shroff, Scott F. Smith, Mark Thober:
Dynamic Dependency Monitoring to Secure Information Flow. 203-217 - Gurvan Le Guernic:
Automaton-based Confidentiality Monitoring of Concurrent Programs. 218-232 - Lennart Beringer, Martin Hofmann:
Secure information flow and program logics. 233-248
Privacy
- Hanne Riis Nielson, Flemming Nielson:
A flow-sensitive analysis of privacy properties. 249-264 - Max I. Kanovich, Paul D. Rowe, Andre Scedrov:
Collaborative Planning With Privacy. 265-278 - Adam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram:
Privacy and Utility in Business Processes. 279-294
20 years anniversary session
- Miranda Mowbray, Dieter Gollmann:
Electing the Doge of Venice: Analysis of a 13th Century Protocol. 295-310
Vulnerability analysis and information-theoretic security
- David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song:
Creating Vulnerability Signatures Using Weakest Preconditions. 311-325 - Heiko Mantel, Henning Sudbrock:
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. 326-340 - Konstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden:
Probability of Error in Information-Hiding Protocols. 341-354
Security protocol analysis
- Michael Backes, Agostino Cortesi, Matteo Maffei:
Causality-based Abstraction of Multiplicity in Security Protocols. 355-369 - Sibylle B. Fröschle:
The Insecurity Problem: Tackling Unbounded Data. 370-384 - Alessandro Armando, Roberto Carbone, Luca Compagna:
LTL Model Checking for Security Protocols. 385-396
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.