default search action
11th CSFW 1998: Rockport, Massachusetts, USA
- Proceedings of the 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998. IEEE Computer Society 1998, ISBN 0-8186-8488-7
Distributed Services
- Paul F. Syverson:
Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange. 2-13 - Tuomas Aura:
On the Structure of Delegation Networks. 14-26 - Martín Abadi:
Two Facets of Authentication. 27-32
Noninterference
- Dennis M. Volpano, Geoffrey Smith:
Probabilistic Noninterference in a Concurrent Language. 34-43 - Fabio Martinelli:
Partial Model Checking and Theorem Proving for Ensuring Security Properties. 44-52
Protocol Verification
- Steve A. Schneider:
Formal Analysis of a Non-Repudiation Protocol. 54-65 - F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman:
Honest Ideals on Strand Spaces. 66-77
Panel
- Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows:
Panel Introduction: Varieties of Authentication. 79-82
Protocol Model Checking
- A. W. Roscoe:
Proving Security Protocols with Model Checkers by Data Independence Techniques. 84-95 - Gavin Lowe:
Towards a Completeness Result for Model Checking of Security Protocols. 96-105 - Vitaly Shmatikov, Ulrich Stern:
Efficient Finite-State Analysis for Large Security Protocols. 106-115
Composition
- Aris Zakinthinos, E. Stewart Lee:
Composing Secure Systems that have Emergent Properties. 117-122 - Frédéric Cuppens, Laurence Cholvy, Claire Saurel, Jérôme Carrère:
Merging Security Policies: Analysis of a Practical Example. 123-136
Protocol Logics
- Stephen H. Brackin:
Evaluating and Improving Protocol Analysis by Automatic Proof. 138-152 - Levente Buttyán, Sebastian Staamann, Uwe G. Wilhelm:
A Simple Logic for Authentication Protocol Design. 153-162
Panel
- Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies. 164-166
Database and Intrusion Detection
- Sushil Jajodia, Luigi V. Mancini, Sanjeev Setia:
A Fair Locking Protocol for Multilevel Secure Databases. 168-178 - Raymond W. Yip, Karl N. Levitt:
Data Level Inference Detection in Database Systems. 179-189 - Jia-Ling Lin, Xiaoyang Sean Wang, Sushil Jajodia:
Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies. 190-201
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.