default search action
Search dblp for Publications
export results for "toc:db/conf/csfw/csfw1999.bht:"
@inproceedings{DBLP:conf/csfw/BertinoFBR99, author = {Elisa Bertino and Elena Ferrari and Francesco Buccafurri and Pasquale Rullo}, title = {A Logical Framework for Reasoning on Data Access Control Policies}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {175--189}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779772}, doi = {10.1109/CSFW.1999.779772}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BertinoFBR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Bieber99, author = {Pierre Bieber}, title = {Security Function Interactions}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {151--160}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779770}, doi = {10.1109/CSFW.1999.779770}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Bieber99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BodeiDFP99, author = {Chiara Bodei and Pierpaolo Degano and Riccardo Focardi and Corrado Priami}, title = {Authentication via Localized Names}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {98--110}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779766}, doi = {10.1109/CSFW.1999.779766}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BodeiDFP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CervesatoDLMS99, author = {Iliano Cervesato and Nancy A. Durgin and Patrick Lincoln and John C. Mitchell and Andre Scedrov}, title = {A Meta-Notation for Protocol Analysis}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {55--69}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779762}, doi = {10.1109/CSFW.1999.779762}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CervesatoDLMS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DuranteFG99, author = {Antonio Durante and Riccardo Focardi and Roberto Gorrieri}, title = {{CVS:} {A} Compiler for the Analysis of Cryptographic Protocols}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {203--212}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779774}, doi = {10.1109/CSFW.1999.779774}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DuranteFG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HalpernM99, author = {Joseph Y. Halpern and Ron van der Meyden}, title = {A Logic for SDSI's Linked Local Name Spaces}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {111--122}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779767}, doi = {10.1109/CSFW.1999.779767}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HalpernM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LiFG99, author = {Ninghui Li and Joan Feigenbaum and Benjamin N. Grosof}, title = {A Logic-based Knowledge Representation for Authorization with Delegation}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {162--174}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779771}, doi = {10.1109/CSFW.1999.779771}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/LiFG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Lowe99, author = {Mei Lin Hui and Gavin Lowe}, title = {Safe Simplifying Transformations for Security Protocols}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {32--43}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779760}, doi = {10.1109/CSFW.1999.779760}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Lowe99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Lynch99, author = {Nancy A. Lynch}, title = {{I/O} Automaton Models and Proofs for Shared-Key Communication Systems}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {14--29}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779759}, doi = {10.1109/CSFW.1999.779759}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Lynch99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Maneki99, author = {Alfred P. Maneki}, title = {Honest Functions and their Application to the Analysis of Cryptographic Protocols}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {83--89}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779764}, doi = {10.1109/CSFW.1999.779764}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Maneki99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Meadows99, author = {Catherine Meadows}, title = {A Formal Framework and Evaluation Method for Network Denial of Service}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {4--13}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779758}, doi = {10.1109/CSFW.1999.779758}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Meadows99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Monniaux99, author = {David Monniaux}, title = {Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {44--54}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779761}, doi = {10.1109/CSFW.1999.779761}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Monniaux99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/OHalloran99, author = {Colin O'Halloran}, title = {Trusted System Construction}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {124--135}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779768}, doi = {10.1109/CSFW.1999.779768}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/OHalloran99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RoscoeG99, author = {A. W. Roscoe and M. H. Goldsmith}, title = {What Is Intransitive Noninterference?}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {228--238}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779776}, doi = {10.1109/CSFW.1999.779776}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RoscoeG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RyanS99, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {Process Algebra and Non-Interference}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {214--227}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779775}, doi = {10.1109/CSFW.1999.779775}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RyanS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SewellV99, author = {Peter Sewell and Jan Vitek}, title = {Secure Composition of Insecure Components}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {136--150}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779769}, doi = {10.1109/CSFW.1999.779769}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/SewellV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Song99, author = {Dawn Xiaodong Song}, title = {Athena: {A} New Efficient Automatic Checker for Security Protocol Analysis}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {192--202}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779773}, doi = {10.1109/CSFW.1999.779773}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Song99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ThayerHG99, author = {F. Javier Thayer and Jonathan C. Herzog and Joshua D. Guttman}, title = {Mixed Strand Spaces}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {72--82}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779763}, doi = {10.1109/CSFW.1999.779763}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ThayerHG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Volpano99, author = {Dennis M. Volpano}, title = {Formalization and Proof of Secrecy Properties}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {92--95}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779765}, doi = {10.1109/CSFW.1999.779765}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Volpano99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/1999, title = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://ieeexplore.ieee.org/xpl/conhome/6332/proceeding}, isbn = {0-7695-0201-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.