default search action
18th CSFW 2005: Aix-en-Provence, France
- 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France. IEEE Computer Society 2005, ISBN 0-7695-2340-4
Introduction
- Preface.
- Committees.
Session 1: Information Flow and Security Goals
- Peng Li, Steve Zdancewic:
Practical Information-flow Control in Web-Based Information Systems. 2-15 - William L. Harrison, James Hook:
Achieving Information Flow Security through Precise Control of Effects. 16-30 - Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider:
Belief in Information Flow. 31-45
Session 2: Logic and Knowledge for Protocols
- Iliano Cervesato, Catherine Meadows, Dusko Pavlovic:
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. 48-61 - Martín Abadi, Véronique Cortier:
Deciding Knowledge in Security Protocols under (Many More) Equational Theories. 62-76
Session 3: Protocol Case Studies
- Michael Backes, Markus Dürmuth:
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. 78-93 - Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani:
Compositional Analysis of Contract Signing Protocols. 94-110
Session 5: Protocol Verification Techniques
- Michele Bugliesi, Riccardo Focardi, Matteo Maffei:
Analysis of Typed Analyses of Authentication Protocols. 112-125 - Rob Delicata, Steve A. Schneider:
Temporal Rank Functions for Forward Secrecy. 126-139 - Xavier Allamigeon, Bruno Blanchet:
Reconstruction of Attacks against Cryptographic Protocols. 140-154
Session 6: Computational and Formal Models
- Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh:
Polynomial Runtime in Simulatability Definitions. 156-169 - Pedro Adão, Gergei Bana, Andre Scedrov:
Computational and Information-Theoretic Soundness and Completeness of Formal Encryption. 170-184
Session 7: Access Control and Languages
- Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans:
Nomad: A Security Model with Non Atomic Actions and Deadlines. 186-196 - Tian Zhao, John Tang Boyland:
Type Annotations to Improve Stack-Based Access Control. 197-210 - Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Enforcing Secure Service Composition. 211-223
Session 9: Declassification
- Ana Almeida Matos, Gérard Boudol:
On Declassification and the Non-Disclosure Policy. 226-240 - Stephen Chong, Andrew C. Myers:
Language-Based Information Erasure. 241-254 - Andrei Sabelfeld, David Sands:
Dimensions and Principles of Declassification. 255-269
Session 10: Availability and Denial of Service
- Lantian Zheng, Andrew C. Myers:
End-to-End Availability Policies and Noninterference. 272-286 - Ajay Mahimkar, Vitaly Shmatikov:
Game-Based Analysis of Denial-of-Service Prevention Protocols. 287-301
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.