


default search action
20th CSF 2007: Venice, Italy
- 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy. IEEE Computer Society 2007, ISBN 0-7695-2819-8

Authorization
- Moritz Y. Becker, Cédric Fournet, Andrew D. Gordon:

Design and Semantics of a Decentralized Authorization Language. 3-15 - Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, James Riely

:
Do As I SaY! Programmatic Access Control with Explicit Identities. 16-30 - Cédric Fournet, Andy Gordon, Sergio Maffeis

:
A Type Discipline for Authorization in Distributed Systems. 31-48
Multi-layer protocols and key conjuring
- Prateek Gupta, Vitaly Shmatikov:

Security Analysis of Voice-over-IP Protocols. 49-63 - Alwyn Goodloe, Carl A. Gunter:

Reasoning about Concurrency for Security Tunnels. 64-78 - Véronique Cortier, Stéphanie Delaune, Graham Steel:

A Formal Theory of Key Conjuring. 79-96
Protocols and cryptographic foundations
- Bruno Blanchet:

Computationally Sound Mechanized Proofs of Correspondence Assertions. 97-111 - Michael Backes, Birgit Pfitzmann, Andre Scedrov

:
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. 112-124 - Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira:

Compositional Security for Task-PIOAs. 125-139 - Roberto Segala

, Andrea Turrini:
Approximated Computationally Bounded Simulation Relations for Probabilistic Automata. 140-156
Secure implementation
- James Heather:

Implementing STV securely in Pret a Voter. 157-169 - Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer:

Secure Implementations for Typed Session Abstractions. 170-186 - Ta-Chung Tsai, Alejandro Russo

, John Hughes:
A Library for Secure Multi-threaded Information Flow in Haskell. 187-202
Information flow
- Paritosh Shroff, Scott F. Smith, Mark Thober:

Dynamic Dependency Monitoring to Secure Information Flow. 203-217 - Gurvan Le Guernic

:
Automaton-based Confidentiality Monitoring of Concurrent Programs. 218-232 - Lennart Beringer, Martin Hofmann:

Secure information flow and program logics. 233-248
Privacy
- Hanne Riis Nielson

, Flemming Nielson
:
A flow-sensitive analysis of privacy properties. 249-264 - Max I. Kanovich, Paul D. Rowe, Andre Scedrov

:
Collaborative Planning With Privacy. 265-278 - Adam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram:

Privacy and Utility in Business Processes. 279-294
20 years anniversary session
- Miranda Mowbray, Dieter Gollmann:

Electing the Doge of Venice: Analysis of a 13th Century Protocol. 295-310
Vulnerability analysis and information-theoretic security
- David Brumley

, Hao Wang, Somesh Jha, Dawn Xiaodong Song:
Creating Vulnerability Signatures Using Weakest Preconditions. 311-325 - Heiko Mantel, Henning Sudbrock:

Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. 326-340 - Konstantinos Chatzikokolakis, Catuscia Palamidessi

, Prakash Panangaden:
Probability of Error in Information-Hiding Protocols. 341-354
Security protocol analysis
- Michael Backes, Agostino Cortesi

, Matteo Maffei:
Causality-based Abstraction of Multiplicity in Security Protocols. 355-369 - Sibylle B. Fröschle:

The Insecurity Problem: Tackling Unbounded Data. 370-384 - Alessandro Armando

, Roberto Carbone
, Luca Compagna:
LTL Model Checking for Security Protocols. 385-396

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














