


default search action
11th CSFW 1998: Rockport, Massachusetts, USA
- Proceedings of the 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998. IEEE Computer Society 1998, ISBN 0-8186-8488-7

Distributed Services
- Paul F. Syverson:

Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange. 2-13 - Tuomas Aura:

On the Structure of Delegation Networks. 14-26 - Martín Abadi:

Two Facets of Authentication. 27-32
Noninterference
- Dennis M. Volpano, Geoffrey Smith:

Probabilistic Noninterference in a Concurrent Language. 34-43 - Fabio Martinelli:

Partial Model Checking and Theorem Proving for Ensuring Security Properties. 44-52
Protocol Verification
- Steve A. Schneider

:
Formal Analysis of a Non-Repudiation Protocol. 54-65 - F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman

:
Honest Ideals on Strand Spaces. 66-77
Panel
- Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows:

Panel Introduction: Varieties of Authentication. 79-82
Protocol Model Checking
- A. W. Roscoe:

Proving Security Protocols with Model Checkers by Data Independence Techniques. 84-95 - Gavin Lowe:

Towards a Completeness Result for Model Checking of Security Protocols. 96-105 - Vitaly Shmatikov, Ulrich Stern:

Efficient Finite-State Analysis for Large Security Protocols. 106-115
Composition
- Aris Zakinthinos, E. Stewart Lee:

Composing Secure Systems that have Emergent Properties. 117-122 - Frédéric Cuppens, Laurence Cholvy, Claire Saurel, Jérôme Carrère:

Merging Security Policies: Analysis of a Practical Example. 123-136
Protocol Logics
- Stephen H. Brackin:

Evaluating and Improving Protocol Analysis by Automatic Proof. 138-152 - Levente Buttyán, Sebastian Staamann, Uwe G. Wilhelm:

A Simple Logic for Authentication Protocol Design. 153-162
Panel
- Peter Y. A. Ryan

, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies. 164-166
Database and Intrusion Detection
- Sushil Jajodia, Luigi V. Mancini

, Sanjeev Setia:
A Fair Locking Protocol for Multilevel Secure Databases. 168-178 - Raymond W. Yip, Karl N. Levitt:

Data Level Inference Detection in Database Systems. 179-189 - Jia-Ling Lin

, Xiaoyang Sean Wang, Sushil Jajodia:
Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies. 190-201

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














