


default search action
12th CSFW 1999: Mordano, Italy
- Proceedings of the 12th IEEE Computer Security Foundations Workshop, CSFW 1999, Mordano, Italy, June 28-30, 1999. IEEE Computer Society 1999, ISBN 0-7695-0201-6

Formal Models
- Catherine Meadows:

A Formal Framework and Evaluation Method for Network Denial of Service. 4-13 - Nancy A. Lynch:

I/O Automaton Models and Proofs for Shared-Key Communication Systems. 14-29
Security Protocol Analysis: Notation, Transformation, and Simplification
- Mei Lin Hui, Gavin Lowe:

Safe Simplifying Transformations for Security Protocols. 32-43 - David Monniaux:

Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief. 44-54 - Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov:

A Meta-Notation for Protocol Analysis. 55-69
Strand Spaces
- F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman:

Mixed Strand Spaces. 72-82 - Alfred P. Maneki:

Honest Functions and their Application to the Analysis of Cryptographic Protocols. 83-89
Panel: Formalization and Proof of Secrecy Properties
- Dennis M. Volpano:

Formalization and Proof of Secrecy Properties. 92-95
Local Names
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi

, Corrado Priami:
Authentication via Localized Names. 98-110 - Joseph Y. Halpern, Ron van der Meyden:

A Logic for SDSI's Linked Local Name Spaces. 111-122
Interaction and Composition
- Colin O'Halloran:

Trusted System Construction. 124-135 - Peter Sewell

, Jan Vitek:
Secure Composition of Insecure Components. 136-150 - Pierre Bieber:

Security Function Interactions. 151-160
Logics for Authorization and Access Control
- Ninghui Li, Joan Feigenbaum, Benjamin N. Grosof:

A Logic-based Knowledge Representation for Authorization with Delegation. 162-174 - Elisa Bertino, Elena Ferrari, Francesco Buccafurri, Pasquale Rullo:

A Logical Framework for Reasoning on Data Access Control Policies. 175-189
Advances in Automated Security Protocol Analysis
- Dawn Xiaodong Song:

Athena: A New Efficient Automatic Checker for Security Protocol Analysis. 192-202 - Antonio Durante, Riccardo Focardi

, Roberto Gorrieri:
CVS: A Compiler for the Analysis of Cryptographic Protocols. 203-212
Noninterference Using Process Algebras
- Peter Y. A. Ryan, Steve A. Schneider

:
Process Algebra and Non-Interference. 214-227 - A. W. Roscoe, M. H. Goldsmith:

What Is Intransitive Noninterference? 228-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














