


default search action
17th CSFW 2004: Pacific Grove, California, USA
- 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA. IEEE Computer Society 2004, ISBN 0-7695-2169-X

Protocols I
- Stéphanie Delaune, Florent Jacquemard:

A Theory of Dictionary Attacks and its Complexity. 2-15 - Olivier Pereira, Jean-Jacques Quisquater:

Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. 16-19 - Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic:

Abstraction and Refinement in Protocol Derivation. 30-
Access Control
- Chiara Braghin, Daniele Gorla, Vladimiro Sassone:

A Distributed Calculus for Ro^le-Based Access Control. 48-60 - Frédéric Besson, Tomasz Blanc, Cédric Fournet, Andrew D. Gordon:

From Stack Inspection to Access Control: A Security Analysis for Libraries. 61-
Intrusion Detection
- Frédéric Cuppens, Sylvain Gombault, Thierry Sans:

Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. 78-87 - Magnus Almgren, Erland Jonsson:

Using Active Learning in Intrusion Detection. 88-
Information Flow
- Gilles Barthe

, Pedro R. D'Argenio, Tamara Rezk:
Secure Information Flow by Self-Composition. 100-114 - Zhenyue Deng, Geoffrey Smith:

Lenient Array Operations for Practical Secure Information Flow. 115-
Security Policies
- Hubie Chen, Stephen Chong:

Owned Policies for Information Security. 126-138 - Moritz Y. Becker, Peter Sewell

:
Cassandra: Flexible Trust Management, Applied to Electronic Health Records. 139-154 - Kaijun Tan, Jason Crampton, Carl A. Gunter:

The Consistency of Task-Based Authorization Constraints in Workflow Systems. 155-
Declassification and Information Flow
- Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic:

Enforcing Robust Declassification. 172-186 - Annalisa Bossi, Carla Piazza, Sabina Rossi:

Modelling Downgrading in Information Flow Security. 187-
Formal Methods and Cryptography
- Michael Backes, Birgit Pfitzmann:

Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. 204-218 - Ran Canetti:

Universally Composable Signature, Certification, and Authentication. 219-
Authorization
- Nathan Whitehead, Martín Abadi, George C. Necula:

By Reason and Authority: A System for Authorization of Proof-Carrying Code. 236-250 - Joseph Y. Halpern, Vicky Weissman:

A Formal Foundation for XrML. 251-
Protocols II
- Rohit Chadha, Steve Kremer, Andre Scedrov:

Formal Analysis of Multi-Party Contract Signing. 266-265 - Ron van der Meyden, Kaile Su:

Symbolic Model Checking the Knowledge of the Dining Cryptographers. 280-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














