Search dblp for Publications

export results for "toc:db/conf/ifip1-7/fast2005.bht:"

 download as .bib file

@proceedings{DBLP:conf/ifip1-7/2005,
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11679219},
  doi          = {10.1007/11679219},
  isbn         = {3-540-32628-6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BartheRS05,
  author       = {Gilles Barthe and
                  Tamara Rezk and
                  Ando Saabas},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Proof Obligations Preserving Compilation},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {112--126},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_9},
  doi          = {10.1007/11679219\_9},
  timestamp    = {Sun, 02 Oct 2022 16:07:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BartheRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BryansKMR05,
  author       = {Jeremy W. Bryans and
                  Maciej Koutny and
                  Laurent Mazar{\'{e}} and
                  Peter Y. A. Ryan},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Opacity Generalised to Transition Systems},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_7},
  doi          = {10.1007/11679219\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BryansKMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/ChatzikokolakisP05,
  author       = {Konstantinos Chatzikokolakis and
                  Catuscia Palamidessi},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Probable Innocence Revisited},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {142--157},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_11},
  doi          = {10.1007/11679219\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/ChatzikokolakisP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/ChothiaD05,
  author       = {Tom Chothia and
                  Dominic Duggan},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Type-Based Distributed Access Control vs. Untyped Attackers},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {203--216},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_15},
  doi          = {10.1007/11679219\_15},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/ChothiaD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/DelicataS05,
  author       = {Rob Delicata and
                  Steve A. Schneider},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {34--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_4},
  doi          = {10.1007/11679219\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/DelicataS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Enea05,
  author       = {Constantin Enea},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Unifying Decidability Results on Protection Systems Using Simulations},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {96--111},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_8},
  doi          = {10.1007/11679219\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Enea05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/FrancescoM05,
  author       = {Nicoletta De Francesco and
                  Luca Martini},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Abstract Interpretation to Check Secure Information Flow in Programs
                  with Input-Output Security Annotations},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {63--80},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_6},
  doi          = {10.1007/11679219\_6},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/FrancescoM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/KluwerW05,
  author       = {Johan W. Kl{\"{u}}wer and
                  Arild Waaler},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Relative Trustworthiness},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {158--170},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_12},
  doi          = {10.1007/11679219\_12},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/KluwerW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/KopfM05,
  author       = {Boris K{\"{o}}pf and
                  Heiko Mantel},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Eliminating Implicit Information Leaks by Transformational Typing
                  and Unification},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {47--62},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_5},
  doi          = {10.1007/11679219\_5},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/KopfM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/LabordeBB05,
  author       = {Romain Laborde and
                  Fran{\c{c}}ois Barr{\`{e}}re and
                  Abdelmalek Benzekri},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {A Security Management Information Model Derivation Framework: From
                  Goals to Configurations},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {217--234},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_16},
  doi          = {10.1007/11679219\_16},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/LabordeBB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/MukhamedovR05,
  author       = {Aybek Mukhamedov and
                  Mark Dermot Ryan},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {On Anonymity with Identity Escrow},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {235--243},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_17},
  doi          = {10.1007/11679219\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/MukhamedovR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Pacheco05,
  author       = {Olga Pacheco},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Normative Specification: {A} Tool for Trust and Security},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_14},
  doi          = {10.1007/11679219\_14},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Pacheco05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Pancho-FestinG05,
  author       = {Susan Pancho{-}Festin and
                  Dieter Gollmann},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {5--15},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_2},
  doi          = {10.1007/11679219\_2},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Pancho-FestinG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/RandellR05,
  author       = {Brian Randell and
                  Peter Y. A. Ryan},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Voting Technologies and Trust},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_1},
  doi          = {10.1007/11679219\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/RandellR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/SongKTBCL05,
  author       = {Tao Song and
                  Calvin Ko and
                  Chinyang Henry Tseng and
                  Poornima Balasubramanyam and
                  Anant Chaudhary and
                  Karl N. Levitt},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formal Reasoning About a Specification-Based Intrusion Detection for
                  Dynamic Auto-configuration Protocols in Ad Hoc Networks},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {16--33},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_3},
  doi          = {10.1007/11679219\_3},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/SongKTBCL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/WeiH05,
  author       = {Kun Wei and
                  James Heather},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Towards Verification of Timed Non-repudiation Protocols},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {244--257},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_18},
  doi          = {10.1007/11679219\_18},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/WeiH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/WinwoodC05,
  author       = {Simon Winwood and
                  Manuel M. T. Chakravarty},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Secure Untrusted Binaries - Provably!},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {171--186},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_13},
  doi          = {10.1007/11679219\_13},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/WinwoodC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/ZhouF05,
  author       = {Hongbin Zhou and
                  Simon N. Foley},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {A Logic for Analysing Subterfuge in Delegation Chains},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {127--141},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_10},
  doi          = {10.1007/11679219\_10},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/ZhouF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics