:facetid:toc:\"db/conf/ccs/ccs2004.bht\"OK:facetid:toc:db/conf/ccs/ccs2004.bhtGilles BartheLeonor Prensa NietoFormally verifying information flow type systems for concurrent and thread systems.FMSE13-222004Conference and Workshop Papersclosedconf/ccs/BartheN0410.1145/1029133.1029136https://doi.org/10.1145/1029133.1029136https://dblp.org/rec/conf/ccs/BartheN04URL#6023823Michele BugliesiRiccardo FocardiMatteo MaffeiAuthenticity by tagging and typing.FMSE1-122004Conference and Workshop Papersclosedconf/ccs/BugliesiFM0410.1145/1029133.1029135https://doi.org/10.1145/1029133.1029135https://dblp.org/rec/conf/ccs/BugliesiFM04URL#6023830Ricardo CorinSandro EtallePieter H. HartelAngelika MaderTimed model checking of security protocols.FMSE23-322004Conference and Workshop Papersclosedconf/ccs/CorinEHM0410.1145/1029133.1029137https://doi.org/10.1145/1029133.1029137https://dblp.org/rec/conf/ccs/CorinEHM04URL#6023834Thuong DoanSteven A. DemurjianT. C. TingAndreas KetterlMAC and UML for secure software design.FMSE75-852004Conference and Workshop Papersclosedconf/ccs/DoanDTK0410.1145/1029133.1029144https://doi.org/10.1145/1029133.1029144https://dblp.org/rec/conf/ccs/DoanDTK04URL#6023838Phan Minh DungPhan Minh ThangStepwise development of security protocols: a speech act-oriented approach.FMSE33-442004Conference and Workshop Papersclosedconf/ccs/DungT0410.1145/1029133.1029139https://doi.org/10.1145/1029133.1029139https://dblp.org/rec/conf/ccs/DungT04URL#6023841Brant HashiiLessons learned using alloy to formally specify MLS-PCA trusted security architecture.FMSE86-952004Conference and Workshop Papersclosedconf/ccs/Hashii0410.1145/1029133.1029145https://doi.org/10.1145/1029133.1029145https://dblp.org/rec/conf/ccs/Hashii04URL#6023844Tomás E. UribeSteven CheungAutomatic analysis of firewall and network intrusion detection system configurations.FMSE66-742004Conference and Workshop Papersclosedconf/ccs/UribeC0410.1145/1029133.1029143https://doi.org/10.1145/1029133.1029143https://dblp.org/rec/conf/ccs/UribeC04URL#6023858Lingyu Wang 0001Duminda WijesekeraSushil JajodiaA logic-based framework for attribute based access control.FMSE45-552004Conference and Workshop Papersclosedconf/ccs/WangWJ0410.1145/1029133.1029140https://doi.org/10.1145/1029133.1029140https://dblp.org/rec/conf/ccs/WangWJ04URL#6023862Nan Zhang 0003Mark Ryan 0001Dimitar P. GuelevSynthesising verified access control systems in XACML.FMSE56-652004Conference and Workshop Papersclosedconf/ccs/ZhangRG0410.1145/1029133.1029141https://doi.org/10.1145/1029133.1029141https://dblp.org/rec/conf/ccs/ZhangRG04URL#6023867Vijayalakshmi AtluriMichael Backes 0001David A. BasinMichael WaidnerProceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004FMSEACM2004Editorshipconf/ccs/2004http://dl.acm.org/citation.cfm?id=1030083https://dblp.org/rec/conf/ccs/2004URL#6096932