


default search action
14th CSFW 2001: Cape Breton, Nova Scotia, Canada
- 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada. IEEE Computer Society 2001, ISBN 0-7695-1146-5

Non-Interference & Information Flow
- Sylvan Pinsky, Edward Zieglar:

Noninterference Equations for Nondeterministic Systems. 3-14 - Steve Zdancewic, Andrew C. Myers:

Robust Declassification. 15-23
Access Control
- Ajay Chander, John C. Mitchell, Drew Dean:

A State-Transition Model of Trust Management and Access Control. 27-43 - Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera:

Revocations-A Classification. 44-58 - Joseph Y. Halpern, Ron van der Meyden:

A Logical Reconstruction of SPKI. 59-70
Protocols I
- Olivier Pereira, Jean-Jacques Quisquater:

A Security Analysis of the Cliques Protocols Suites. 73-81 - Bruno Blanchet:

An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. 82-96 - Véronique Cortier, Jonathan K. Millen, Harald Rueß:

Proving Secrecy is Easy Enough. 97-108
Panel
- Andre Scedrov, Ran Canetti, Joshua D. Guttman, David A. Wagner, Michael Waidner:

Relating Cryptography and Cryptographic Protocols. 111-114
Information Flow & Multi-Threading
- Geoffrey Smith:

A New Type System for Secure Information Flow. 115-125 - Heiko Mantel, Andrei Sabelfeld:

A Generic Approach to the Security of Multi-Threaded Programs. 126-142
Protocols II
- Andrew D. Gordon, Alan Jeffrey:

Authenticity by Typing for Security Protocols. 145-159 - Marcelo P. Fiore, Martín Abadi:

Computing Symbolic Models for Verifying Cryptographic Protocols. 160-173 - Michaël Rusinowitch, Mathieu Turuani:

Protocol Insecurity with Finite Number of Sessions is NP-Complete. 174-187
Intrusion Tolerance & Detection
- Peng Liu, Sushil Jajodia:

Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. 191-205 - Somesh Jha, Kymie M. C. Tan, Roy A. Maxion:

Markov Chains, Classifiers, and Intrusion Detection. 206-219 - Muriel Roger, Jean Goubault-Larrecq:

Log Auditing through Model-Checking. 220-234
Panel
- Peter Y. A. Ryan

, John D. McLean, Jonathan K. Millen, Virgil D. Gligor:
Non-Interference: Who Needs It? 237-238
Logics for Protocol Verification
- Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic

:
A Compositional Logic for Protocol Correctness. 241-255 - Eijiro Sumii, Benjamin C. Pierce:

Logical Relations for Encryption. 256-269
Secrecy & Privacy
- Wenliang Du, Mikhail J. Atallah:

Privacy-Preserving Cooperative Scientific Computations. 273-294 - Maritta Heisel, Andreas Pfitzmann, Thomas Santen:

Confidentiality-Preserving Refinement. 295-306

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














