


default search action
15th CSFW 2002: Cape Breton, Nova Scotia, Canada
- 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada. IEEE Computer Society 2002, ISBN 0-7695-1689-0

Information Flow I
- Alessandra Di Pierro

, Chris Hankin
, Herbert Wiklicky:
Approximate Non-Interference. 3-17 - Gavin Lowe:

Quantifying Information Flow. 18-31 - Joseph Y. Halpern, Kevin R. O'Neill:

Secrecy in Multiagent Systems. 32-
Intrusion
- Somesh Jha, Oleg Sheyner, Jeannette M. Wing:

Two Formal Analys s of Attack Graphs. 49-63 - Jean-Philippe Pouzol, Mireille Ducassé:

Formal Specification of Intrusion Signatures and Detection Rules. 64-
Protocols I
- Andrew D. Gordon, Alan Jeffrey:

Types and Effects for Asymmetric Cryptographic Protocols. 77-91 - Joshua D. Guttman

:
Security Protocol Design via Authentication Tests. 92-103 - James Heather:

Strand Spaces and Rank Functions: More than Distant Cousins. 104-
Applications of Model-Checking
- Vitaly Shmatikov:

Probabilistic Analysis of Anonymity. 119-128 - Somesh Jha, Thomas W. Reps:

Analysis of SPKI/SDSI Certificates Using Model Checking. 129-
Protocols II
- Philippa J. Broadfoot, A. W. Roscoe:

Capturing Parallel Attacks within the Data Independence Framework. 147-159 - Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner

:
Polynomial Fairness and Liveness. 160-174 - Frederick Butler, Iliano Cervesato, Aaron D. Jaggard

, Andre Scedrov
:
A Formal Analysis of Some Properties of Kerberos 5 Using MSR. 175-
Games
- Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun:

A Formal Analysis of Syverson?s Rational Exchange Protocol. 193-205 - Steve Kremer, Jean-François Raskin:

Game Analysis of Abuse-free Contract Signing. 206-
Language-Based Security
- Vincent Simonet:

Fine-Grained Information Flow Analysis for a \lambda Calculus with Sum Types. 223-237 - Dominic Duggan:

Cryptographic Types. 238-252 - Anindya Banerjee, David A. Naumann

:
Secure Information Flow and Pointer Confinement in a Java-like Language. 253-
Distributed Rights, Access Control, and Watermarking
- Günter Karjoth, Matthias Schunter:

A Privacy Policy Model for Enterprises. 271-281 - Riccardo Pucella, Vicky Weissman:

A Logic for Reasoning about Digital Rights. 282-294 - Nicholas Tran:

Hiding Functions and Computational Security of Image Watermarking Systems. 295-
Information Flow II
- Riccardo Focardi

, Sabina Rossi:
Information Flow Security in Dynamic Contexts. 307-319 - François Pottier:

A Simple View of Type-Secure Information Flow in the p-Calculus. 320-330

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














