


default search action
19th CSFW 2006: Venice, Italy
- 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy. IEEE Computer Society 2006, ISBN 0-7695-2615-2

Information Flow
- Marieke Huisman

, Pratik Worah
, Kim Sunesen:
A Temporal Logic Characterisation of Observational Determinism. 3 - Peng Li, Steve Zdancewic:

Encoding Information Flow in Haskell. 16 - Stéphanie Delaune, Steve Kremer

, Mark Ryan
:
Coercion-Resistance and Receipt-Freeness in Electronic Voting. 28-42
Games, Plans, and Transformations
- Shai Rubin, Somesh Jha, Barton P. Miller:

On the Completeness of Attack Mutation Algorithms. 43-56 - Massimo Bartoletti

, Pierpaolo Degano, Gian-Luigi Ferrari
:
Types and Effects for Secure Service Orchestration. 57-69 - Krishnendu Chatterjee, Radha Jagadeesan, Corin Pitcher:

Games for Controls. 70-84
Access Control
- Michael J. May

, Carl A. Gunter, Insup Lee:
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. 85-97 - Jason Crampton, Keith M. Martin, Peter R. Wild:

On Key Assignment for Hierarchical Access Control. 98-111 - Avik Chaudhuri, Martín Abadi:

Secrecy by Typing and File-Access Control. 112-123 - Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R. Ramakrishnan:

Policy Analysis for Administrative Role Based Access Control. 124-138
Security Protocol Analysis
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse:

Verified Interoperable Implementations of Security Protocols. 139-152 - Christoph Sprenger

, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner
:
Cryptographically Sound Theorem Proving. 153-166 - Aybek Mukhamedov, Mark Dermot Ryan

:
Resolve-Impossibility for a Contract-Signing Protocol. 167-176
Language, Interaction, and Change
- Alejandro Russo

, Andrei Sabelfeld:
Securing Interaction between Threads and the Scheduler. 177-189 - Kevin R. O'Neill, Michael R. Clarkson, Stephen Chong:

Information-Flow Security for Interactive Programs. 190-201 - Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic:

Managing Policy Updates in Security-Typed Languages. 202-216
Language, Obfuscation, and Robustness
- Daniel Hedin, David Sands:

Noninterference in the Presence of Non-Opaque Pointers. 217-229 - Riccardo Pucella, Fred B. Schneider:

Independence From Obfuscation: A Semantic Framework for Dive. 230-241 - Stephen Chong, Andrew C. Myers:

Decentralized Robustness. 242-256
Authorization and Trust
- Antonio Lain, Miranda Mowbray:

Distributed Authorization Using Delegation with Acyclic Paths. 257-269 - Hongbin Zhou, Simon N. Foley

:
A Framework for Establishing Decentralized Secure Coalitions. 270-282 - Deepak Garg, Frank Pfenning:

Non-Interference in Constructive Authorization Logic. 283-296
Protocols and Cryptographic Foundations
- Kim-Kwang Raymond Choo

:
Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. 297-308 - Ralf Küsters:

Simulation-Based Security with Inexhaustible Interactive Turing Machines. 309-320 - Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi:

Computationally Sound Compositional Logic for Key Exchange Protocols. 321-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














