


default search action
21st CSF 2008: Pittsburgh, PA, USA
- Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3182-3

Language-Based Security
- Michele Bugliesi

, Riccardo Focardi
:
Language Based Secure Communication. 3-16 - Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Sergio Maffeis

:
Refinement Types for Secure Implementations. 17-32 - Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett:

A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. 33-47
Security Models in Theory and Practice
- Michael R. Clarkson, Fred B. Schneider:

Hyperproperties. 51-65 - Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell, Nicholas Bambos

:
Security Decision-Making among Interdependent Organizations. 66-80
Declassification and Erasure
- Gilles Barthe

, Salvador Cavadini, Tamara Rezk:
Tractable Enforcement of Declassification Policies. 83-97 - Stephen Chong, Andrew C. Myers:

End-to-End Enforcement of Erasure and Declassification. 98-111
CSF/LICS Joint Invited Talk
- Christoph Sprenger

, David A. Basin:
Cryptographically-Sound Protocol-Model Abstractions. 115-129
Authorization Logic I
- Henry DeYoung, Deepak Garg, Frank Pfenning:

An Authorization Logic With Explicit Time. 133-145
Authorization Logic II
- Yuri Gurevich, Itay Neeman:

DKAL: Distributed-Knowledge Authorization Language. 149-162 - Glenn Bruns, Michael Huth:

Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis. 163-176 - Jeffrey A. Vaughan, Limin Jia

, Karl Mazurak, Steve Zdancewic:
Evidence-Based Audit. 177-191
Protocol Analysis I
- Michael Backes, Catalin Hritcu, Matteo Maffei:

Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. 195-209 - Christopher Dilloway, Gavin Lowe:

Specifying Secure Transport Channels. 210-223 - Jean Goubault-Larrecq:

Towards Producing Formally Checkable Security Proofs, Automatically. 224-238 - Stéphanie Delaune, Steve Kremer

, Mark Ryan
:
Composition of Password-Based Protocols. 239-251
Cryptographic Foundations
- Michael Backes, Dominique Unruh

:
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. 255-269 - Ralf Küsters, Max Tuengerthal:

Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation. 270-284
Information Flow and Concurrency
- Tachio Terauchi

:
A Type System for Observational Determinism. 287-300 - Ron van der Meyden

, Chenyi Zhang
:
Information Flow in Systems with Schedulers. 301-312
Protocol Analysis II
- Doug Kuhlman, Ryan Moriarty, Tony Braskich

, Steve Emeott, Mahesh V. Tripunitara:
A Correctness Proof of a Mesh Security Architecture. 315-330 - Stéphanie Delaune, Steve Kremer

, Graham Steel:
Formal Analysis of PKCS#11. 331-344

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














