


default search action
18th CSFW 2005: Aix-en-Provence, France
- 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France. IEEE Computer Society 2005, ISBN 0-7695-2340-4

Introduction
- Preface.

- Committees.

Session 1: Information Flow and Security Goals
- Peng Li, Steve Zdancewic:

Practical Information-flow Control in Web-Based Information Systems. 2-15 - William L. Harrison, James Hook:

Achieving Information Flow Security through Precise Control of Effects. 16-30 - Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider:

Belief in Information Flow. 31-45
Session 2: Logic and Knowledge for Protocols
- Iliano Cervesato, Catherine Meadows, Dusko Pavlovic:

An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. 48-61 - Martín Abadi, Véronique Cortier:

Deciding Knowledge in Security Protocols under (Many More) Equational Theories. 62-76
Session 3: Protocol Case Studies
- Michael Backes, Markus Dürmuth:

A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. 78-93 - Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani:

Compositional Analysis of Contract Signing Protocols. 94-110
Session 5: Protocol Verification Techniques
- Michele Bugliesi

, Riccardo Focardi
, Matteo Maffei:
Analysis of Typed Analyses of Authentication Protocols. 112-125 - Rob Delicata, Steve A. Schneider

:
Temporal Rank Functions for Forward Secrecy. 126-139 - Xavier Allamigeon, Bruno Blanchet:

Reconstruction of Attacks against Cryptographic Protocols. 140-154
Session 6: Computational and Formal Models
- Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh:

Polynomial Runtime in Simulatability Definitions. 156-169 - Pedro Adão

, Gergei Bana, Andre Scedrov:
Computational and Information-Theoretic Soundness and Completeness of Formal Encryption. 170-184
Session 7: Access Control and Languages
- Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans:

Nomad: A Security Model with Non Atomic Actions and Deadlines. 186-196 - Tian Zhao, John Tang Boyland

:
Type Annotations to Improve Stack-Based Access Control. 197-210 - Massimo Bartoletti

, Pierpaolo Degano, Gian-Luigi Ferrari
:
Enforcing Secure Service Composition. 211-223
Session 9: Declassification
- Ana Almeida Matos

, Gérard Boudol:
On Declassification and the Non-Disclosure Policy. 226-240 - Stephen Chong, Andrew C. Myers:

Language-Based Information Erasure. 241-254 - Andrei Sabelfeld, David Sands:

Dimensions and Principles of Declassification. 255-269
Session 10: Availability and Denial of Service
- Lantian Zheng, Andrew C. Myers:

End-to-End Availability Policies and Noninterference. 272-286 - Ajay Mahimkar, Vitaly Shmatikov:

Game-Based Analysis of Denial-of-Service Prevention Protocols. 287-301

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














