| 2007 | 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy |
| 2007 | A Formal Theory of Key Conjuring. Véronique Cortier, Stéphanie Delaune, Graham Steel |
| 2007 | A Library for Secure Multi-threaded Information Flow in Haskell. Ta-Chung Tsai, Alejandro Russo, John Hughes |
| 2007 | A Type Discipline for Authorization in Distributed Systems. Cédric Fournet, Andy Gordon, Sergio Maffeis |
| 2007 | A flow-sensitive analysis of privacy properties. Hanne Riis Nielson, Flemming Nielson |
| 2007 | Approximated Computationally Bounded Simulation Relations for Probabilistic Automata. Roberto Segala, Andrea Turrini |
| 2007 | Automaton-based Confidentiality Monitoring of Concurrent Programs. Gurvan Le Guernic |
| 2007 | Causality-based Abstraction of Multiplicity in Security Protocols. Michael Backes, Agostino Cortesi, Matteo Maffei |
| 2007 | Collaborative Planning With Privacy. Max I. Kanovich, Paul D. Rowe, Andre Scedrov |
| 2007 | Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. Heiko Mantel, Henning Sudbrock |
| 2007 | Compositional Security for Task-PIOAs. Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira |
| 2007 | Computationally Sound Mechanized Proofs of Correspondence Assertions. Bruno Blanchet |
| 2007 | Creating Vulnerability Signatures Using Weakest Preconditions. David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song |
| 2007 | Design and Semantics of a Decentralized Authorization Language. Moritz Y. Becker, Cédric Fournet, Andrew D. Gordon |
| 2007 | Do As I SaY! Programmatic Access Control with Explicit Identities. Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, James Riely |
| 2007 | Dynamic Dependency Monitoring to Secure Information Flow. Paritosh Shroff, Scott F. Smith, Mark Thober |
| 2007 | Electing the Doge of Venice: Analysis of a 13th Century Protocol. Miranda Mowbray, Dieter Gollmann |
| 2007 | Implementing STV securely in Pret a Voter. James Heather |
| 2007 | Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. Michael Backes, Birgit Pfitzmann, Andre Scedrov |
| 2007 | LTL Model Checking for Security Protocols. Alessandro Armando, Roberto Carbone, Luca Compagna |
| 2007 | Privacy and Utility in Business Processes. Adam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram |
| 2007 | Probability of Error in Information-Hiding Protocols. Konstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden |
| 2007 | Reasoning about Concurrency for Security Tunnels. Alwyn Goodloe, Carl A. Gunter |
| 2007 | Secure Implementations for Typed Session Abstractions. Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer |
| 2007 | Secure information flow and program logics. Lennart Beringer, Martin Hofmann |
| 2007 | Security Analysis of Voice-over-IP Protocols. Prateek Gupta, Vitaly Shmatikov |
| 2007 | The Insecurity Problem: Tackling Unbounded Data. Sibylle B. Fröschle |