CSF A

27 papers

YearTitle / Authors
200720th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy
2007A Formal Theory of Key Conjuring.
Véronique Cortier, Stéphanie Delaune, Graham Steel
2007A Library for Secure Multi-threaded Information Flow in Haskell.
Ta-Chung Tsai, Alejandro Russo, John Hughes
2007A Type Discipline for Authorization in Distributed Systems.
Cédric Fournet, Andy Gordon, Sergio Maffeis
2007A flow-sensitive analysis of privacy properties.
Hanne Riis Nielson, Flemming Nielson
2007Approximated Computationally Bounded Simulation Relations for Probabilistic Automata.
Roberto Segala, Andrea Turrini
2007Automaton-based Confidentiality Monitoring of Concurrent Programs.
Gurvan Le Guernic
2007Causality-based Abstraction of Multiplicity in Security Protocols.
Michael Backes, Agostino Cortesi, Matteo Maffei
2007Collaborative Planning With Privacy.
Max I. Kanovich, Paul D. Rowe, Andre Scedrov
2007Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework.
Heiko Mantel, Henning Sudbrock
2007Compositional Security for Task-PIOAs.
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira
2007Computationally Sound Mechanized Proofs of Correspondence Assertions.
Bruno Blanchet
2007Creating Vulnerability Signatures Using Weakest Preconditions.
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song
2007Design and Semantics of a Decentralized Authorization Language.
Moritz Y. Becker, Cédric Fournet, Andrew D. Gordon
2007Do As I SaY! Programmatic Access Control with Explicit Identities.
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, James Riely
2007Dynamic Dependency Monitoring to Secure Information Flow.
Paritosh Shroff, Scott F. Smith, Mark Thober
2007Electing the Doge of Venice: Analysis of a 13th Century Protocol.
Miranda Mowbray, Dieter Gollmann
2007Implementing STV securely in Pret a Voter.
James Heather
2007Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
Michael Backes, Birgit Pfitzmann, Andre Scedrov
2007LTL Model Checking for Security Protocols.
Alessandro Armando, Roberto Carbone, Luca Compagna
2007Privacy and Utility in Business Processes.
Adam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram
2007Probability of Error in Information-Hiding Protocols.
Konstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden
2007Reasoning about Concurrency for Security Tunnels.
Alwyn Goodloe, Carl A. Gunter
2007Secure Implementations for Typed Session Abstractions.
Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer
2007Secure information flow and program logics.
Lennart Beringer, Martin Hofmann
2007Security Analysis of Voice-over-IP Protocols.
Prateek Gupta, Vitaly Shmatikov
2007The Insecurity Problem: Tackling Unbounded Data.
Sibylle B. Fröschle