CSF A

23 papers

YearTitle / Authors
2008A Correctness Proof of a Mesh Security Architecture.
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh V. Tripunitara
2008A Trust Management Approach for Flexible Policy Management in Security-Typed Languages.
Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett
2008A Type System for Observational Determinism.
Tachio Terauchi
2008Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis.
Glenn Bruns, Michael Huth
2008An Authorization Logic With Explicit Time.
Henry DeYoung, Deepak Garg, Frank Pfenning
2008Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus.
Michael Backes, Catalin Hritcu, Matteo Maffei
2008Composition of Password-Based Protocols.
Stéphanie Delaune, Steve Kremer, Mark Ryan
2008Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers.
Michael Backes, Dominique Unruh
2008Cryptographically-Sound Protocol-Model Abstractions.
Christoph Sprenger, David A. Basin
2008DKAL: Distributed-Knowledge Authorization Language.
Yuri Gurevich, Itay Neeman
2008End-to-End Enforcement of Erasure and Declassification.
Stephen Chong, Andrew C. Myers
2008Evidence-Based Audit.
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve Zdancewic
2008Formal Analysis of PKCS#11.
Stéphanie Delaune, Steve Kremer, Graham Steel
2008Hyperproperties.
Michael R. Clarkson, Fred B. Schneider
2008Information Flow in Systems with Schedulers.
Ron van der Meyden, Chenyi Zhang
2008Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation.
Ralf Küsters, Max Tuengerthal
2008Language Based Secure Communication.
Michele Bugliesi, Riccardo Focardi
2008Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008
2008Refinement Types for Secure Implementations.
Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Sergio Maffeis
2008Security Decision-Making among Interdependent Organizations.
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell, Nicholas Bambos
2008Specifying Secure Transport Channels.
Christopher Dilloway, Gavin Lowe
2008Towards Producing Formally Checkable Security Proofs, Automatically.
Jean Goubault-Larrecq
2008Tractable Enforcement of Declassification Policies.
Gilles Barthe, Salvador Cavadini, Tamara Rezk