| 2008 | A Correctness Proof of a Mesh Security Architecture. Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh V. Tripunitara |
| 2008 | A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett |
| 2008 | A Type System for Observational Determinism. Tachio Terauchi |
| 2008 | Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis. Glenn Bruns, Michael Huth |
| 2008 | An Authorization Logic With Explicit Time. Henry DeYoung, Deepak Garg, Frank Pfenning |
| 2008 | Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. Michael Backes, Catalin Hritcu, Matteo Maffei |
| 2008 | Composition of Password-Based Protocols. Stéphanie Delaune, Steve Kremer, Mark Ryan |
| 2008 | Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. Michael Backes, Dominique Unruh |
| 2008 | Cryptographically-Sound Protocol-Model Abstractions. Christoph Sprenger, David A. Basin |
| 2008 | DKAL: Distributed-Knowledge Authorization Language. Yuri Gurevich, Itay Neeman |
| 2008 | End-to-End Enforcement of Erasure and Declassification. Stephen Chong, Andrew C. Myers |
| 2008 | Evidence-Based Audit. Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve Zdancewic |
| 2008 | Formal Analysis of PKCS#11. Stéphanie Delaune, Steve Kremer, Graham Steel |
| 2008 | Hyperproperties. Michael R. Clarkson, Fred B. Schneider |
| 2008 | Information Flow in Systems with Schedulers. Ron van der Meyden, Chenyi Zhang |
| 2008 | Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation. Ralf Küsters, Max Tuengerthal |
| 2008 | Language Based Secure Communication. Michele Bugliesi, Riccardo Focardi |
| 2008 | Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008 |
| 2008 | Refinement Types for Secure Implementations. Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Sergio Maffeis |
| 2008 | Security Decision-Making among Interdependent Organizations. Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell, Nicholas Bambos |
| 2008 | Specifying Secure Transport Channels. Christopher Dilloway, Gavin Lowe |
| 2008 | Towards Producing Formally Checkable Security Proofs, Automatically. Jean Goubault-Larrecq |
| 2008 | Tractable Enforcement of Declassification Policies. Gilles Barthe, Salvador Cavadini, Tamara Rezk |