CSF A

36 papers

YearTitle / Authors
2015A Complete Characterization of Secure Human-Server Communication.
David A. Basin, Sasa Radomirovic, Michael Schläpfer
2015A Cut Principle for Information Flow.
Joshua D. Guttman, Paul D. Rowe
2015A Definitional Framework for Functional Encryption.
Christian Matt, Ueli Maurer
2015A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications.
Michela Chessa, Jens Grossklags, Patrick Loiseau
2015A Hybrid Approach for Proving Noninterference of Java Programs.
Ralf Küsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr
2015A Logic of Programs with Interface-Confined Code.
Limin Jia, Shayak Sen, Deepak Garg, Anupam Datta
2015A Mechanized Proof of Security for Searchable Symmetric Encryption.
Adam Petcher, Greg Morrisett
2015A Methodology for Information Flow Experiments.
Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing
2015A Parametric Family of Attack Models for Proxy Re-encryption.
David Nuñez, Isaac Agudo, Javier López
2015An Analysis of Universal Information Flow Based on Self-Composition.
Christian Müller, Máté Kovács, Helmut Seidl
2015Analyzing First-Order Role Based Access Control.
Carlos Cotrini Jiménez, Thilo Weghorn, David A. Basin, Manuel Clavel
2015Android Permissions Unleashed.
Alessandro Armando, Roberto Carbone, Gabriele Costa, Alessio Merlo
2015Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active Adversaries.
Martin Pettai, Peeter Laud
2015BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations.
Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici
2015Compositional Typed Analysis of ARBAC Policies.
Stefano Calzavara, Alvise Rabitti, Michele Bugliesi
2015Cryptographic Enforcement of Language-Based Information Erasure.
Aslan Askarov, Scott Moore, Christos Dimoulas, Stephen Chong
2015Decidability of Trace Equivalence for Protocols with Nonces.
Rémy Chrétien, Véronique Cortier, Stéphanie Delaune
2015Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations.
William C. Garrison III, Adam J. Lee
2015Du-Vote: Remote Electronic Voting with Untrusted Computers.
Gurchetan S. Grewal, Mark Dermot Ryan, Liqun Chen, Michael R. Clarkson
2015Flow-Limited Authorization.
Owen Arden, Jed Liu, Andrew C. Myers
2015Hybrid Monitors for Concurrent Noninterference.
Aslan Askarov, Stephen Chong, Heiko Mantel
2015IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015
Cédric Fournet, Michael W. Hicks, Luca Viganò
2015Information Flow Control for Event Handling and the DOM in Web Browsers.
Vineet Rajani, Abhishek Bichhawat, Deepak Garg, Christian Hammer
2015Location Privacy via Differential Private Perturbation of Cloaking Area.
Hoa Ngo, Jong Kim
2015On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining.
Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor
2015Picking vs. Guessing Secrets: A Game-Theoretic Analysis.
M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa
2015Policy Privacy in Cryptographic Access Control.
Anna Lisa Ferrara, Georg Fuchsbauer, Bin Liu, Bogdan Warinschi
2015Probabilistic Program Modeling for High-Precision Anomaly Classification.
Kui Xu, Danfeng (Daphne) Yao, Barbara G. Ryder, Ke Tian
2015Program Actions as Actual Causes: A Building Block for Accountability.
Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha
2015Rational Protection against Timing Attacks.
Goran Doychev, Boris Köpf
2015Reasoning about Policy Behavior in Logic-Based Trust Management Systems: Some Complexity Results and an Operational Framework.
Edelmira Pasarella, Jorge Lobo
2015Set-Pi: Set Membership p-Calculus.
Alessandro Bruni, Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson
2015Symbolic Malleable Zero-Knowledge Proofs.
Michael Backes, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi, Kim Pecina
2015The Anatomy and Facets of Dynamic Policies.
Niklas Broberg, Bart van Delft, David Sands
2015Understanding and Enforcing Opacity.
Daniel Schoepe, Andrei Sabelfeld
2015Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language.
Daniel Hedin, Luciano Bello, Andrei Sabelfeld