|
Conferences in DBLP
- Sylvan Pinsky, Edward Zieglar
Noninterference Equations for Nondeterministic Systems. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:3-4 [Conf]
- Steve Zdancewic, Andrew C. Myers
Robust Declassification. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:15- [Conf]
- Ajay Chander, John C. Mitchell, Drew Dean
A State-Transition Model of Trust Management and Access Control. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:27-43 [Conf]
- Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera
Revocations-A Classification. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:44-58 [Conf]
- Joseph Y. Halpern, Ron van der Meyden
A Logical Reconstruction of SPKI. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:59-0 [Conf]
- Olivier Pereira, Jean-Jacques Quisquater
A Security Analysis of the Cliques Protocols Suites. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:73-81 [Conf]
- Bruno Blanchet
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:82-96 [Conf]
- Véronique Cortier, Jonathan K. Millen, Harald Rueß
Proving Secrecy is Easy Enough. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:97-0 [Conf]
- Andre Scedrov, Ran Canetti, Joshua D. Guttman, David Wagner, Michael Waidner
Relating Cryptography and Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:111-114 [Conf]
- Geoffrey Smith
A New Type System for Secure Information Flow. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:115-125 [Conf]
- Heiko Mantel, Andrei Sabelfeld
A Generic Approach to the Security of Multi-Threaded Programs. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:126-0 [Conf]
- Andrew D. Gordon, Alan Jeffrey
Authenticity by Typing for Security Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:145-159 [Conf]
- Marcelo P. Fiore, Martín Abadi
Computing Symbolic Models for Verifying Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:160-173 [Conf]
- Michaël Rusinowitch, Mathieu Turuani
Protocol Insecurity with Finite Number of Sessions is NP-Complete. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:174-0 [Conf]
- Peng Liu, Sushil Jajodia
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:191-205 [Conf]
- Somesh Jha, Kymie M. C. Tan, Roy A. Maxion
Markov Chains, Classifiers, and Intrusion Detection. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:206-219 [Conf]
- Muriel Roger, Jean Goubault-Larrecq
Log Auditing through Model-Checking. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:220-0 [Conf]
- Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor
Non-Interference: Who Needs It? [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:237-0 [Conf]
- Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic
A Compositional Logic for Protocol Correctness. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:241-0 [Conf]
- Wenliang Du, Mikhail J. Atallah
Privacy-Preserving Cooperative Scientific Computations. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:273-294 [Conf]
- Maritta Heisel, Andreas Pfitzmann, Thomas Santen
Confidentiality-Preserving Refinement. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:295-306 [Conf]
|