• C
  • CSFW
  • 1996
  • Ninth IEEE Computer Security Foundations Workshop
Advanced Search 
Ninth IEEE Computer Security Foundations Workshop
Dromquinna Manor, Kenmare, County Kerry, Ireland
March 10-March 12
ISBN: 0-8186-7522-5
Table of Contents
Preface (PDF)
pp. viii
Session 1: Protocols
Colin Boyd, Queensland University of Technology Brisbane Q4001, Australia
pp. 2
Session 2: Protocol Specification
J.K. Millen, Mitre Corp., Bedford, MA, USA
Hai-Ping Ko, Mitre Corp., Bedford, MA, USA
pp. 39
Session 3: Protocol Analysis Tools
C. Meadows, Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
pp. 48
Panel 1: E-Commerce Challenge
Session 4: Composition
A. Zakinthinos, Comput. Syst. Res. Inst., Toronto Univ., Ont., Canada
E.S. Lee, Comput. Syst. Res. Inst., Toronto Univ., Ont., Canada
pp. 95
Session 5: Security Policies
Riccardo Focardi, Dipartimento di Scienze dell'Informazione Universita' di Bologna focardi@cs.unibo.it
pp. 116
F. Cuppens, ONERA-CERT, Toulouse, France
C. Saurel, ONERA-CERT, Toulouse, France
pp. 123
Session 6: Access Control
Luigi Giuri, Fondazione Ugo Bordoni v. B. Castiglione, 59 - 00142 Rome - Italy
Pietro Iglio, Fondazione Ugo Bordoni v. B. Castiglione, 59 - 00142 Rome - Italy
pp. 136
Panel 2: A Genealogy of Non-Interference
Session 7: Attacks
Y. Desmedt, Dept. of Electr. Eng. & Comput. Sci., Wisconsin Univ., Milwaukee, WI, USA
pp. 170
J. McDermott, Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
D. Goldschlag, Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
pp. 176
Panel 3: What is an Attack on a Cryptographic Protocol?
Usage of this product signifies your acceptance of the Terms of Use.