The Community for Technology Leaders
RSS Icon
Subscribe
Computer Security Foundations Workshop, IEEE (1996)
Dromquinna Manor, Kenmare, County Kerry, Ireland
Mar. 10, 1996 to Mar. 12, 1996
ISBN: 0-8186-7522-5
TABLE OF CONTENTS
Preface (PDF)
pp. viii
Session 1: Protocols
Colin Boyd , Queensland University of Technology Brisbane Q4001, Australia
pp. 2
Dalia Malki , AT&T Laboratories
Michael Reiter , AT&T Laboratories
pp. 9
Patrik D'haeseleer , University of New Mexico patrik@cs.unm.edu
pp. 18
Session 2: Protocol Specification
A.W. Roscoe , Comput. Lab., Oxford Univ., UK
pp. 28
J.K. Millen , Mitre Corp., Bedford, MA, USA
Hai-Ping Ko , Mitre Corp., Bedford, MA, USA
pp. 39
Session 3: Protocol Analysis Tools
C. Meadows , Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
pp. 48
S.H. Brackin , Arca Syst. Inc., Hanscom AFB, MA, USA
pp. 62
Panel 1: E-Commerce Challenge
Stefek Zaba , Hewlett-Packard Labs sjmz@hplb.hpl.hp.com
pp. 78
Session 4: Composition
Ramesh V. Peri , University of Virginia
William A. Wulf , University of Virginia
Darrell M. Kienzle , University of Virginia
pp. 82
A. Zakinthinos , Comput. Syst. Res. Inst., Toronto Univ., Ont., Canada
E.S. Lee , Comput. Syst. Res. Inst., Toronto Univ., Ont., Canada
pp. 95
Jane Sinclair , Open University Milton Keynes, MK7 6AA, UK
pp. 102
Session 5: Security Policies
Riccardo Focardi , Dipartimento di Scienze dell'Informazione Universita' di Bologna focardi@cs.unibo.it
pp. 116
F. Cuppens , ONERA-CERT, Toulouse, France
C. Saurel , ONERA-CERT, Toulouse, France
pp. 123
Session 6: Access Control
Luigi Giuri , Fondazione Ugo Bordoni v. B. Castiglione, 59 - 00142 Rome - Italy
Pietro Iglio , Fondazione Ugo Bordoni v. B. Castiglione, 59 - 00142 Rome - Italy
pp. 136
Panel 2: A Genealogy of Non-Interference
Session 7: Attacks
G. Lowe , Comput. Lab., Oxford Univ., UK
pp. 162
Y. Desmedt , Dept. of Electr. Eng. & Comput. Sci., Wisconsin Univ., Milwaukee, WI, USA
pp. 170
J. McDermott , Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
D. Goldschlag , Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
pp. 176
Panel 3: What is an Attack on a Cryptographic Protocol?
pp. 189
42 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool