The Community for Technology Leaders
RSS Icon
Subscribe
Proceedings 15th IEEE Computer Security Foundations Workshop CSFW-15 (2002)
Cape Breton, NS, Canada
June 24, 2002 to June 26, 2002
ISBN: 0-7695-1689-0
TABLE OF CONTENTS
Introduction
Preface (PDF)
pp. vii
pp. viii
Information Flow I
Alessandra Di Pierro , Università di Pisa
Chris Hankin , Imperial College London
Herbert Wiklicky , Imperial College London
pp. 3
Gavin Lowe , Oxford University Computing Laboratory
pp. 18
Joseph Halpern , Cornell University
Kevin O?Neill , Cornell University
pp. 32
Intrusion
S. Jha , University of Wisconsin Madison
O. Sheyner , Carnegie Mellon University
J. Wing , Carnegie Mellon University
pp. 49
Jean-Philippe Pouzol , IRISA /INSA de Rennes
Mireille Ducassé , IRISA /INSA de Rennes
pp. 64
Protocols I
Andrew D. Gordon , Microsoft Research
Alan Jeffrey , DePaul University
pp. 77
Joshua D. Guttman , The MITRE Corporation
pp. 92
Applications of Model-Checking
Vitaly Shmatikov , SRI International
pp. 119
S. Jha , University of Wisconsin Madison
T. Reps , University of Wisconsin Madison
pp. 129
Protocols II
P. J. Broadfoot , Oxford University Computing Laboratory
A.. W. Roscoe , Oxford University Computing Laboratory
pp. 147
Michael Backes , Saarland University
Birgit Pfitzmann , IBM Zurich Research Laboratory
Michael Steiner , Saarland University
Michael Waidner , IBM Zurich Research Laboratory
pp. 160
Frederick Butler , University of Pennsylvania
Iliano Cervesato , ITT Industries, Inc.
Aaron D. Jaggard , University of Pennsylvania
Andre Scedrov , University of Pennsylvania
pp. 175
Games
Levente Buttyán , Swiss Federal Institute of Technology, Lausanne
Jean-Pierre Hubaux , Swiss Federal Institute of Technology — Lausanne
Srdjan Capkun , Swiss Federal Institute of Technology, Lausanne
pp. 193
Steve Kremer , Université Libre de Bruxelles
Jean-François Raskin , Université Libre de Bruxelles
pp. 206
Language-Based Security
Cryptographic Types (Abstract)
Dominic Duggan , Stevens Institute of Technology
pp. 238
Anindya Banerjee , Kansas State University
David A. Naumann , Stevens Institute of Technology
pp. 253
Distributed Rights, Access Control, and Watermarking
Günter Karjoth , IBM Research
Matthias Schunter , IBM Research
pp. 271
Riccardo Pucella , Cornell University
Vicky Weissman , Cornell University
pp. 282
Information Flow II
Riccardo Focardi , Università Ca éFoscari di Venezia
Sabina Rossi , Università Ca éFoscari di Venezia
pp. 307
Author Index
Author Index (PDF)
pp. 331
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool