• C
  • CSFW
  • 2002
  • 15th IEEE Computer Security Foundations Workshop (CSFW'02)
Advanced Search 
15th IEEE Computer Security Foundations Workshop (CSFW'02)
Cape Breton, Nova Scotia, Canada
June 24-June 26
ISBN: 0-7695-1689-0
Table of Contents
Introduction
Information Flow I
Alessandra Di Pierro, Università di Pisa
Chris Hankin, Imperial College London
Herbert Wiklicky, Imperial College London
pp. 3
Gavin Lowe, Oxford University Computing Laboratory
pp. 18
Intrusion
S. Jha, University of Wisconsin Madison
O. Sheyner, Carnegie Mellon University
J. Wing, Carnegie Mellon University
pp. 49
Protocols I
Applications of Model-Checking
S. Jha, University of Wisconsin Madison
T. Reps, University of Wisconsin Madison
pp. 129
Protocols II
P. J. Broadfoot, Oxford University Computing Laboratory
A.. W. Roscoe, Oxford University Computing Laboratory
pp. 147
Michael Backes, Saarland University
Birgit Pfitzmann, IBM Zurich Research Laboratory
Michael Steiner, Saarland University
Michael Waidner, IBM Zurich Research Laboratory
pp. 160
Frederick Butler, University of Pennsylvania
Iliano Cervesato, ITT Industries, Inc.
Aaron D. Jaggard, University of Pennsylvania
Andre Scedrov, University of Pennsylvania
pp. 175
Games
Levente Buttyán, Swiss Federal Institute of Technology, Lausanne
Jean-Pierre Hubaux, Swiss Federal Institute of Technology — Lausanne
Srdjan Capkun, Swiss Federal Institute of Technology, Lausanne
pp. 193
Steve Kremer, Université Libre de Bruxelles
Jean-François Raskin, Université Libre de Bruxelles
pp. 206
Language-Based Security
Distributed Rights, Access Control, and Watermarking
Information Flow II
Riccardo Focardi, Università Ca éFoscari di Venezia
Sabina Rossi, Università Ca éFoscari di Venezia
pp. 307
Author Index
Usage of this product signifies your acceptance of the Terms of Use.