Subscribe
Computer Security Foundations Workshop, IEEE (2002)
Cape Breton, Nova Scotia, Canada
June 24, 2002 to June 26, 2002
ISBN: 0-7695-1689-0
TABLE OF CONTENTS
Introduction
pp. vii
Information Flow I
Alessandra Di Pierro , Università di Pisa
Herbert Wiklicky , Imperial College London
pp. 3
Gavin Lowe , Oxford University Computing Laboratory
pp. 18
Joseph Halpern , Cornell University
Kevin O?Neill , Cornell University
pp. 32
Intrusion
S. Jha , University of Wisconsin Madison
O. Sheyner , Carnegie Mellon University
J. Wing , Carnegie Mellon University
pp. 49
Protocols I
Applications of Model-Checking
S. Jha , University of Wisconsin Madison
pp. 129
Protocols II
P. J. Broadfoot , Oxford University Computing Laboratory
A.. W. Roscoe , Oxford University Computing Laboratory
pp. 147
Michael Backes , Saarland University
Birgit Pfitzmann , IBM Zurich Research Laboratory
Michael Steiner , Saarland University
Michael Waidner , IBM Zurich Research Laboratory
pp. 160
Iliano Cervesato , ITT Industries, Inc.
Aaron D. Jaggard , University of Pennsylvania
Frederick Butler , University of Pennsylvania
pp. 175
Games
Jean-Pierre Hubaux , Swiss Federal Institute of Technology — Lausanne
Levente Buttyán , Swiss Federal Institute of Technology, Lausanne
pp. 193
Steve Kremer , Université Libre de Bruxelles
Jean-François Raskin , Université Libre de Bruxelles
pp. 206
Language-Based Security
Dominic Duggan , Stevens Institute of Technology
pp. 238
Anindya Banerjee , Kansas State University
David A. Naumann , Stevens Institute of Technology
pp. 253
Distributed Rights, Access Control, and Watermarking
Information Flow II
Riccardo Focardi , Università Ca éFoscari di Venezia
pp. 307
Author Index