The Community for Technology Leaders
RSS Icon
Subscribe
Computer Security Foundations Workshop, IEEE (2003)
Pacific Grove, California
June 30, 2003 to July 2, 2003
ISBN: 0-7695-1927-X
TABLE OF CONTENTS
Introduction
Preface (PDF)
pp. vii
pp. viii
Information Flow
Annalisa Bossi , Università Caé Foscari di Venezia
Damiano Macedonio , Università Caé Foscari di Venezia
Carla Piazza , Università Caé Foscari di Venezia
Sabina Rossi , Università Caé Foscari di Venezia
pp. 14
Steve Zdancewic , University of Pennsylvania
Andrew C. Myers , Cornell University
pp. 29
Protocols I
Logics for Anonymity and Distributed System Security
Ninghui Li , Stanford University
pp. 89
Panel 1
Protocols II
Anupam Datta , Stanford University
Ante Derek , Stanford University
John C. Mitchell , Stanford University
Dusko Pavlovic , Kestrel Institute
pp. 109
M. Buchholtz , Technical University of Denmark
P. Degano , Università di Pisa
F. Nielson , Technical University of Denmark
C. Bodei , Università di Pisa
pp. 126
Access Control & Information Flow
Anindya Banerjee , Kansas State University
David A. Naumann , Stevens Institute of Technology
pp. 155
Dominic Duggan , Stevens Institute of Technology
Tom Chothia , Stevens Institute of Technology
pp. 170
Authorization and Security Policies
S. Jha , University of Wisconsin
T. Reps , University of Wisconsin
S. Stubblebine , Stubblebine Research Labs
pp. 202
Computational Analysis of Security Protocols
Liqun Chen , Hewlett-Packard Laboratories
Caroline Kudla , University of London
pp. 219
Bogdan Warinschi , University of California at San Diego
pp. 248
Panel 2
Author Index
Author Index (PDF)
pp. 265
66 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool