• C
  • CSFW
  • 2006
  • 19th IEEE Computer Security Foundations Workshop (CSFW'06)
Advanced Search 
19th IEEE Computer Security Foundations Workshop (CSFW'06)
Venice, Italy
July 05-July 07
ISBN: 0-7695-2615-2
Table of Contents
Introduction
Preface (PDF)
pp. viii
Session 1: Information Flow
Marieke Huisman, INRIA Sophia Antipolis, France
Pratik Worah, IIT Kharagpur, India
Kim Sunesen, Esterel Technologies, France
pp. 3
Peng Li, University of Pennsylvania, USA
Steve Zdancewic, University of Pennsylvania, USA
pp. 16
Stephanie Delaune, LSV, France Telecom R&D, France
Steve Kremer, LSV, INRIA, France
Mark Ryan, University of Birmingham, UK
pp. 28-42
Session 2: Games, Plans, and Transformations
Shai Rubin, University of Wisconsin, Madison, USA
Somesh Jha, University of Wisconsin, Madison, USA
Barton P. Miller, University of Wisconsin, Madison, USA
pp. 43-56
Massimo Bartoletti, Universita di Pisa, Italy
Pierpaolo Degano, Universita di Pisa, Italy
Gian Luigi Ferrari, Universita di Pisa, Italy
pp. 57-69
Games for Controls (Abstract)
Krishnendu Chatterjee, UC Berkeley, USA
Radha Jagadeesan, DePaul University, USA
Corin Pitcher, DePaul University, USA
pp. 70-84
Session 3: Access Control
Michael J. May, University of Pennsylvania, USA
Carl A. Gunter, University of Illinois Urbana-Champaign, USA
Insup Lee, University of Pennsylvania, USA
pp. 85-97
Jason Crampton, University of London, UK
Keith Martin, University of London, UK
Peter Wild, University of London, UK
pp. 98-111
Avik Chaudhuri, University of California, Santa Cruz, USA
Martin Abadi, University of California, Santa Cruz, USA
pp. 112-123
Amit Sasturkar, Stony Brook University, USA
Ping Yang, Stony Brook University, USA
Scott D. Stoller, Stony Brook University, USA
C.R. Ramakrishnan, Stony Brook University, USA
pp. 124-138
Session 4: Security Protocol Analysis
Karthikeyan Bhargavan, Microsoft Research, USA
Cedric Fournet, Microsoft Research, USA
Andrew D. Gordon, Microsoft Research, USA
Stephen Tse, University of Pennsylvania, USA
pp. 139-152
Christoph Sprenger, ETH Zurich, Switzerland
Michael Backes, Saarland University, Germany
David Basin, ETH Zurich, Switzerland
Birgit Pfitzmann, IBM Zurich Research Laboratory, Switzerland
Michael Waidner, IBM Zurich Research Laboratory, Switzerland
pp. 153-166
Aybek Mukhamedov, The University of Birmingham, UK
Mark D. Ryan, The University of Birmingham, UK
pp. 167-176
Session 5: Language, Interaction, and Change
Alejandro Russo, Chalmers University of Technology, Sweden
Andrei Sabelfeld, Chalmers University of Technology, Sweden
pp. 177-189
Kevin R. O?Neill, Cornell University, USA
Michael R. Clarkson, Cornell University, USA
Stephen Chong, Cornell University, USA
pp. 190-201
Nikhil Swamy, University of Maryland, USA
Michael Hicks, University of Maryland, USA
Stephen Tse, University of Pennsylvania, USA
Steve Zdancewic, University of Pennsylvania, USA
pp. 202-216
Session 6: Language, Obfuscation, and Robustness
Daniel Hedin, Chalmers University of Technology, Sweden
David Sands, Chalmers University of Technology, Sweden
pp. 217-229
Stephen Chong, Cornell University, USA
Andrew C. Myers, Cornell University, USA
pp. 242-256
Session 7: Authorization and Trust
Hongbin Zhou, University College Cork, Ireland
Simon N. Foley, University College Cork, Ireland
pp. 270-282
Deepak Garg, Carnegie Mellon University, USA
Frank Pfenn, Carnegie Mellon University, USA
pp. 283-296
Session 8: Protocols and Cryptographic Foundations
Anupam Datta, Stanford University, USA
Ante Derek, Stanford University, USA
John C. Mitchell, Stanford University, USA
Bogdan Warinschi, Loria, INRIA-Lorraine, France
pp. 321-334
Author Index
Usage of this product signifies your acceptance of the Terms of Use.