The Community for Technology Leaders
RSS Icon
Subscribe
Computer Security Foundations Workshop, IEEE (2006)
Venice, Italy
July 5, 2006 to July 7, 2006
ISBN: 0-7695-2615-2
TABLE OF CONTENTS
Introduction
Preface (PDF)
pp. viii
Session 1: Information Flow
Marieke Huisman , INRIA Sophia Antipolis, France
Pratik Worah , IIT Kharagpur, India
Kim Sunesen , Esterel Technologies, France
pp. 3
Peng Li , University of Pennsylvania, USA
Steve Zdancewic , University of Pennsylvania, USA
pp. 16
Stephanie Delaune , LSV, France Telecom R&D, France
Steve Kremer , LSV, INRIA, France
Mark Ryan , University of Birmingham, UK
pp. 28-42
Session 2: Games, Plans, and Transformations
Shai Rubin , University of Wisconsin, Madison, USA
Somesh Jha , University of Wisconsin, Madison, USA
Barton P. Miller , University of Wisconsin, Madison, USA
pp. 43-56
Massimo Bartoletti , Universita di Pisa, Italy
Pierpaolo Degano , Universita di Pisa, Italy
Gian Luigi Ferrari , Universita di Pisa, Italy
pp. 57-69
Games for Controls (Abstract)
Krishnendu Chatterjee , UC Berkeley, USA
Radha Jagadeesan , DePaul University, USA
Corin Pitcher , DePaul University, USA
pp. 70-84
Session 3: Access Control
Michael J. May , University of Pennsylvania, USA
Carl A. Gunter , University of Illinois Urbana-Champaign, USA
Insup Lee , University of Pennsylvania, USA
pp. 85-97
Jason Crampton , University of London, UK
Keith Martin , University of London, UK
Peter Wild , University of London, UK
pp. 98-111
Avik Chaudhuri , University of California, Santa Cruz, USA
Martin Abadi , University of California, Santa Cruz, USA
pp. 112-123
Amit Sasturkar , Stony Brook University, USA
Ping Yang , Stony Brook University, USA
Scott D. Stoller , Stony Brook University, USA
C.R. Ramakrishnan , Stony Brook University, USA
pp. 124-138
Session 4: Security Protocol Analysis
Karthikeyan Bhargavan , Microsoft Research, USA
Cedric Fournet , Microsoft Research, USA
Andrew D. Gordon , Microsoft Research, USA
Stephen Tse , University of Pennsylvania, USA
pp. 139-152
Christoph Sprenger , ETH Zurich, Switzerland
Michael Backes , Saarland University, Germany
David Basin , ETH Zurich, Switzerland
Birgit Pfitzmann , IBM Zurich Research Laboratory, Switzerland
Michael Waidner , IBM Zurich Research Laboratory, Switzerland
pp. 153-166
Aybek Mukhamedov , The University of Birmingham, UK
Mark D. Ryan , The University of Birmingham, UK
pp. 167-176
Session 5: Language, Interaction, and Change
Alejandro Russo , Chalmers University of Technology, Sweden
Andrei Sabelfeld , Chalmers University of Technology, Sweden
pp. 177-189
Kevin R. O?Neill , Cornell University, USA
Michael R. Clarkson , Cornell University, USA
Stephen Chong , Cornell University, USA
pp. 190-201
Nikhil Swamy , University of Maryland, USA
Michael Hicks , University of Maryland, USA
Stephen Tse , University of Pennsylvania, USA
Steve Zdancewic , University of Pennsylvania, USA
pp. 202-216
Session 6: Language, Obfuscation, and Robustness
Daniel Hedin , Chalmers University of Technology, Sweden
David Sands , Chalmers University of Technology, Sweden
pp. 217-229
Riccardo Pucella , Northeastern University, USA
Fred B. Schneider , Cornell University, USA
pp. 230-241
Stephen Chong , Cornell University, USA
Andrew C. Myers , Cornell University, USA
pp. 242-256
Session 7: Authorization and Trust
Antonio Lain , HP Laboratories Bristol, UK
Miranda Mowbray , HP Laboratories Bristol, UK
pp. 257-269
Hongbin Zhou , University College Cork, Ireland
Simon N. Foley , University College Cork, Ireland
pp. 270-282
Deepak Garg , Carnegie Mellon University, USA
Frank Pfenn , Carnegie Mellon University, USA
pp. 283-296
Session 8: Protocols and Cryptographic Foundations
Ralf Kusters , Christian-Albrechts-Universitat zu Kiel, Germany
pp. 309-320
Anupam Datta , Stanford University, USA
Ante Derek , Stanford University, USA
John C. Mitchell , Stanford University, USA
Bogdan Warinschi , Loria, INRIA-Lorraine, France
pp. 321-334
Author Index
Author Index (PDF)
pp. 335
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool