The composability of non-interference [system security] (Abstract)
Composing and decomposing systems under security properties (Abstract)
Algebraic properties of system composition in the LORAL, Ulysses and McLean trace models (Abstract)
Optimal authentication protocols resistant to password guessing attacks (Abstract)
Key distribution without individual trusted authentification servers (Abstract)
Towards a classification of key agreement protocols (Abstract)
Panel moderator: Catherine Meadows (Abstract)
The security checker: a semantics-based tool for the verification of security properties (Abstract)
Implementation of a discretionary access control model for script-based systems (Abstract)
Building higher resolution synthetic clocks for signaling in covert timing channels (Abstract)
Modelling and verifying key-exchange protocols using CSP and FDR (Abstract)
Using temporal logic to specify and verify cryptographic protocols (Abstract)
Concurrency control for federated multilevel secure database systems (Abstract)
Specifying security for CSCW systems (Abstract)
Panel moderator: Jane Sinclair (PDF)
The epistemic representation of information flow security in probabilistic systems (Abstract)
Connection policies and controlled interference (Abstract)
Index of Authors (PDF)