The Community for Technology Leaders
Computer Security Foundations Workshop, IEEE (1996)
Dromquinna Manor, Kenmare, County Kerry, Ireland
Mar. 10, 1996 to Mar. 12, 1996
ISSN: 1063-6900
ISBN: 0-8186-7522-5
TABLE OF CONTENTS

Preface (PDF)

pp. viii
Session 1: Protocols

A Class of Flexible and Efficient Key Management Protocols (Abstract)

Colin Boyd , Queensland University of Technology Brisbane Q4001, Australia
pp. 2

A High-Throughput Secure Reliable Multicast Protocol (Abstract)

Michael Reiter , AT&T Laboratories
Dalia Malki , AT&T Laboratories
pp. 9

An Immunological Approach to Change Detection: Theoretical Results (Abstract)

Patrik D'haeseleer , University of New Mexico patrik@cs.unm.edu
pp. 18
Session 2: Protocol Specification

Intensional specifications of security protocols (Abstract)

A.W. Roscoe , Comput. Lab., Oxford Univ., UK
pp. 28

Narrowing terminates for encryption (Abstract)

J.K. Millen , Mitre Corp., Bedford, MA, USA
Hai-Ping Ko , Mitre Corp., Bedford, MA, USA
pp. 39
Session 3: Protocol Analysis Tools

Language generation and verification in the NRL protocol analyzer (Abstract)

C. Meadows , Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
pp. 48
Panel 1: E-Commerce Challenge

E-Commerce Payment Protocols: Requirements and Analysis (Abstract)

Stefek Zaba , Hewlett-Packard Labs sjmz@hplb.hpl.hp.com
pp. 78
Session 4: Composition

A Logic of Composition for Information Flow Predicates (Abstract)

Ramesh V. Peri , University of Virginia
William A. Wulf , University of Virginia
Darrell M. Kienzle , University of Virginia
pp. 82

How and why feedback composition fails [secure systems] (Abstract)

A. Zakinthinos , Comput. Syst. Res. Inst., Toronto Univ., Ont., Canada
E.S. Lee , Comput. Syst. Res. Inst., Toronto Univ., Ont., Canada
pp. 95

Action Systems for Security Specification (Abstract)

Jane Sinclair , Open University Milton Keynes, MK7 6AA, UK
pp. 102
Session 5: Security Policies

Comparing Two Information Flow Security Properties (Abstract)

Riccardo Focardi , Dipartimento di Scienze dell'Informazione Universita' di Bologna focardi@cs.unibo.it
pp. 116

Specifying a security policy: a case study (Abstract)

F. Cuppens , ONERA-CERT, Toulouse, France
C. Saurel , ONERA-CERT, Toulouse, France
pp. 123
Session 6: Access Control

A Formal Model for Role-Based Access Control with Constraints (Abstract)

Pietro Iglio , Fondazione Ugo Bordoni v. B. Castiglione, 59 - 00142 Rome - Italy
Luigi Giuri , Fondazione Ugo Bordoni v. B. Castiglione, 59 - 00142 Rome - Italy
pp. 136
Panel 2: A Genealogy of Non-Interference
Session 7: Attacks

Some new attacks upon security protocols (Abstract)

G. Lowe , Comput. Lab., Oxford Univ., UK
pp. 162

Simmons' protocol is not free of subliminal channels (Abstract)

Y. Desmedt , Dept. of Electr. Eng. & Comput. Sci., Wisconsin Univ., Milwaukee, WI, USA
pp. 170

Towards a model of storage jamming (Abstract)

J. McDermott , Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
D. Goldschlag , Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
pp. 176
Panel 3: What is an Attack on a Cryptographic Protocol?

Index of Authors (PDF)

pp. 189
99 ms
(Ver )