The Community for Technology Leaders
Computer Security Foundations Workshop, IEEE (2000)
Cambridge, England
July 3, 2000 to July 5, 2000
ISSN: 1063-6900
ISBN: 0-7695-0671-2

Preface (PDF)

pp. vii

Program Committee (PDF)

pp. viii

Cover Photo (PDF)

pp. ix
Names and Certificates

Local Names in SPKI/SDSI (Abstract)

Ninghui Li , New York University
pp. 2
Strands and Multiset Rewriting

Protocol Independence through Disjoint Encryption (Abstract)

Joshua D. Guttman , The MITRE Corporation
F. Javier Thayer , The MITRE Corporation
pp. 24

Relating Strands and Multiset Rewriting for Security Protocol Analysis (Abstract)

Nancy Durgin , Stanford University
Patrick Lincoln , Stanford University
John Mitchell , Stanford University
Andre Scedrov , Stanford University
Iliano Cervesato , Stanford University
pp. 35
Automated Security Protocol Methods

C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis (Abstract)

Anthony H. Dekker , Defense Science and Technology Organization and Australian National University
pp. 77

Panel: Foundations for Intrusion Detection? (Abstract)

Teresa F. Lunt , Xerox Palo Alto Research Center
pp. 104
Network Security

Reasoning About Secrecy for Active Networks (Abstract)

Pankaj Kakkar , University of Pennsylvania
Carl A. Gunter , University of Pennsylvania
MartÍn Abadi , Lucent Technologies
pp. 118
Invariants, Induction, Ranks, Languages, and Ideals
Noninterference and Information Flow

Information Flow Analysis in a Discrete-Time Process Algebra (Abstract)

Riccardo Focardi , Universit? C? Foscari di Venezia
Roberto Gorrieri , Universit? di Bologna
pp. 170

Possibilistic Definitions of Security - An Assembly Kit (Abstract)

Heiko Mantel , German Research Center for Artificial Intelligence
pp. 185

Probabilistic Noninterference for Multi-Threaded Programs (Abstract)

Andrei Sabelfeld , Chalmers University of Technology and the University of Gothenburg
David Sands , Chalmers University of Technology and the University of Gothenburg
pp. 200
Invited Talk
Java and Mobile Code Security

An Operational Semantics of Java 2 Access Control (Abstract)

Guenter Karjoth , IBM Zurich Research Laboratory
pp. 224
Types and Language-Based Security

Secure Introduction of One-Way Functions (Abstract)

Dennis Volpano , Naval Postgraduate School
pp. 246

How to Prevent Type Flaw Attacks on Security Protocols (Abstract)

James Heather , University of Leicester
Gavin Lowe , University of Leicester
Steve Schneider , University of Leicester
pp. 255

Secure Composition of Untrusted Code: Wrappers and Causality Types (Abstract)

Peter Sewell , University of Cambridge
Jan Vitek , Purdue University
pp. 269

Author Index (PDF)

pp. 285
85 ms
(Ver 3.3 (11022016))