The Community for Technology Leaders
Computer Security Foundations Workshop, IEEE (2000)
Cambridge, England
July 3, 2000 to July 5, 2000
ISSN: 1063-6900
ISBN: 0-7695-0671-2
TABLE OF CONTENTS

Preface (PDF)

pp. vii

Program Committee (PDF)

pp. viii

Cover Photo (PDF)

pp. ix
Names and Certificates

Local Names in SPKI/SDSI (Abstract)

Ninghui Li , New York University
pp. 2
Strands and Multiset Rewriting

Protocol Independence through Disjoint Encryption (Abstract)

Joshua D. Guttman , The MITRE Corporation
F. Javier Thayer , The MITRE Corporation
pp. 24

Relating Strands and Multiset Rewriting for Security Protocol Analysis (Abstract)

Iliano Cervesato , Stanford University
John Mitchell , Stanford University
Andre Scedrov , Stanford University
Patrick Lincoln , Stanford University
Nancy Durgin , Stanford University
pp. 35
Automated Security Protocol Methods

C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis (Abstract)

Anthony H. Dekker , Defense Science and Technology Organization and Australian National University
pp. 77
Panel

Panel: Foundations for Intrusion Detection? (Abstract)

Teresa F. Lunt , Xerox Palo Alto Research Center
pp. 104
Network Security

Reasoning About Secrecy for Active Networks (Abstract)

Carl A. Gunter , University of Pennsylvania
MartÍn Abadi , Lucent Technologies
Pankaj Kakkar , University of Pennsylvania
pp. 118
Invariants, Induction, Ranks, Languages, and Ideals
Noninterference and Information Flow

Information Flow Analysis in a Discrete-Time Process Algebra (Abstract)

Roberto Gorrieri , Universit? di Bologna
Riccardo Focardi , Universit? C? Foscari di Venezia
pp. 170

Possibilistic Definitions of Security - An Assembly Kit (Abstract)

Heiko Mantel , German Research Center for Artificial Intelligence
pp. 185

Probabilistic Noninterference for Multi-Threaded Programs (Abstract)

Andrei Sabelfeld , Chalmers University of Technology and the University of Gothenburg
David Sands , Chalmers University of Technology and the University of Gothenburg
pp. 200
Invited Talk
Java and Mobile Code Security

An Operational Semantics of Java 2 Access Control (Abstract)

Guenter Karjoth , IBM Zurich Research Laboratory
pp. 224
Types and Language-Based Security

Secure Introduction of One-Way Functions (Abstract)

Dennis Volpano , Naval Postgraduate School
pp. 246

How to Prevent Type Flaw Attacks on Security Protocols (Abstract)

Gavin Lowe , University of Leicester
Steve Schneider , University of Leicester
James Heather , University of Leicester
pp. 255

Secure Composition of Untrusted Code: Wrappers and Causality Types (Abstract)

Peter Sewell , University of Cambridge
Jan Vitek , Purdue University
pp. 269

Author Index (PDF)

pp. 285
97 ms
(Ver )