The Community for Technology Leaders
RSS Icon
Computer Security Foundations Workshop, IEEE (2000)
Cambridge, England
July 3, 2000 to July 5, 2000
ISBN: 0-7695-0671-2
Preface (PDF)
pp. vii
pp. viii
Cover Photo (PDF)
pp. ix
Names and Certificates
Ninghui Li , New York University
pp. 2
Strands and Multiset Rewriting
Joshua D. Guttman , The MITRE Corporation
F. Javier Thayer , The MITRE Corporation
pp. 24
Nancy Durgin , Stanford University
Patrick Lincoln , Stanford University
John Mitchell , Stanford University
Andre Scedrov , Stanford University
Iliano Cervesato , Stanford University
pp. 35
Automated Security Protocol Methods
Anthony H. Dekker , Defense Science and Technology Organization and Australian National University
pp. 77
Luigia Carlucci Aiello , Dip. Informatica e Sistemistica
Fabio Massacci , Universit? di Siena
pp. 88
Teresa F. Lunt , Xerox Palo Alto Research Center
pp. 104
Network Security
Pankaj Kakkar , University of Pennsylvania
Carl A. Gunter , University of Pennsylvania
MartÍn Abadi , Lucent Technologies
pp. 118
Invariants, Induction, Ranks, Languages, and Ideals
Ernie Cohen , Telcordia Technologies
pp. 144
Noninterference and Information Flow
Riccardo Focardi , Universit? C? Foscari di Venezia
Roberto Gorrieri , Universit? di Bologna
pp. 170
Heiko Mantel , German Research Center for Artificial Intelligence
pp. 185
Andrei Sabelfeld , Chalmers University of Technology and the University of Gothenburg
David Sands , Chalmers University of Technology and the University of Gothenburg
pp. 200
Invited Talk
Java and Mobile Code Security
Guenter Karjoth , IBM Zurich Research Laboratory
pp. 224
Types and Language-Based Security
Dennis Volpano , Naval Postgraduate School
pp. 246
James Heather , University of Leicester
Gavin Lowe , University of Leicester
Steve Schneider , University of Leicester
pp. 255
Peter Sewell , University of Cambridge
Jan Vitek , Purdue University
pp. 269
Author Index (PDF)
pp. 285
11 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool