The Community for Technology Leaders
Computer Security Foundations Workshop, IEEE (2001)
Cape Breton, Novia Scotia, Canada
June 11, 2001 to June 13, 2001
ISBN: 0-7695-1146-5

Preface (PDF)

pp. vii
Non-Interference & Information Flow

Noninterference Equations for Nondeterministic Systems (Abstract)

Sylvan Pinsky , National Security Agency
Edward Zieglar , National Security Agency
pp. 0003

Robust Declassification (Abstract)

Steve Zdancewic , Cornell University
Andrew C. Myers , Cornell University
pp. 15
Access Control

A State-Transition Model of Trust Management and Access Control (Abstract)

Ajay Chander , Stanford University
John C. Mitchell , Stanford University
Drew Dean , Xerox PARC
pp. 0027

Revocations-A Classification (Abstract)

Åsa Hagström , George Mason University
Sushil Jajodia , George Mason University
Francesco Parisi-Presicce , George Mason University
Duminda Wijesekera , George Mason University
pp. 0044

A Logical Reconstruction of SPKI (Abstract)

Joseph Y. Halpern , Cornell University
Ron Van der Meyden , University of New South Wales
pp. 0059
Protocols I

Proving Secrecy is Easy Enough (Abstract)

Véronique Cortier , Ecole Normale Sup?rieure de Cachan
Jon Millen , SRI International
Harald Rueß , SRI International
pp. 0097
Information Flow & Multi-Threading

A New Type System for Secure Information Flow (Abstract)

Geoffrey Smith , Florida International University
pp. 0115

A Generic Approach to the Security of Multi-Threaded Programs (Abstract)

Heiko Mantel , German Research Center for Artificial Intelligence
Andrei Sabelfeld , Chalmers University of Technology
pp. 0126
Protocols II

Authenticity by Typing for Security Protocols (Abstract)

Andrew D. Gordon , Microsoft Research
Alan Jeffrey , DePaul University
pp. 0145

Computing Symbolic Models for Verifying Cryptographic Protocols (Abstract)

Marcelo Fiore , University of Cambridge
MartÍn Abadi , Lucent Technologies
pp. 0160

Protocol Insecurity with Finite Number of Sessions is NP-Complete (Abstract)

Michaël Rusinowitch , LORIA-INRIA- Universit? Henri Poincar?
Mathieu Turuani , LORIA-INRIA- Universit? Henri Poincar?
pp. 0174
Intrusion Tolerance & Detection

Markov Chains, Classifiers, and Intrusion Detection (Abstract)

S. Jha , University of Wisconsin
K. Tan , Carnegie Mellon University
R.A. Maxion , Carnegie Mellon University
pp. 0206

Log Auditing through Model-Checking (Abstract)

Muriel Roger , GIE Dyade, INRIA Rocquencourt and LSV, ENS Cachan
Jean Goubault-Larrecq , GIE Dyade, INRIA Rocquencourt and LSV, ENS Cachan
pp. 0220
Logics for Protocol Verification

A Compositional Logic for Protocol Correctness (Abstract)

Nancy Durgin , Stanford University
John Mitchell , Stanford University
Dusko Pavlovic , Stanford University
pp. 0241

Logical Relations for Encryption (Abstract)

Eijiro Sumii , University of Tokyo
Benjamin C. Pierce , University of Pennsylvania
pp. 0256
Secrecy & Privacy

Privacy-Preserving Cooperative Scientific Computations (Abstract)

Wenliang Du , Purdue University
Mikhail J. Atallah , Purdue University
pp. 0273

Confidentiality-Preserving Refinement (Abstract)

Maritta Heisel , Universit?t Magdeburg
Andreas Pfitzmann , Technische Universit?t Dresden
Thomas Santen , Technische Universit?t Berlin
pp. 0295

Author Index (PDF)

pp. 0307
94 ms
(Ver 3.3 (11022016))