The Community for Technology Leaders
Computer Security Foundations Workshop, IEEE (2002)
Cape Breton, Nova Scotia, Canada
June 24, 2002 to June 26, 2002
ISSN: 1063-6900
ISBN: 0-7695-1689-0

Preface (PDF)

pp. vii
Information Flow I

Approximate Non-Interference (Abstract)

Alessandra Di Pierro , Università di Pisa
Chris Hankin , Imperial College London
Herbert Wiklicky , Imperial College London
pp. 3

Quantifying Information Flow (Abstract)

Gavin Lowe , Oxford University Computing Laboratory
pp. 18

Secrecy in Multiagent Systems (Abstract)

Joseph Halpern , Cornell University
Kevin O?Neill , Cornell University
pp. 32

Two Formal Analys s of Attack Graphs (Abstract)

S. Jha , University of Wisconsin Madison
O. Sheyner , Carnegie Mellon University
J. Wing , Carnegie Mellon University
pp. 49
Protocols I

Types and Effects for Asymmetric Cryptographic Protocols (Abstract)

Andrew D. Gordon , Microsoft Research
Alan Jeffrey , DePaul University
pp. 77
Applications of Model-Checking

Probabilistic Analysis of Anonymity (Abstract)

Vitaly Shmatikov , SRI International
pp. 119

Analysis of SPKI/SDSI Certificates Using Model Checking (Abstract)

S. Jha , University of Wisconsin Madison
T. Reps , University of Wisconsin Madison
pp. 129
Protocols II

Capturing Parallel Attacks within the Data Independence Framework (Abstract)

P. J. Broadfoot , Oxford University Computing Laboratory
A.. W. Roscoe , Oxford University Computing Laboratory
pp. 147

Polynomial Fairness and Liveness (Abstract)

Michael Backes , Saarland University
Birgit Pfitzmann , IBM Zurich Research Laboratory
Michael Steiner , Saarland University
Michael Waidner , IBM Zurich Research Laboratory
pp. 160

A Formal Analysis of Some Properties of Kerberos 5 Using MSR (Abstract)

Frederick Butler , University of Pennsylvania
Iliano Cervesato , ITT Industries, Inc.
Aaron D. Jaggard , University of Pennsylvania
Andre Scedrov , University of Pennsylvania
pp. 175

A Formal Analysis of Syverson?s Rational Exchange Protocol (Abstract)

Levente Buttyán , Swiss Federal Institute of Technology, Lausanne
Jean-Pierre Hubaux , Swiss Federal Institute of Technology — Lausanne
Srdjan Capkun , Swiss Federal Institute of Technology, Lausanne
pp. 193

Game Analysis of Abuse-free Contract Signing (Abstract)

Steve Kremer , Université Libre de Bruxelles
Jean-François Raskin , Université Libre de Bruxelles
pp. 206
Language-Based Security

Cryptographic Types (Abstract)

Dominic Duggan , Stevens Institute of Technology
pp. 238

Secure Information Flow and Pointer Confinement in a Java-like Language (Abstract)

Anindya Banerjee , Kansas State University
David A. Naumann , Stevens Institute of Technology
pp. 253
Distributed Rights, Access Control, and Watermarking

A Privacy Policy Model for Enterprises (Abstract)

Günter Karjoth , IBM Research
Matthias Schunter , IBM Research
pp. 271

A Logic for Reasoning about Digital Rights (Abstract)

Riccardo Pucella , Cornell University
Vicky Weissman , Cornell University
pp. 282
Information Flow II

Information Flow Security in Dynamic Contexts (Abstract)

Riccardo Focardi , Università Ca éFoscari di Venezia
Sabina Rossi , Università Ca éFoscari di Venezia
pp. 307
Author Index

Author Index (PDF)

pp. 331
94 ms
(Ver 3.3 (11022016))