The Community for Technology Leaders
Computer Security Foundations Workshop, IEEE (2003)
Pacific Grove, California
June 30, 2003 to July 2, 2003
ISSN: 1063-6900
ISBN: 0-7695-1927-X
TABLE OF CONTENTS
Introduction

Preface (PDF)

pp. vii
Information Flow

Secure Contexts for Confidential Data (Abstract)

Annalisa Bossi , Università Caé Foscari di Venezia
Damiano Macedonio , Università Caé Foscari di Venezia
Carla Piazza , Università Caé Foscari di Venezia
Sabina Rossi , Università Caé Foscari di Venezia
pp. 14

Observational Determinism for Concurrent Program Security (Abstract)

Steve Zdancewic , University of Pennsylvania
Andrew C. Myers , Cornell University
pp. 29
Protocols I
Logics for Anonymity and Distributed System Security

Anonymity and Information Hiding in Multiagent Systems (Abstract)

Kevin R. O?Neill , Cornell University
Joseph Y. Halpern , Cornell University
pp. 75

Understanding SPKI/SDSI Using First-Order Logic (Abstract)

John C. Mitchell , Stanford University
Ninghui Li , Stanford University
pp. 89
Panel 1
Protocols II

A Derivation System for Security Protocols and its Logical Formalization (Abstract)

Anupam Datta , Stanford University
John C. Mitchell , Stanford University
Ante Derek , Stanford University
Dusko Pavlovic , Kestrel Institute
pp. 109

Automatic Validation of Protocol Narration (Abstract)

H. Riis Nielson , Technical University of Denmark
F. Nielson , Technical University of Denmark
P. Degano , Università di Pisa
M. Buchholtz , Technical University of Denmark
C. Bodei , Università di Pisa
pp. 126
Access Control & Information Flow

Using Access Control for Secure Information Flow in a Java-like Language (Abstract)

Anindya Banerjee , Kansas State University
David A. Naumann , Stevens Institute of Technology
pp. 155

Type-Based Distributed Access Control (Abstract)

Jan Vitek , Purdue University
Dominic Duggan , Stevens Institute of Technology
Tom Chothia , Stevens Institute of Technology
pp. 170
Authorization and Security Policies

Using First-Order Logic to Reason about Policies (Abstract)

Vicky Weissman , Cornell University
Joseph Y. Halpern , Cornell University
pp. 187

On Generalized Authorization Problems (Abstract)

S. Stubblebine , Stubblebine Research Labs
S. Schwoon , Universität Stuttgart
T. Reps , University of Wisconsin
S. Jha , University of Wisconsin
pp. 202
Computational Analysis of Security Protocols

Identity Based Authenticated Key Agreement Protocols from Pairings (Abstract)

Liqun Chen , Hewlett-Packard Laboratories
Caroline Kudla , University of London
pp. 219

A Computational Analysis of the Needham-Schröeder-(Lowe) Protocol (Abstract)

Bogdan Warinschi , University of California at San Diego
pp. 248
Panel 2
Author Index

Author Index (PDF)

pp. 265
97 ms
(Ver )