The Community for Technology Leaders
Computer Security Foundations Workshop, IEEE (2004)
Pacific Grove, California
June 28, 2004 to June 30, 2004
ISSN: 1063-6900
ISBN: 0-7695-2169-X

Preface (PDF)

pp. vii

Title Page (PDF)

pp. i

Preface (PDF)

pp. vii
Protocols I

A Theory of Dictionary Attacks and its Complexity (Abstract)

St?phanie Delaune , France Télécom R&D, France
Florent Jacquemard , INRIA, France
pp. 2

Abstraction and Refinement in Protocol Derivation (Abstract)

Anupam Datta , Stanford University, CA
Ante Derek , Stanford University, CA
John C. Mitchell , Stanford University, CA
Dusko Pavlovic , Kestrel Institute, Palo Alto, CA
pp. 30
Access Control

A Distributed Calculus for R?le-Based Access Control (Abstract)

Chiara Braghin , Univ. Ca' Foscari di Venezia
Daniele Gorla , Univ. di Firenze, Univ. di Roma 'La Sapienza'
Vladimiro Sassone , University of Sussex
pp. 48

From Stack Inspection to Access Control: A Security Analysis for Libraries (Abstract)

Fr?d?ric Besson , Microsoft Research
Tomasz Blanc , INRIA Rocquencourt
C?dric Fournet , Microsoft Research
Andrew D. Gordon , Microsoft Research
pp. 61
Intrusion Detection

Selecting Appropriate Counter-Measures in an Intrusion Detection Framework (Abstract)

Fr?d?ric Cuppens , GET/ENST-Bretagne, France
Sylvain Gombault , GET/ENST-Bretagne, France
Thierry Sans , GET/ENST-Bretagne, France
pp. 78

Using Active Learning in Intrusion Detection (Abstract)

Magnus Almgren , Chalmers University of Technology, Sweden
Erland Jonsson , Chalmers University of Technology, Sweden
pp. 88
Information Flow

Secure Information Flow by Self-Composition (Abstract)

Gilles Barthe , INRIA Sophia-Antipolis, France
Pedro R. D'Argenio , Universit? de Provence, France
Tamara Rezk , INRIA Sophia-Antipolis, France
pp. 100

Lenient Array Operations for Practical Secure Information Flow (Abstract)

Zhenyue Deng , Florida International University, Miami
Geoffrey Smith , Florida International University, Miami
pp. 115
Security Policies

Owned Policies for Information Security (Abstract)

Hubie Chen , Cornell University, Ithaca, NY
Stephen Chong , Cornell University, Ithaca, NY
pp. 126

Cassandra: Flexible Trust Management, Applied to Electronic Health Records (Abstract)

Moritz Y. Becker , University of Cambridge, UK
Peter Sewell , University of Cambridge, UK
pp. 139

The Consistency of Task-Based Authorization Constraints in Workflow Systems (Abstract)

Kaijun Tan , University of Pennsylvania
Jason Crampton , University of London
Carl A. Gunter , University of Pennsylvania
pp. 155
Declassification and Information Flow

Enforcing Robust Declassification (Abstract)

Andrew C. Myers , Cornell University
Andrei Sabelfeld , Chalmers University of Technology
Steve Zdancewic , University of Pennsylvania
pp. 172

Modelling Downgrading in Information Flow Security (Abstract)

Annalisa Bossi , Universit? Ca' Foscari di Venezia
Carla Piazza , Universit? Ca' Foscari di Venezia
Sabina Rossi , Universit? Ca' Foscari di Venezia
pp. 187
Formal Methods and Cryptography
Panel: Formal Methods and Cryptography

null (PDF)

pp. null

By Reason and Authority: A System for Authorization of Proof-Carrying Code (Abstract)

Nathan Whitehead , University of California, Santa Cruz
Mart? Abadi , University of California, Santa Cruz
George Necula , University of California, Berkeley
pp. 236

A Formal Foundation for XrML (Abstract)

Joseph Y. Halpern , Cornell University, Ithaca, NY
Vicky Weissman , Cornell University, Ithaca, NY
pp. 251
Protocols II

Formal Analysis of Multi-Party Contract Signing (Abstract)

Rohit Chadha , University of Sussex
Steve Kremer , Universit? Libre de Bruxelles
Andre Scedrov , University of Pennsylvania
pp. 266

Symbolic Model Checking the Knowledge of the Dining Cryptographers (Abstract)

Ron van der Meyden , University of New South Wales, Australia
Kaile Su , Zhongshan University, China
pp. 280

Author Index (PDF)

pp. 292
105 ms
(Ver 3.3 (11022016))