The Community for Technology Leaders
Computer Security Foundations Workshop, IEEE (2005)
Aix-en-Provence, France
June 20, 2005 to June 22, 2005
ISSN: 1063-6900
ISBN: 0-7695-2340-4
TABLE OF CONTENTS
Introduction

Preface (PDF)

pp. vii
Introduction

Committees (PDF)

pp. viii
Session 1: Information Flow and Security Goals

Practical Information-flow Control in Web-Based Information Systems (Abstract)

Peng Li , University of Pennsylvania
Steve Zdancewic , University of Pennsylvania
pp. 2-15

Achieving Information Flow Security through Precise Control of Effects (Abstract)

William L. Harrison , University of Missouri
James Hook , Portland State University
pp. 16-30

Belief in Information Flow (Abstract)

Michael R. Clarkson , Cornell University
Andrew C. Myers , Cornell University
Fred B. Schneider , Cornell University
pp. 31-45
Session 2: Logic and Knowledge for Protocols

An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols (Abstract)

Iliano Cervesato , Tulane University
Catherine Meadows , Naval Research Laboratory
Dusko Pavlovic , Kestrel Institute
pp. 48-61

Deciding Knowledge in Security Protocols under (Many More) Equational Theories (Abstract)

Martín Abadi , University of California at Santa Cruz
Véronique Cortier , Loria, INRIA & CNRS
pp. 62-76
Session 3: Protocol Case Studies

Compositional Analysis of Contract Signing Protocols (Abstract)

Michael Backes , IBM Zürich Research Lab
Anupam Datta , Stanford University
Ante Derek , Stanford University
John C. Mitchell , Stanford University
Mathieu Turuani , LORIA-INRIA Nancy
pp. 94-110
Session 5: Protocol Verification Techniques

Analysis of Typed Analyses of Authentication Protocols (Abstract)

Michele Bugliesi , Universit? Ca?Foscari di Venezia
Riccardo Focardi , Universit? Ca?Foscari di Venezia
Matteo Maffei , Universit? Ca?Foscari di Venezia
pp. 112-125

Temporal Rank Functions for Forward Secrecy (Abstract)

Rob Delicata , University of Surrey
Steve Schneider , University of Surrey
pp. 126-139

Reconstruction of Attacks against Cryptographic Protocols (Abstract)

Xavier Allamigeon , École Polytechnique and Corps des Télécommunications
Bruno Blanchet , École Normale Supérieure
pp. 140-154
Session 6: Computational and Formal Models

Polynomial Runtime in Simulatability Definitions (Abstract)

Dennis Hofheinz , Universität Karlsruhe
Jörn Müller-Quade , Universität Karlsruhe
Dominique Unruh , Universität Karlsruhe
pp. 156-169

Computational and Information-Theoretic Soundness and Completeness of Formal Encryption (Abstract)

Pedro Adão , Center for Logic and Computation - IST
Gergei Bana , University of Pennsylvania
Andre Scedrov , University of Pennsylvania
pp. 170-184
Session 7: Access Control and Languages

Nomad: A Security Model with Non Atomic Actions and Deadlines (Abstract)

Frédéric Cuppens , GET/ENST-Bretagne
Nora Cuppens-Boulahia , GET/ENST-Bretagne
Thierry Sans , GET/ENST-Bretagne
pp. 186-196

Type Annotations to Improve Stack-Based Access Control (Abstract)

Tian Zhao , University of Wisconsin - Milwaukee
John Boyland , University of Wisconsin - Milwaukee
pp. 197-210

Enforcing Secure Service Composition (Abstract)

Massimo Bartoletti , Università di Pisa
Pierpaolo Degano , Università di Pisa
Gian Luigi Ferrari , Università di Pisa
pp. 211-223
Session 9: Declassification

Language-Based Information Erasure (Abstract)

Stephen Chong , Cornell University
Andrew C. Myers , Cornell University
pp. 241-254
Session 10: Availability and Denial of Service

End-to-End Availability Policies and Noninterference (Abstract)

Lantian Zheng , Cornell University
Andrew C. Myers , Cornell University
pp. 272-286

Game-Based Analysis of Denial-of-Service Prevention Protocols (Abstract)

Ajay Mahimkar , University of Texas at Austin
Vitaly Shmatikov , University of Texas at Austin
pp. 287-301
Author Index

Author Index (PDF)

pp. 302
84 ms
(Ver 3.3 (11022016))