The Community for Technology Leaders
Computer Security Foundations Workshop, IEEE (2006)
Venice, Italy
July 5, 2006 to July 7, 2006
ISSN: 1063-6900
ISBN: 0-7695-2615-2
TABLE OF CONTENTS
Introduction

Preface (PDF)

pp. viii
Introduction
Session 1: Information Flow

A Temporal Logic Characterisation of Oservational Determinism (Abstract)

Marieke Huisman , INRIA Sophia Antipolis, France
Kim Sunesen , Esterel Technologies, France
Pratik Worah , IIT Kharagpur, India
pp. 3

Encoding Information Flow in Haskell (Abstract)

Peng Li , University of Pennsylvania, USA
Steve Zdancewic , University of Pennsylvania, USA
pp. 16

Coercion-Resistance and Receipt-Freeness in Electronic Voting (Abstract)

Mark Ryan , University of Birmingham, UK
Stephanie Delaune , LSV, France Telecom R&D, France
Steve Kremer , LSV, INRIA, France
pp. 28-42
Session 2: Games, Plans, and Transformations

On the Completeness of Attack Mutation Algorithms (Abstract)

Shai Rubin , University of Wisconsin, Madison, USA
Barton P. Miller , University of Wisconsin, Madison, USA
Somesh Jha , University of Wisconsin, Madison, USA
pp. 43-56

Types and Effects for Secure Service Orchestration (Abstract)

Massimo Bartoletti , Universita di Pisa, Italy
Pierpaolo Degano , Universita di Pisa, Italy
Gian Luigi Ferrari , Universita di Pisa, Italy
pp. 57-69

Games for Controls (Abstract)

Corin Pitcher , DePaul University, USA
Radha Jagadeesan , DePaul University, USA
Krishnendu Chatterjee , UC Berkeley, USA
pp. 70-84
Session 3: Access Control

Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies (Abstract)

Michael J. May , University of Pennsylvania, USA
Insup Lee , University of Pennsylvania, USA
Carl A. Gunter , University of Illinois Urbana-Champaign, USA
pp. 85-97

On Key Assignment for Hierarchical Access Control (Abstract)

Keith Martin , University of London, UK
Jason Crampton , University of London, UK
Peter Wild , University of London, UK
pp. 98-111

Secrecy by Typing and File-Access Control (Abstract)

Martin Abadi , University of California, Santa Cruz, USA
Avik Chaudhuri , University of California, Santa Cruz, USA
pp. 112-123

Policy Analysis for Administrative Role Based Access Control (Abstract)

C.R. Ramakrishnan , Stony Brook University, USA
Amit Sasturkar , Stony Brook University, USA
Ping Yang , Stony Brook University, USA
Scott D. Stoller , Stony Brook University, USA
pp. 124-138
Session 4: Security Protocol Analysis

Verified Interoperable Implementations of Security Protocols (Abstract)

Stephen Tse , University of Pennsylvania, USA
Cedric Fournet , Microsoft Research, USA
Karthikeyan Bhargavan , Microsoft Research, USA
Andrew D. Gordon , Microsoft Research, USA
pp. 139-152

Cryptographically Sound Theorem Proving (Abstract)

David Basin , ETH Zurich, Switzerland
Michael Waidner , IBM Zurich Research Laboratory, Switzerland
Birgit Pfitzmann , IBM Zurich Research Laboratory, Switzerland
Michael Backes , Saarland University, Germany
Christoph Sprenger , ETH Zurich, Switzerland
pp. 153-166

Resolve-Impossibility for a Contract-Signing Protocol (Abstract)

Aybek Mukhamedov , The University of Birmingham, UK
Mark D. Ryan , The University of Birmingham, UK
pp. 167-176
Session 5: Language, Interaction, and Change

Securing Interaction between Threads and the Scheduler (Abstract)

Andrei Sabelfeld , Chalmers University of Technology, Sweden
Alejandro Russo , Chalmers University of Technology, Sweden
pp. 177-189

Information-Flow Security for Interactive Programs (Abstract)

Michael R. Clarkson , Cornell University, USA
Stephen Chong , Cornell University, USA
Kevin R. O?Neill , Cornell University, USA
pp. 190-201

Managing Policy Updates in Security-Typed Languages (Abstract)

Stephen Tse , University of Pennsylvania, USA
Michael Hicks , University of Maryland, USA
Steve Zdancewic , University of Pennsylvania, USA
Nikhil Swamy , University of Maryland, USA
pp. 202-216
Session 6: Language, Obfuscation, and Robustness

Noninterference in the Presence of Non-Opaque Pointers (Abstract)

David Sands , Chalmers University of Technology, Sweden
Daniel Hedin , Chalmers University of Technology, Sweden
pp. 217-229

Independence From Obfuscation: A Semantic Framework for Dive (Abstract)

Riccardo Pucella , Northeastern University, USA
Fred B. Schneider , Cornell University, USA
pp. 230-241

Decentralized Robustness (Abstract)

Andrew C. Myers , Cornell University, USA
Stephen Chong , Cornell University, USA
pp. 242-256
Session 7: Authorization and Trust

Distributed Authorization Using Delegation with Acyclic Paths (Abstract)

Miranda Mowbray , HP Laboratories Bristol, UK
Antonio Lain , HP Laboratories Bristol, UK
pp. 257-269

A Framework for Establishing Decentralized Secure Coalitions (Abstract)

Simon N. Foley , University College Cork, Ireland
Hongbin Zhou , University College Cork, Ireland
pp. 270-282

Non-Interference in Constructive Authorization Logic (Abstract)

Deepak Garg , Carnegie Mellon University, USA
Frank Pfenn , Carnegie Mellon University, USA
pp. 283-296
Session 8: Protocols and Cryptographic Foundations

Simulation-Based Security with Inexhaustible Interactive Turing Machines (Abstract)

Ralf Kusters , Christian-Albrechts-Universitat zu Kiel, Germany
pp. 309-320

Computationally Sound Compositional Logic for Key Exchange Protocols (Abstract)

Anupam Datta , Stanford University, USA
Bogdan Warinschi , Loria, INRIA-Lorraine, France
John C. Mitchell , Stanford University, USA
Ante Derek , Stanford University, USA
pp. 321-334
Author Index

Author Index (PDF)

pp. 335
98 ms
(Ver )