Preface |
Workshop Committee |
Welcome |
Formal Models |
A Formal Framework and Evaluation Method for Network Denial of Service / C. Meadows |
I/O Automaton Models and Proofs for Shared-Key Communication Systems / N. Lynch |
Security Protocol Analysis: Notation, Transformation, and Simplification |
Safe Simplifying Transformations for Security Protocols / M. Hui ; G. Lowe |
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief / D. Monniaux |
A Meta-Notation for Protocol Analysis / I. Cervesato ; N. Durgin ; P. Lincoln ; J. Mitchell ; A. Scedrov |
Strand Spaces |
Mixed Strand Spaces / F. Thayer ; J. Herzog ; J. Guttman |
Honest Functions and their Application to the Analysis of Cryptographic Protocols / A. Maneki |
Panel: Formalization and Proof of Secrecy Properties / D. Volpano ; M. Abadi ; R. Focardi ; J. Millen |
Formalization and Proof of Secrecy Properties |
Local Names |
Authentication via Localized Names / C. Bodei ; P. Degano ; C. Priami |
A Logic for SDSI's Linked Local Name Spaces / J. Halpern ; R. van der Meyden |
Interaction and Composition |
Trusted System Construction / C. O'Halloran |
Secure Composition of Insecure Components / P. Sewell ; J. Vitek |
Security Function Interactions / P. Bieber |
Logics for Authorization and Access Control |
A Logic-based Knowledge Representation for Authorization with Delegation / N. Li ; J. Feigenbaum ; B. Grosof |
A Logical Framework for Reasoning on Data Access Control Policies / E. Bertino ; F. Buccafurri ; E. Ferrari ; P. Rullo |
Advances in Automated Security Protocol Analysis |
Athena: A New Efficient Automatic Checker for Security Protocol Analysis / D. Song |
CVS: A Compiler for the Analysis of Cryptographic Protocols / A. Durante ; R. Gorrieri |
Noninterference Using Process Algebras |
Process Algebra and Non-Interference / P. Ryan ; S. Schneider |
What Is Intransitive Noninterference? / A. Roscoe ; M. Goldsmith |
Index of Authors |
Preface |
Workshop Committee |
Welcome |
Formal Models |
A Formal Framework and Evaluation Method for Network Denial of Service / C. Meadows |
I/O Automaton Models and Proofs for Shared-Key Communication Systems / N. Lynch |