Preface |
Program Committee |
Cover Photo |
Names and Certificates |
Local Names In SPKI/SDSI / N. Li |
Reasoning about Trust and Insurance in a Public Key Infrastructure / J. Millen ; R. Wright |
Strands and Multiset Rewriting |
Protocol Independence through Disjoint Encryption / J. Guttman ; F. J. Thayer |
Relating Strands and Multiset Rewriting for Security Protocol Analysis / I. Cervesato ; N. Durgin ; J. Mitchell ; P. Lincoln ; A. Scedrov |
Optimizing Protocol Rewrite Rules of CIL Specifications / G. Denker ; A. Grau ; J. Filipe |
Automated Security Protocol Methods |
Looking for Diamonds in the Desert--Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols / A. Perrig ; D. Song |
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis / A. Dekker |
An Executable Specification Language for Planning Attacks to Security Protocols / L. Aiello ; F. Massacci |
Panel |
Foundations for Intrusion Detection? / T. Lunt |
Network Security |
Analyzing Single-Server Network Inhibition / T. Aura ; M. Bishop ; D. Sniegowski |
Reasoning about Secrecy for Active Networks / P. Kakkar ; C. Gunter ; M. Abadi |
Invariants, Induction, Ranks, Languages, and Ideals |
Towards Automatic Verification of Authentication Protocols on an Unbounded Network / J. Heather ; S. Schneider |
TAPS: A First-Order Verifier for Cryptographic Protocols / E. Cohen |
Invariant Generation Techniques in Cryptographic Protocol Analysis / C. Meadows |
Noninterference and Information Flow |
Information Flow Analysis in a Discrete-Time Process Algebra / R. Focardi ; R. Gorrieri ; F. Martinelli |
Possibilistic Definitions of Security--An Assembly Kit / H. Mantel |
Probabilistic Noninterference for Multi-Threaded Programs / A. Sabelfeld ; D. Sands |
Invited Talk |
Lorenz and Colossus / A. Sale |
Java and Mobile Code Security |
An Operational Semantics of Java 2 Access Control / G. Karjoth |
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol / M. Dam ; P. Giambiagi |
Types and Language-Based Security |
Secure Introduction of One-Way Functions / D. Volpano |
How to Prevent Type Flaw Attacks on Security Protocols / G. Lowe |
Secure Composition of Untrusted Code: Wrappers and Causality Types / P. Sewell ; J. Vitek |
Author Index |
Preface |
Program Committee |
Cover Photo |
Names and Certificates |
Local Names In SPKI/SDSI / N. Li |
Reasoning about Trust and Insurance in a Public Key Infrastructure / J. Millen ; R. Wright |