Preface |
Workshop Committee |
Non-interference and Information Flow |
Noninterference Equations for Nondeterministic Systems / S. Pinsky ; E. Zieglar |
Robust Declassification / S. Zdancewic ; A. Myers |
Access Control |
A State-Transition Model of Trust Management and Access Control / A. Chander ; D. Dean ; J. Mitchell |
Revocations--A Classification / A. Hagstrom ; S. Jajodia ; F. Parisi-Presicce ; D. Wijesekera |
A Logical Reconstruction of SPKI / J. Halpern ; R. van der Meyden |
Protocols I |
A Security Analysis of the Cliques Protocols Suites / O. Pereira ; J.-J. Quisquater |
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules / B. Blanchet |
Proving Secrecy is Easy Enough / V. Cortier ; J. Millen ; H. Ruess |
Panel |
Relating Cryptography and Cryptographic Protocols / A. Scedrov (Moderator) ; R. Canetti ; J. Guttman ; D. Wagner ; M. Waidner |
Information Flow and Multi-threading |
A New Type System for Secure Information Flow / G. Smith |
A Generic Approach to the Security of Multi-threaded Programs / H. Mantel ; A. Sabelfeld |
Protocols II |
Authenticity by Typing for Security Protocols / A. Gordon ; A. Jeffrey |
Computing Symbolic Models for Verifying Cryptographic Protocols / M. Fiore ; M. Abadi |
Protocol Insecurity with Finite Number of Sessions is NP-Complete / M. Rusinowitch ; M. Turuani |
Intrusion Tolerance and Detection |
Multi-phase Damage Confinement in Database Systems for Intrusion Tolerance / P. Liu |
Markov Chains, Classifiers, and Intrusion Detection / S. Jha ; K. Tan ; R. Maxion |
Log Auditing through Model-Checking / M. Roger ; J. Goubault-Larrecq |
Non-interference: Who Needs It? / P. Ryan (Moderator) ; J. McLean ; V. Gligor |
Logics for Protocol Verification |
A Compositional Logic for Protocol Correctness / N. Durgin ; D. Pavlovic |
Logical Relations for Encryption / E. Sumii ; B. Pierce |
Secrecy and Privacy |
Privacy-Preserving Cooperative Scientific Computations / W. Du ; M. Atallah |
Confined Mobile Functions / Z. Kirli |
Confidentiality-Preserving Refinement / M. Heisel ; A. Pfitzmann ; T. Santen |
Author Index |
Preface |
Workshop Committee |
Non-interference and Information Flow |
Noninterference Equations for Nondeterministic Systems / S. Pinsky ; E. Zieglar |
Robust Declassification / S. Zdancewic ; A. Myers |
Access Control |