close
1.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  viii, 265 p. ; 28 cm
所蔵情報: loading…
2.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2002  viii, 331 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Information Flow I
Approximate Non-Interference / A. Di Pierro ; C. Hankin ; H. Wiklicky
Quantifying Information Flow / G. Lowe
Secrecy in Multiagent Systems / J. Halpern ; K. O'Neill
Intrusion
Two Formal Analyses of Attack Graphs / S. Jha ; O. Sheyner ; J. Wing
Formal Specification of Intrusion Signatures and Detection Rules / J.-P. Pouzol ; M. Ducasse
Protocols I
Types and Effects for Asymmetric Cryptographic Protocols / A. D. Gordon ; A. Jeffrey
Security Protocol Design via Authentication Tests / J. D. Guttman
Strand Spaces and Rank Functions: More Than Distant Cousins / J. Heather
Applications of Model-Checking
Probabilistic Analysis of Anonymity / V. Shmatikov
Analysis of SPKI/SDSI Certificates Using Model Checking / T. Reps
Protocols II
Capturing Parallel Attacks within the Data Independence Framework / P. J. Broadfoot ; A. W. Roscoe
Polynomial Fairness and Liveness / M. Backes ; B. Pfitzmann ; M. Steiner ; M. Waidner
A Formal Analysis of Some Properties of Kerberos 5 Using MSR / F. Butler ; I. Cervesato ; A. D. Jaggard ; A. Scedrov
Games
A Formal Analysis of Syverson's Rational Exchange Protocol / L. Buttyan ; J.-P. Hubaux ; S. Capkun
Game Analysis of Abuse-Free Contract Signing / S. Kremer ; J.-F. Raskin
Language-Based Security
Fine-Grained Information Flow Analysis for a [lambda]-Calculus with Sum Types / V. Simonet
Cryptographic Types / D. Duggan
Secure Information Flow and Pointer Confinement in a Java-Like Language / A. Banerjee ; D. A. Naumann
Distributed Rights, Access Control, and Watermarking
A Privacy Policy Model for Enterprises / G. Karjoth ; M. Schunter
A Logic for Reasoning about Digital Rights / R. Pucella ; V. Weissman
Hiding Functions and Computational Security of Image Watermarking Systems / N. Tran
Information Flow II
Information Flow Security in Dynamic Contexts / R. Focardi ; S. Rossi
A Simple View of Type-Secure Information Flow in the [pi]-Calculus / F. Pottier
Author Index
Preface
Workshop Committee
Information Flow I
3.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2001  viii, 307 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Non-interference and Information Flow
Noninterference Equations for Nondeterministic Systems / S. Pinsky ; E. Zieglar
Robust Declassification / S. Zdancewic ; A. Myers
Access Control
A State-Transition Model of Trust Management and Access Control / A. Chander ; D. Dean ; J. Mitchell
Revocations--A Classification / A. Hagstrom ; S. Jajodia ; F. Parisi-Presicce ; D. Wijesekera
A Logical Reconstruction of SPKI / J. Halpern ; R. van der Meyden
Protocols I
A Security Analysis of the Cliques Protocols Suites / O. Pereira ; J.-J. Quisquater
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules / B. Blanchet
Proving Secrecy is Easy Enough / V. Cortier ; J. Millen ; H. Ruess
Panel
Relating Cryptography and Cryptographic Protocols / A. Scedrov (Moderator) ; R. Canetti ; J. Guttman ; D. Wagner ; M. Waidner
Information Flow and Multi-threading
A New Type System for Secure Information Flow / G. Smith
A Generic Approach to the Security of Multi-threaded Programs / H. Mantel ; A. Sabelfeld
Protocols II
Authenticity by Typing for Security Protocols / A. Gordon ; A. Jeffrey
Computing Symbolic Models for Verifying Cryptographic Protocols / M. Fiore ; M. Abadi
Protocol Insecurity with Finite Number of Sessions is NP-Complete / M. Rusinowitch ; M. Turuani
Intrusion Tolerance and Detection
Multi-phase Damage Confinement in Database Systems for Intrusion Tolerance / P. Liu
Markov Chains, Classifiers, and Intrusion Detection / S. Jha ; K. Tan ; R. Maxion
Log Auditing through Model-Checking / M. Roger ; J. Goubault-Larrecq
Non-interference: Who Needs It? / P. Ryan (Moderator) ; J. McLean ; V. Gligor
Logics for Protocol Verification
A Compositional Logic for Protocol Correctness / N. Durgin ; D. Pavlovic
Logical Relations for Encryption / E. Sumii ; B. Pierce
Secrecy and Privacy
Privacy-Preserving Cooperative Scientific Computations / W. Du ; M. Atallah
Confined Mobile Functions / Z. Kirli
Confidentiality-Preserving Refinement / M. Heisel ; A. Pfitzmann ; T. Santen
Author Index
Preface
Workshop Committee
Non-interference and Information Flow
4.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2005  viii, 302 p. ; 28 cm
所蔵情報: loading…
5.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2004  viii, 292 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committees
Protocols I
A Theory of Dictionary Attacks and its Complexity / S. Delaune ; F. Jacquemard
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols / O. Pereira ; J. Quisquater
Abstraction and Refinement in Protocol Derivation / A. Datta ; A. Derek ; J. Mitchell ; D. Pavlovic
Access Control
A Distributed Calculus for Role-Based Access Control / C. Braghin ; D. Gorla ; V. Sassone
From Stack Inspection to Access Control: A Security Analysis for Libraries / F. Besson ; T. Blanc ; C. Fournet ; A. Gordon
Intrusion Detection
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework / F. Cuppens ; T. Sans ; S. Gombault
Using Active Learning in Intrusion Detection / M. Almgren ; E. Jonsson
Information Flow
Secure Information Flow by Self-Composition / G. Barthe ; P. D'Argenio ; T. Rezk
Lenient Array Operations for Practical Secure Information Flow / Z. Deng ; G. Smith
Security Policies
Owned Policies for Information Security / H. Chen ; S. Chong
Cassandra: Flexible Trust Management, Applied to Electronic Health Records / M. Becker ; P. Sewell
The Consistency of Task-Based Authorization Constraints in Workflow Systems / K. Tan ; J. Crampton ; C. Gunter
Declassification and Information Flow
Enforcing Robust Declassification / A. Myers ; A. Sabelfeld ; S. Zdancewic
Modelling Downgrading in Information Flow Security / A. Bossi ; C. Piazza ; S. Rossi
Formal Methods and Cryptography
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library / M. Backes ; B. Pfitzmann
Universally Composable Signature, Certification, and Authentication / R. Canetti
Panel: Formal Methods and Cryptography
Authorization
By Reason and Authority: A System for Authorization of Proof-Carrying Code / N. Whitehead ; M. Abadi ; G. Necula
A Formal Foundation for XrML / J. Halpern ; V. Weissman
Protocols II
Formal Analysis of Multi-Party Contract Signing / R. Chadha ; S. Kremer ; A. Scedrov
Symbolic Model Checking the Knowledge of the Dining Cryptographers / K. Su ; R. van der Meyden
Author Index
Preface
Workshop Committees
Protocols I
6.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society, c2000  ix, 285 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Program Committee
Cover Photo
Names and Certificates
Local Names In SPKI/SDSI / N. Li
Reasoning about Trust and Insurance in a Public Key Infrastructure / J. Millen ; R. Wright
Strands and Multiset Rewriting
Protocol Independence through Disjoint Encryption / J. Guttman ; F. J. Thayer
Relating Strands and Multiset Rewriting for Security Protocol Analysis / I. Cervesato ; N. Durgin ; J. Mitchell ; P. Lincoln ; A. Scedrov
Optimizing Protocol Rewrite Rules of CIL Specifications / G. Denker ; A. Grau ; J. Filipe
Automated Security Protocol Methods
Looking for Diamonds in the Desert--Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols / A. Perrig ; D. Song
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis / A. Dekker
An Executable Specification Language for Planning Attacks to Security Protocols / L. Aiello ; F. Massacci
Panel
Foundations for Intrusion Detection? / T. Lunt
Network Security
Analyzing Single-Server Network Inhibition / T. Aura ; M. Bishop ; D. Sniegowski
Reasoning about Secrecy for Active Networks / P. Kakkar ; C. Gunter ; M. Abadi
Invariants, Induction, Ranks, Languages, and Ideals
Towards Automatic Verification of Authentication Protocols on an Unbounded Network / J. Heather ; S. Schneider
TAPS: A First-Order Verifier for Cryptographic Protocols / E. Cohen
Invariant Generation Techniques in Cryptographic Protocol Analysis / C. Meadows
Noninterference and Information Flow
Information Flow Analysis in a Discrete-Time Process Algebra / R. Focardi ; R. Gorrieri ; F. Martinelli
Possibilistic Definitions of Security--An Assembly Kit / H. Mantel
Probabilistic Noninterference for Multi-Threaded Programs / A. Sabelfeld ; D. Sands
Invited Talk
Lorenz and Colossus / A. Sale
Java and Mobile Code Security
An Operational Semantics of Java 2 Access Control / G. Karjoth
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol / M. Dam ; P. Giambiagi
Types and Language-Based Security
Secure Introduction of One-Way Functions / D. Volpano
How to Prevent Type Flaw Attacks on Security Protocols / G. Lowe
Secure Composition of Untrusted Code: Wrappers and Causality Types / P. Sewell ; J. Vitek
Author Index
Preface
Program Committee
Cover Photo
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼