close
1.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society, c1999  viii, 239 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Welcome
Formal Models
A Formal Framework and Evaluation Method for Network Denial of Service / C. Meadows
I/O Automaton Models and Proofs for Shared-Key Communication Systems / N. Lynch
Security Protocol Analysis: Notation, Transformation, and Simplification
Safe Simplifying Transformations for Security Protocols / M. Hui ; G. Lowe
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief / D. Monniaux
A Meta-Notation for Protocol Analysis / I. Cervesato ; N. Durgin ; P. Lincoln ; J. Mitchell ; A. Scedrov
Strand Spaces
Mixed Strand Spaces / F. Thayer ; J. Herzog ; J. Guttman
Honest Functions and their Application to the Analysis of Cryptographic Protocols / A. Maneki
Panel: Formalization and Proof of Secrecy Properties / D. Volpano ; M. Abadi ; R. Focardi ; J. Millen
Formalization and Proof of Secrecy Properties
Local Names
Authentication via Localized Names / C. Bodei ; P. Degano ; C. Priami
A Logic for SDSI's Linked Local Name Spaces / J. Halpern ; R. van der Meyden
Interaction and Composition
Trusted System Construction / C. O'Halloran
Secure Composition of Insecure Components / P. Sewell ; J. Vitek
Security Function Interactions / P. Bieber
Logics for Authorization and Access Control
A Logic-based Knowledge Representation for Authorization with Delegation / N. Li ; J. Feigenbaum ; B. Grosof
A Logical Framework for Reasoning on Data Access Control Policies / E. Bertino ; F. Buccafurri ; E. Ferrari ; P. Rullo
Advances in Automated Security Protocol Analysis
Athena: A New Efficient Automatic Checker for Security Protocol Analysis / D. Song
CVS: A Compiler for the Analysis of Cryptographic Protocols / A. Durante ; R. Gorrieri
Noninterference Using Process Algebras
Process Algebra and Non-Interference / P. Ryan ; S. Schneider
What Is Intransitive Noninterference? / A. Roscoe ; M. Goldsmith
Index of Authors
Preface
Workshop Committee
Welcome
2.

図書

図書
sponsored by IEEE Computer Society
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society, c1997  viii, 209 p. ; 28 cm
所蔵情報: loading…
3.

図書

図書
sponsored by the IEEE Computer Society
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society, c1998  viii, 203 p. ; 28 cm
所蔵情報: loading…
4.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society Press, c1995  viii, 177 p. ; 28 cm
所蔵情報: loading…
5.

図書

図書
Computer Security Foundations Workshop ; IEEE Computer Society
出版情報: Los Alamitos, Calif. : IEEE Computer Society Press, c1991  viii, 243 p. ; 28 cm
所蔵情報: loading…
6.

図書

図書
Computer Security Foundations Workshop ; IEEE Computer Society
出版情報: Los Alamitos, Calif. : IEEE Computer Society Press, c1992  viii, 189 p. ; 28 cm
所蔵情報: loading…
7.

図書

図書
sponsored by the IEEE Computer Society
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society Press, c1994  ix, 201 p. ; 28 cm
所蔵情報: loading…
8.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  viii, 265 p. ; 28 cm
所蔵情報: loading…
9.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2002  viii, 331 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Information Flow I
Approximate Non-Interference / A. Di Pierro ; C. Hankin ; H. Wiklicky
Quantifying Information Flow / G. Lowe
Secrecy in Multiagent Systems / J. Halpern ; K. O'Neill
Intrusion
Two Formal Analyses of Attack Graphs / S. Jha ; O. Sheyner ; J. Wing
Formal Specification of Intrusion Signatures and Detection Rules / J.-P. Pouzol ; M. Ducasse
Protocols I
Types and Effects for Asymmetric Cryptographic Protocols / A. D. Gordon ; A. Jeffrey
Security Protocol Design via Authentication Tests / J. D. Guttman
Strand Spaces and Rank Functions: More Than Distant Cousins / J. Heather
Applications of Model-Checking
Probabilistic Analysis of Anonymity / V. Shmatikov
Analysis of SPKI/SDSI Certificates Using Model Checking / T. Reps
Protocols II
Capturing Parallel Attacks within the Data Independence Framework / P. J. Broadfoot ; A. W. Roscoe
Polynomial Fairness and Liveness / M. Backes ; B. Pfitzmann ; M. Steiner ; M. Waidner
A Formal Analysis of Some Properties of Kerberos 5 Using MSR / F. Butler ; I. Cervesato ; A. D. Jaggard ; A. Scedrov
Games
A Formal Analysis of Syverson's Rational Exchange Protocol / L. Buttyan ; J.-P. Hubaux ; S. Capkun
Game Analysis of Abuse-Free Contract Signing / S. Kremer ; J.-F. Raskin
Language-Based Security
Fine-Grained Information Flow Analysis for a [lambda]-Calculus with Sum Types / V. Simonet
Cryptographic Types / D. Duggan
Secure Information Flow and Pointer Confinement in a Java-Like Language / A. Banerjee ; D. A. Naumann
Distributed Rights, Access Control, and Watermarking
A Privacy Policy Model for Enterprises / G. Karjoth ; M. Schunter
A Logic for Reasoning about Digital Rights / R. Pucella ; V. Weissman
Hiding Functions and Computational Security of Image Watermarking Systems / N. Tran
Information Flow II
Information Flow Security in Dynamic Contexts / R. Focardi ; S. Rossi
A Simple View of Type-Secure Information Flow in the [pi]-Calculus / F. Pottier
Author Index
Preface
Workshop Committee
Information Flow I
10.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2001  viii, 307 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Non-interference and Information Flow
Noninterference Equations for Nondeterministic Systems / S. Pinsky ; E. Zieglar
Robust Declassification / S. Zdancewic ; A. Myers
Access Control
A State-Transition Model of Trust Management and Access Control / A. Chander ; D. Dean ; J. Mitchell
Revocations--A Classification / A. Hagstrom ; S. Jajodia ; F. Parisi-Presicce ; D. Wijesekera
A Logical Reconstruction of SPKI / J. Halpern ; R. van der Meyden
Protocols I
A Security Analysis of the Cliques Protocols Suites / O. Pereira ; J.-J. Quisquater
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules / B. Blanchet
Proving Secrecy is Easy Enough / V. Cortier ; J. Millen ; H. Ruess
Panel
Relating Cryptography and Cryptographic Protocols / A. Scedrov (Moderator) ; R. Canetti ; J. Guttman ; D. Wagner ; M. Waidner
Information Flow and Multi-threading
A New Type System for Secure Information Flow / G. Smith
A Generic Approach to the Security of Multi-threaded Programs / H. Mantel ; A. Sabelfeld
Protocols II
Authenticity by Typing for Security Protocols / A. Gordon ; A. Jeffrey
Computing Symbolic Models for Verifying Cryptographic Protocols / M. Fiore ; M. Abadi
Protocol Insecurity with Finite Number of Sessions is NP-Complete / M. Rusinowitch ; M. Turuani
Intrusion Tolerance and Detection
Multi-phase Damage Confinement in Database Systems for Intrusion Tolerance / P. Liu
Markov Chains, Classifiers, and Intrusion Detection / S. Jha ; K. Tan ; R. Maxion
Log Auditing through Model-Checking / M. Roger ; J. Goubault-Larrecq
Non-interference: Who Needs It? / P. Ryan (Moderator) ; J. McLean ; V. Gligor
Logics for Protocol Verification
A Compositional Logic for Protocol Correctness / N. Durgin ; D. Pavlovic
Logical Relations for Encryption / E. Sumii ; B. Pierce
Secrecy and Privacy
Privacy-Preserving Cooperative Scientific Computations / W. Du ; M. Atallah
Confined Mobile Functions / Z. Kirli
Confidentiality-Preserving Refinement / M. Heisel ; A. Pfitzmann ; T. Santen
Author Index
Preface
Workshop Committee
Non-interference and Information Flow
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼