19. CSFW 2006: Venice, Italy
- 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy. IEEE Computer Society 2006, ISBN 0-7695-2615-2
Information Flow
- Marieke Huisman, Pratik Worah, Kim Sunesen:
A Temporal Logic Characterisation of Observational Determinism. 3 - Stéphanie Delaune, Steve Kremer, Mark Ryan:
Coercion-Resistance and Receipt-Freeness in Electronic Voting. 28-42
Games, Plans, and Transformations
- Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari:
Types and Effects for Secure Service Orchestration. 57-69
Access Control
- Michael J. May, Carl A. Gunter, Insup Lee:
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. 85-97 - Jason Crampton, Keith M. Martin, Peter R. Wild:
On Key Assignment for Hierarchical Access Control. 98-111 - Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R. Ramakrishnan:
Policy Analysis for Administrative Role Based Access Control. 124-138
Security Protocol Analysis
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse:
Verified Interoperable Implementations of Security Protocols. 139-152 - Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. 153-166
Language, Interaction, and Change
- Kevin R. O'Neill, Michael R. Clarkson, Stephen Chong:
Information-Flow Security for Interactive Programs. 190-201 - Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic:
Managing Policy Updates in Security-Typed Languages. 202-216
Language, Obfuscation, and Robustness
- Riccardo Pucella, Fred B. Schneider:
Independence From Obfuscation: A Semantic Framework for Dive. 230-241
Authorization and Trust
- Antonio Lain, Miranda Mowbray:
Distributed Authorization Using Delegation with Acyclic Paths. 257-269
Protocols and Cryptographic Foundations
- Kim-Kwang Raymond Choo:
Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. 297-308 - Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi:
Computationally Sound Compositional Logic for Key Exchange Protocols. 321-334