default search action
9th CSFW 1996: Dromquinna Manor, Kenmare, County Kerry, Ireland
- Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland. IEEE Computer Society 1996, ISBN 0-8186-7522-5
Protocols
- Colin Boyd:
A Class of Flexible and Efficient Key Management Protocols. 2-8 - Dalia Malki, Michael K. Reiter:
A High-Throughput Secure Reliable Multicast Protocol. 9-17 - Patrik D'haeseleer:
An Immunological Approach to Change Detection: Theoretical Results. 18-
Protocol Specification
- A. W. Roscoe:
Intensional specifications of security protocols. 28-38 - Jonathan K. Millen, Hai-Ping Ko:
Narrowing terminates for encryption. 39-
Protocol Analysis Tools
- Catherine Meadows:
Language generation and verification in the NRL protocol analyzer. 48-61 - Stephen H. Brackin:
A HOL extension of GNY for automatically analyzing cryptographic protocols. 62-
E-Commerce Challenge
- Stefek Zaba:
E-Commerce Payment Protocols: Requirements and Analysis. 78-
Composition
- Ramesh V. Peri, William A. Wulf, Darrell M. Kienzle:
A Logic of Composition for Information Flow Predicates. 82-94 - Aris Zakinthinos, E. Stewart Lee:
How and why feedback composition fails [secure systems]. 95-101 - Jane E. Sinclair:
Action Systems for Security Specification. 102-
Security Policies
- Riccardo Focardi:
Comparing Two Information Flow Security Properties. 116-122 - Frédéric Cuppens, Claire Saurel:
Specifying a security policy: a case study. 123-
Access Control
- Luigi Giuri, Pietro Iglio:
A Formal Model for Role-Based Access Control with Constraints. 136-145 - Adrian Spalka:
The non-primitiveness of the simple-security property and its non-applicability to relational databases. 146-
Genealogy of Non-Interference
- Peter Ryan:
A Genealogy of Non-Interference. 158-
Attacks
- Gavin Lowe:
Some new attacks upon security protocols. 162-169 - Yvo Desmedt:
Simmons' protocol is not free of subliminal channels. 170-175 - John P. McDermott, David M. Goldschlag:
Towards a model of storage jamming. 176-
What is an Attack on a Cryptographic Protocol?
- Paul F. Syverson:
What is an Attack on a Cryptographic Protocal? 188
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.