Home Page

Table of Contents

Volume 12, Issue 3/4, 2004

Guest Editor: Steve Schneider (CSFW15)

Somesh Jha and Thomas Reps, Model Checking SPKI/SDSI, 317-354

Vitaly Shmatikov, Probabilistic Analysis of an Anonymity System, 355-378

Philippa J. Broadfoot and A. William Roscoe, Embedding Agents Within the Intruder to Detect Parallel Attacks, 379-408

Joshua Guttman, Authentication Tests and Disjoint Encryption: A Design Method for Security Protocols, 409-434

Andrew Gordon and Alan Jeffrey, Types and Effects for Asymmetric Cryptographic Protocols, 435-484

Dominic Duggan, Type-Based Cryptographic Operations, 485-550

Levente Buttyan, Jean-Pierre Hubaux and Srdjan Capkun, A Formal Model of Rational Exchange and Its Application to the Analysis of Syverson's Protocol, 551-588

Michael Backes, Birgit Pfitzmann, Michael Waidner and Michael Steiner, Polynomial Liveness, 589-618

Gavin Lowe, Defining Information Flow Quantity, 619-653

Volume 12, Issue 2, 2004

Dick Ourston, Sara Matzner, William Stump, and Bryan Hopkins, Coordinated Internet Attacks: Responding to Attack Complexity, 165-190

Alessandro Aldini, Mario Bravetti, and Roberto Gorrieri, A Process-Algebraic Approach for the Analysis of Probabilistic Noninterference, 191-246

Nancy Durgin, Patrick Lincoln, John C. Mitchell, and Andre Scedrov, Multiset Rewriting and the Complexity of Bounded Security Protocols, 247-311

Volume 12, Issue 1, 2004

Guest Editor: Joshua Guttman (WITS '02)

Dominic Hughes and Vitaly Shmatikov, Information Hiding, Anonymity and Privacy: a Modular Approach, 3-36

Alessandra DiPierro, Chris Hankin and Herbert Wiklicky, Approximate Non-interference, 37-82

Gavin Lowe, Analysing Protocol Subject to Guessing Attacks, 83-98

Daniele Micciancio and Bogdan Warinschi, Completeness Theorems for the Abadi-Rogaway Language of Encrypted Expressions, 99-130

Ajay Chander, Drew Dean, and John C. Mitchell, Reconstructing Trust Management, 131-164

Volume 11, Issue 4, 2003

Guest Editor: Steve Schneider (CSFW14)

A. Gordon and A. Jeffrey, Authenticity by Typing for Security Protocols, 451-520

E. Sumii and B. Pierce, Logical Relations for Encryption, 521-554

O. Pereira and J.-J. Quisquater, Some Attacks Upon Authenticated Group Key Agreement Protocols, 555-580

J. Halpern and R. van der Meyden, A Logical Reconstruction of SPKI, 581-614

H. Mantel and A. Sabelfeld, A Unifying Approach to the Security of Distributed and Multi-Threaded Programs, 615-676

N. Durgin, J. Mitchell, and D. Pavlovic, A Compositional Logic for Proving Security Properties of Protocols, 677-722

Volume 11, Issue 3, 2003

S. Kremer and J.-F. Raskin, A Game-based Verification of Non-repudiation and Fair Exchange Protocols, 399-430

K. Campbell, L. Gordon, M. Loeb, and L. Zhou, The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market, 431-448

Special Section, Guest Edtors: B. Thraisingham and R. van de Riet (IFIP 2000)

P. Devanbu, M. Gertz, C. Martel, and S. Stubblebine, Authentic Data Publication Over the Internet, 291-314

D. Barbará, R. Goel, and S. Jajodia, A Checksum-based Corruption Detection Technique, 315-330

J. Hale, M. Papa, and S. Shenoi, Programmable Access Control, 331-352

W. Teepe, R. van de Riet and M. Olivier, WorkFlow Analyzed for Security and Privacy in Using Databases, 353-364

C. Altenschmidt, J. Biskup, U. Flegel, and Y. Karabulut, Secure Mediation: Requirements, Design, and Architecture, 365-398

Volume 11, Issue 2, 2003

Guest Editor: P. Syverson (CSFW13)

P. Sewell and J. Vitek, Secure Composition of Untrusted Code: Box pi, Wrappers, and Causality, 135-188

E. Cohen, First-order Verification of Cryptographic Protocols, 189-216

J. Heather, G. Lowe, and S. Schneider, How to Prevent Type Flaw Attacks on Security Protocols, 217-244

P. Kakkar, C. Gunter, and M. Abadi, Reasoning About Secrecy for Active Networks, 245-287.

Volume 11, Issue 1, 2003

C. Iheagwara, A. Blyth and M. Singhal, A Comparative Experimental Evaluation Study of Intrusion Detection System Performance in a Gigabit Environment, 1-33

N. Li, W. Winsborough, and J. Mitchell, Distributed Credential Chain Discovery in Trust Management, 35-86

G. Bella, Inductive Verification of Smart Card Protocols, 87-132

Volume 10, Issue 4, 2002

Guest Editor: Frederick Cuppens (ESORICS 2000)

G. Brose, Manageable Access Control for CORBA, 301-338

G. Schellhorn, W. Reif, A. Schairer, P. Karger, V. Austel, and D. Toll, Verified Formal Security Models for Multiapplicative Smart Cards, 339-368

P. Bieber, J. Cazin, P. Girard, J.-L. Lanet, V. Wiels, and G. Zanon, Checking Secure Interactions of Smart Card Applets: Extended Version, 369-398

I. Welch and R. Stroud, Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code, 399-432

Volume 10, Issue 3, 2002

Guest Editors: S. Jajodia and D. Gritzalis (CCS 2000)

B. Levine and C. Shields, Hordes: a Multicast-Based Protocol for Anonymity, 213-240

P. Bonatti and P. Samarati, A Uniform Framework for Regulating Service Access and Information Release on the Web, 241-272

A. Buldas, P. Laud and H. Lipmaa, Eliminating Counterevidence with Applications to Accountable Certificate Management, 273-296

Erratum for Depender Graphs... in 9(4), 297

Volume 10, Issues 1/2, 2002

Guest Editor: Deborah Frincke (Intrusion Detection)

W. Lee, W. Fan, M. Miller, S.J. Stolfo and E. Zadok, Toward Cost-Sensitive Modeling for Intrusion Detection and Response, 5-22

F. Kerschbaum, E.H. Spafford and D. Zamboni, Using Internal Sensors and Embedded Detectors for Intrusion Detection, 23-70

S.T.Eckmann, G. Vigna and R.A. Kemmerer, STATL: An Attack Language for State-Based Intrusion Detection, 71-104

S. Staniford, J.A. Hoagland and J.M. McAlerney, Practical Automated Detection of Stealthy Portscans, 105-136

Y. Li, N. Wu, X.S. Wang and S. Jajodia, Enhancing Profiles for Anomaly Detection Using Time Granularities, 137-158

D. Spinellis and D. Gritzalis, Panoptis: Intrusion Detection Using a Domain-Specific Language, 159-176

A. Yasinsac, An Environment for Security Protocol Intrusion Detection, 177-188

C.R. Ramakrishnan and R. Sekar, Model-Based Analysis of Configuration Vulnerabilities, 189-209

Volume 9, Issue 4, 2001

S. De Capitani di Vimercati, P. Lincoln, L. Riculli, and P. Samarati, Global Infrastructure Protection System, 251-284

D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R.L. Rivest, Certificate Chain Discovery in SPKI/SDSI, 285-322

R. Wright, P. Lincoln, and J. Millen, Depender Graphs: A Method of Fault-Tolerant Certificate Distribution, 323-338

Volume 9, Issue 3, 2001

Sushil Jajodia, Vijay Atluri, Thomas Keefe, Catherine McCollum, and Ravi Mukkamala, Multilevel Security Transaction Processing, 165-195

Lawrence Paulson, Relations Between Secrets: Two Formal Analyses of the Yahalom Protocol, 197-216

Frederic Besson, Thomas Jensen, Daniel Le Metayer, Model Checking Security Properties of Control Flow Graphs, 217-250

Volume 9, Issues 1/2, 2001

Guest Editor: Paul Syverson (CSFW-12)

Mei Lin Hui and Gavin Lowe, Fault-Preserving Simplifying Transformations for Security Protocols, 3-46

Dawn X. Song, Sergey Berezin and Adrian Perrig, Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis, 47-74

Peter Y. A. Ryan and Steve A. Schneider, Process Algebra and Non-Interference, 75-103

Joseph Halpern and Ron van der Meyden, A Logic for SDSI's Linked Local Name Spaces, 105-142

Catherine Meadows, A Cost-Based Framework for Analysis of Denial of Service Networks, 143-164

Volume 8, Issue 4, 2000

Guest Editors: V. Atluri and J. Hale (13th IFIP Conf. on Database Security)

P. Liu, S. Jajodia, and C. McCollum, Intrusion Confinement by Isolation in Information Systems, 243-280

C. Clifton, Using Sample Size to Limit Exposure to Data Mining, 281-308

E. Bertino, P. Bonatti, E. Ferrari, and M. Sapino, Temporal Authorization Bases: From Specification to Integration, 309-354

Volume 8, Issue 2/3, 2000

V. Atluri and W. Huang, A Petri Net Based Safety Analysis of Workflow Authorization Models, 209-240

Guest Editors: Y. Deswarte and C. Meadows (ESORICS '98)

G. Karjoth, Authorization in CORBA Security, 89-108

E. Bertino, F. Buccafurri, E. Ferrari, and P. Rullo, A Logic-Based Approach for Enforcing Access Control, 109-140

J. Kelsey, B. Schneier, D. Wagner, and C. Hall, Side Channel Cryptanalysis of Product Ciphers, 141-158

A. Wespi, H. Debar, M. Dacier, and M. Nassehi, Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior, 159-182

G. Horn and B. Preneel, Authentication and Payment in Future Mobile Systems, 183-208

Volume 8, Issue 1, 2000

Guest Editor: T. Y. Lin (IFIP '97, Part 2)

V. Atluri, W. Huang, and E. Bertino, A Semantic-Based Execution Model for Multilevel Secure Workflows, 3-42

J. Hale, J. Threet, and S. Shenoi, A Ticket-Based Access Control Architecture for Object Systems, 43-66

A. Spalka and A. Cremers, Structured Name-Spaces in Secure Databases, 67-86

Volume 7, Issue 4, 1999

Guest Editor: T.Y. Lin (IFIP '97, Part 1)

E. Bertino and E. Ferrari, Secure Object Deletion and Garbage Collection in Multilevel Object Bases, 257-286

E. Gudes, M. Olivier and R. van de Riet, Modeling, Specifying and Implementing Workflow Security in Cyberspace, 287-316

R. Sandhu and V. Bhamidipati, Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation , 317-342

Volume 7, Issue 2/3, 1999

Guest Editor: S. Foley (CSFW-11)

G. Lowe, Towards a Completeness Result for Model Checking of Security Protocols, 89-146

A. W. Roscoe and P. Broadfoot, Proving Security Protocols with Model Checkers by Data Independence Techniques, 147-190

J. Thayer, J. Herzog, and J. Guttman, Strand Spaces: Proving Security Protocols Correct, 191-230

D. Volpano and G. Smith, Probabilistic Noninterference in a Concurrent Language, 231-253

Volume 7, Issue 1, 1999

C. Blundo and B. Masucci, A Note on the Randomness in Dynamic Threshold Schemes, 73-85

Intrusion Detection Guest Editor: P. Porras

T. Daniels and E. Spafford, Identification of Host Audit Data to Detect Attacks on Low-level IP, 3-36

G. Vigna and R. Kemmerer, NetSTAT: A Network-based Intrusion Detection System, 37-72

Volume 6, Issue 4, 1998

L. Knudsen and K. Martin, In Search of Multiple Domain Key Recovery, 219-236

M. Franklin and D. Malkhi, Auditable Metering with Lightweight Security, 237-256

F. Casati, S. Castano, and M. Fugini, Enforcing Workflow Authorization Constraints Using Triggers, 257-286

Volume 6, Issue 3, 1998

T. Matsumoto, Human-Computer Cryptography: An Attempt, 129-150

S. Hofmeyr, S. Forrest and A. Somayaji, Intrusion Detection Using Sequences of System Calls, 151-180

I. Ray, P. Ammann, and S. Jajodia, A Semantic-Based Transaction Processing Model for Multilevel Transactions, 181-217

Volume 6, Issue 1/2, 1998

Guest Editor: S. Foley (CSFW10)

M. Abadi, On SDSI's Linked Local Name Spaces, 3-22

J. Gray, K. Ip, and K. Lui, Provable Security for Cryptographic Protocols -- Exact Analysis and Engineering Applications, 23-52

G. Lowe, Casper: A Compiler for the Analysis of Security Protocols, 53-84

L. Paulson, The Inductive Approach to Verifying Cryptographic Protocols, 85-128

Volume 5, Issue 4

Guest Editors: P. Samarati, R. Sandhu (IFIP 11.3 Database Security)

S. Castano, S. De Capitani di Vimercati, and M. Fugini, Automated Derivation of Global Authorizations for Database Federations, 271-302

V. Atluri and W. Huang, Enforcing Mandatory and Discretionary Security in Workflow Management Systems, 303-340

S. Demurjian and T. Ting, Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications, 341-382

Volume 5, Issue 3

Guest Editors: E. Bertino, P. Samarati, G. Rossi (WWW Security)

F. Bergadano, B. Crispo, and M. Lomas, Strong Authentication and Privacy with Standard Browsers, 191-212

J. Quisquater and M. Joye, Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences, 213-224

C. Bryce, W. Kuehnhauser, R. Amouroux, M. Lopez, and H. Rudnik, CWASAR: a European Infrastructure for Secure Electronic Commerce, 225-236

P. Syverson, M. Reed, and D. Goldschlag, Private Web Browsing, 237-248

M. Roescheisen and T. Winograd, A Network-Centric Design for Relationship-Based Security and Access Control, 249-254

M. Winslett, N. Ching, V. Jones, and I. Slepchin, Using Digital Credentials on the World Wide Web, 255-266

Volume 5, Issue 2

Guest Editor: M. Merritt (CSFW-9)

D. Malkhi and M. Reiter, A High-Throughput Secure Reliable Multicast Protocol, 113-128

J. Sinclair, Action Systems for Security Specification, 129-154

S. De Capitani di Vimercati and P. Samarati, Authorization Specification and Enforcement in Federated Database Systems, 155-188

Volume 5, Issue 1

Guest Editors: E. Bertino, E. Montolivo, and H. Kurth (ESORICS '96)

P. Bonatti, M. Sapino and V. Subrahmanian, Merging Heterogeneous Security Orderings, 3-30

V. Lotz, Threat Scenarios as a Means to Formally Develop Secure Systems, 31-68

J. Camenish, U. Maurer and M. Stadler, Digital Payment Systems With Passive Anonymity-Revoking Trustees, 69-90

N. Asokan, G. Tsudik and M. Waidner, Server-Supported Signatures, 91-108

Volume 4, Issue 4

M. Reiter, M. Franklin, J. Lacy, and R. Wright, The Omega Key Management Service, 267-288

S. Chuang, Securing ATM Networks, 289-330

M. Bishop, Conspiracy and Information Flow in the Take-Grant Protection Model, 331-360

Volume 4, Issue 2/3

S. Shieh and V. Gligor, Detecting Illicit Leakage of Information in Operating Systems, 123-148

P. Ammann, R. Lipton, and R. Sandhu, The Expressive Power of Multi-parent Creation in Monotonic Access Control Models, 149-166

D. Volpano, C. Irvine, G. Smith, A Sound Type System for Secure Flow Analysis, 167-188

J. McDermott and R. Mukkamala, A Performance Comparison of Five Transaction Processing Algorithms for the SINTRA Replicated-Architecture Database system, 189-228

Bell and LaPadula, Secure Computer Systems: A Mathematical Model, Volume II, 229-263 (with prefatory remarks by LaPadula and Millen)

Volume 4, Issue 1

Guest Editors: E. Bertino, G. Eizenberg and R. Needham (ESORICS '94)

B. d'Ausbourg and Ch. Calas, Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem, 3-26

A.W. Roscoe, J.C.P. Woodcock, and L. Wulf, Non-interference through Determinism, 27-54

U. M. Maurer and P. E. Schmid, A Calculus for Security Bootstrapping in Distributed Systems, 55-80

A. Jiwa, T. Hardjono and J. Seberry, Beacons for Authentication in Distributed Systems, 81-96

R. Hauser, P. Janson, R. Molva, G. Tsudik, and E. Van Herreweghen Robust and Secure Password and Key Change Method, 97-112

Volume 3, Issue 4

S. N. Foley and J. L. Jacob, Specifying Security for Computer Supported Collaborative Working, 233-254

L. Chen, D. Gollmann and C. J. Mitchell, Distributing Trust Amongst Multiple Authentication Servers, 255-268

A. Zakinthinos and E. S. Lee, The Composability of Non-Interference, 269-282

M. Bishop, Theft of Information in the Take-Grant Protection Model, 283-308

C. Blundo, L. A. Frota Mattos and D. R. Stinson, Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels, 309-322

Volume 3, Issue 2/3

P. Ammann, F. Jaeckle, and S. Jajodia, Concurrency Control in a Secure Database via a Two-Snapshot Algorithm, 87-114

I. E. Kang and T. F. Keefe, Transaction Management for Multilevel Secure Replicated Databases, 115-146

T. H. Hinke, H. S. Delugach and A. Chandrasekhar, A Fast Algorithm for Detecting Second Paths in Database Inference Analysis, 147-168

E. Bertino, F. Origgi and P. Samarati, An Extended Authorization Model for Object Databases, 169-206

L. Notargiacomo, B. T. Blaustein, and C. D. McCollum, Merging Models: Integrity, Dynamic Separation of Duty, and Trusted Data Management207-230

Volume 3, Issue 1

Guest Editor: L. Gong (CSFW-7)

R. Focardi and R. Gorrieri, A Taxonomy of Security Properties for Process Algebras, 5-34

J. K. Millen, Unwinding Forward Correctability, 35-54

W. Bevier and W. Young, A State-Machine Approach to Non-Interference , 55-70

G. Simmons and C. Meadows, The Role of Trust in Information Integrity Protocols , 71-84

Volume 2, Issue 4

J. D. Horton, R. H. Cooper, W.F. Hyslop, B. G. Nickerson, O. K. Ward, R. Harland, E. Ashby, and W. M. Stewart, The Cascade Vulnerability Problem, 279-290

J. T. Trostle, Modelling a Fuzzy Time System, 291-310

V. Atluri, E. Bertino, and S. Jajodia, Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems, 311-352

Volume 2, Issue 2/3

Guest Editors: J. McLean, R. Kemmerer (1992 Security and Privacy Symp.)

J. Millen, A Resource Allocation Model for Denial of Service Protection, 89-106

T. Woo and S. Lam, Authorization in Distributed Systems: A New Approach, 107-136

V. Gligor, S. Luan, and J. Pato, On Inter-Realm Authentication in Large Distributed Systems, 137-158

J. Epstein, J. McHugh, H. Orman, R. Pascale, A. Marmor-Squires, B. Danner, C. Martin, M. Branstad, J. Benson, and D. Rothnie, A High Assurance Window System Prototype, 159-190

R. Yahalom, Optimality of Asynchronous Two-Party Secure Data-Exchange Protocols,191-210

B. Littlewood, S. Brocklehurst, N. Fenton, P. Mellor, S. Page, D. Wright, J. Dobson, J. McDermid, and D. Gollman, Towards Operational Measures of Computer Security, 211-230

R. Thomas and R. Sandhu, A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up, 231-275

Volume 2, Issue 1

Guest Editors: T. Beth, H. Strack (System Security, Dagstuhl 1992)

Th. Beth, Obituary: Fighting for Computer Security - Chris Jahl - in Memoriam, 3-4

H. Haertig, O. Kowalski, and W. Kuehnhauser, The BirliX Security Architecture, 5-22

C. Mitchell and A. Thomas, Standardising Authentication Protocols Based on Public-Key Techniques, 23-36

J. Graham-Cumming, Laws of Non-Interference in CSP, 37-52

A. Sgarro, Information-Theoretic Bounds for Authentication Frauds, 53-64

B. den Boer, A Simple and Key-Economical Unconditional Authentication Scheme, 65-72

K. Lam, Building an Authentication Service for Distributed Systems, 73-84

Volume 1, Issue 3/4

Guest Editors: T. Lunt, J. McLean (1991 Security and Privacy Symp.)

J. Wray, An Analysis of Covert Timing Channels, 219-232

W. Hu, Reducing Timing Channels with Fuzzy Time, 233-254

J. Gray, Toward a Mathematical Foundation for Information, 255-294 Flow Security

J. Tardo and K. Alagappan, SPX: Global Authentication Using Public Key Certificates, 295-316

P. Syverson, Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols, 317-334

P. Ammann and R. Sandhu, The Extended Schematic Protection Model, 335-384

J. Jacob, Basic Theorems About Security, 385-412

Volume 1, Issue 2

Guest Editor: R. Sandhu (CSFW-4)

S. Gupta and V. Gligor, Towards a Theory of Penetration-Resistant Systems and its Applications, 133-158

S. Foley, Aggregation and Separation as Noninterference Properties, 159-188

A. Motro, A Unified Model for Security and Integrity in Relational Databases, 189-213

Volume 1, Issue 1

C. Meadows, Applying Formal Methods to the Analysis of a Key Management Protocol, 5-36

J. McLean, Proving Noninterference and Functional Correctness Using Traces, 37-58

R. Sandhu, Expressive Power of the Schematic Protection Model, 59-98

P. Bieber and F. Cuppens, A Logical View of Secure Dependencies, 99-130