Home Page
Table of ContentsVolume 12, Issue 3/4, 2004Guest Editor: Steve Schneider (CSFW15)Somesh Jha and Thomas Reps, Model Checking SPKI/SDSI, 317-354 Vitaly Shmatikov, Probabilistic Analysis of an Anonymity System, 355-378 Philippa J. Broadfoot and A. William Roscoe, Embedding Agents Within the Intruder to Detect Parallel Attacks, 379-408 Joshua Guttman, Authentication Tests and Disjoint Encryption: A Design Method for Security Protocols, 409-434 Andrew Gordon and Alan Jeffrey, Types and Effects for Asymmetric Cryptographic Protocols, 435-484 Dominic Duggan, Type-Based Cryptographic Operations, 485-550 Levente Buttyan, Jean-Pierre Hubaux and Srdjan Capkun, A Formal Model of Rational Exchange and Its Application to the Analysis of Syverson's Protocol, 551-588 Michael Backes, Birgit Pfitzmann, Michael Waidner and Michael Steiner, Polynomial Liveness, 589-618 Gavin Lowe, Defining Information Flow Quantity, 619-653 Volume 12, Issue 2, 2004Dick Ourston, Sara Matzner, William Stump, and Bryan Hopkins, Coordinated Internet Attacks: Responding to Attack Complexity, 165-190Alessandro Aldini, Mario Bravetti, and Roberto Gorrieri, A Process-Algebraic Approach for the Analysis of Probabilistic Noninterference, 191-246 Nancy Durgin, Patrick Lincoln, John C. Mitchell, and Andre Scedrov, Multiset Rewriting and the Complexity of Bounded Security Protocols, 247-311 Volume 12, Issue 1, 2004Guest Editor: Joshua Guttman (WITS '02)Dominic Hughes and Vitaly Shmatikov, Information Hiding, Anonymity and Privacy: a Modular Approach, 3-36 Alessandra DiPierro, Chris Hankin and Herbert Wiklicky, Approximate Non-interference, 37-82 Gavin Lowe, Analysing Protocol Subject to Guessing Attacks, 83-98 Daniele Micciancio and Bogdan Warinschi, Completeness Theorems for the Abadi-Rogaway Language of Encrypted Expressions, 99-130 Ajay Chander, Drew Dean, and John C. Mitchell, Reconstructing Trust Management, 131-164 Volume 11, Issue 4, 2003Guest Editor: Steve Schneider (CSFW14)A. Gordon and A. Jeffrey, Authenticity by Typing for Security Protocols, 451-520 E. Sumii and B. Pierce, Logical Relations for Encryption, 521-554 O. Pereira and J.-J. Quisquater, Some Attacks Upon Authenticated Group Key Agreement Protocols, 555-580 J. Halpern and R. van der Meyden, A Logical Reconstruction of SPKI, 581-614 H. Mantel and A. Sabelfeld, A Unifying Approach to the Security of Distributed and Multi-Threaded Programs, 615-676 N. Durgin, J. Mitchell, and D. Pavlovic, A Compositional Logic for Proving Security Properties of Protocols, 677-722 Volume 11, Issue 3, 2003S. Kremer and J.-F. Raskin, A Game-based Verification of Non-repudiation and Fair Exchange Protocols, 399-430K. Campbell, L. Gordon, M. Loeb, and L. Zhou, The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market, 431-448 Special Section, Guest Edtors: B. Thraisingham and R. van de Riet (IFIP 2000) P. Devanbu, M. Gertz, C. Martel, and S. Stubblebine, Authentic Data Publication Over the Internet, 291-314 D. Barbará, R. Goel, and S. Jajodia, A Checksum-based Corruption Detection Technique, 315-330 J. Hale, M. Papa, and S. Shenoi, Programmable Access Control, 331-352 W. Teepe, R. van de Riet and M. Olivier, WorkFlow Analyzed for Security and Privacy in Using Databases, 353-364 C. Altenschmidt, J. Biskup, U. Flegel, and Y. Karabulut, Secure Mediation: Requirements, Design, and Architecture, 365-398 Volume 11, Issue 2, 2003Guest Editor: P. Syverson (CSFW13)P. Sewell and J. Vitek, Secure Composition of Untrusted Code: Box pi, Wrappers, and Causality, 135-188 E. Cohen, First-order Verification of Cryptographic Protocols, 189-216 J. Heather, G. Lowe, and S. Schneider, How to Prevent Type Flaw Attacks on Security Protocols, 217-244 P. Kakkar, C. Gunter, and M. Abadi, Reasoning About Secrecy for Active Networks, 245-287. Volume 11, Issue 1, 2003C. Iheagwara, A. Blyth and M. Singhal, A Comparative Experimental Evaluation Study of Intrusion Detection System Performance in a Gigabit Environment, 1-33N. Li, W. Winsborough, and J. Mitchell, Distributed Credential Chain Discovery in Trust Management, 35-86 G. Bella, Inductive Verification of Smart Card Protocols, 87-132 Volume 10, Issue 4, 2002Guest Editor: Frederick Cuppens (ESORICS 2000)G. Brose, Manageable Access Control for CORBA, 301-338 G. Schellhorn, W. Reif, A. Schairer, P. Karger, V. Austel, and D. Toll, Verified Formal Security Models for Multiapplicative Smart Cards, 339-368 P. Bieber, J. Cazin, P. Girard, J.-L. Lanet, V. Wiels, and G. Zanon, Checking Secure Interactions of Smart Card Applets: Extended Version, 369-398 I. Welch and R. Stroud, Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code, 399-432 Volume 10, Issue 3, 2002Guest Editors: S. Jajodia and D. Gritzalis (CCS 2000)B. Levine and C. Shields, Hordes: a Multicast-Based Protocol for Anonymity, 213-240 P. Bonatti and P. Samarati, A Uniform Framework for Regulating Service Access and Information Release on the Web, 241-272 A. Buldas, P. Laud and H. Lipmaa, Eliminating Counterevidence with Applications to Accountable Certificate Management, 273-296 Erratum for Depender Graphs... in 9(4), 297 Volume 10, Issues 1/2, 2002Guest Editor: Deborah Frincke (Intrusion Detection)W. Lee, W. Fan, M. Miller, S.J. Stolfo and E. Zadok, Toward Cost-Sensitive Modeling for Intrusion Detection and Response, 5-22 F. Kerschbaum, E.H. Spafford and D. Zamboni, Using Internal Sensors and Embedded Detectors for Intrusion Detection, 23-70 S.T.Eckmann, G. Vigna and R.A. Kemmerer, STATL: An Attack Language for State-Based Intrusion Detection, 71-104 S. Staniford, J.A. Hoagland and J.M. McAlerney, Practical Automated Detection of Stealthy Portscans, 105-136 Y. Li, N. Wu, X.S. Wang and S. Jajodia, Enhancing Profiles for Anomaly Detection Using Time Granularities, 137-158 D. Spinellis and D. Gritzalis, Panoptis: Intrusion Detection Using a Domain-Specific Language, 159-176 A. Yasinsac, An Environment for Security Protocol Intrusion Detection, 177-188 C.R. Ramakrishnan and R. Sekar, Model-Based Analysis of Configuration Vulnerabilities, 189-209 Volume 9, Issue 4, 2001S. De Capitani di Vimercati, P. Lincoln, L. Riculli, and P. Samarati, Global Infrastructure Protection System, 251-284D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R.L. Rivest, Certificate Chain Discovery in SPKI/SDSI, 285-322 R. Wright, P. Lincoln, and J. Millen, Depender Graphs: A Method of Fault-Tolerant Certificate Distribution, 323-338 Volume 9, Issue 3, 2001Sushil Jajodia, Vijay Atluri, Thomas Keefe, Catherine McCollum, and Ravi Mukkamala, Multilevel Security Transaction Processing, 165-195Lawrence Paulson, Relations Between Secrets: Two Formal Analyses of the Yahalom Protocol, 197-216 Frederic Besson, Thomas Jensen, Daniel Le Metayer, Model Checking Security Properties of Control Flow Graphs, 217-250 Volume 9, Issues 1/2, 2001Guest Editor: Paul Syverson (CSFW-12)Mei Lin Hui and Gavin Lowe, Fault-Preserving Simplifying Transformations for Security Protocols, 3-46 Dawn X. Song, Sergey Berezin and Adrian Perrig, Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis, 47-74 Peter Y. A. Ryan and Steve A. Schneider, Process Algebra and Non-Interference, 75-103 Joseph Halpern and Ron van der Meyden, A Logic for SDSI's Linked Local Name Spaces, 105-142 Catherine Meadows, A Cost-Based Framework for Analysis of Denial of Service Networks, 143-164 Volume 8, Issue 4, 2000Guest Editors: V. Atluri and J. Hale (13th IFIP Conf. on Database Security)P. Liu, S. Jajodia, and C. McCollum, Intrusion Confinement by Isolation in Information Systems, 243-280 C. Clifton, Using Sample Size to Limit Exposure to Data Mining, 281-308 E. Bertino, P. Bonatti, E. Ferrari, and M. Sapino, Temporal Authorization Bases: From Specification to Integration, 309-354 Volume 8, Issue 2/3, 2000V. Atluri and W. Huang, A Petri Net Based Safety Analysis of Workflow Authorization Models, 209-240Guest Editors: Y. Deswarte and C. Meadows (ESORICS '98) G. Karjoth, Authorization in CORBA Security, 89-108 E. Bertino, F. Buccafurri, E. Ferrari, and P. Rullo, A Logic-Based Approach for Enforcing Access Control, 109-140 J. Kelsey, B. Schneier, D. Wagner, and C. Hall, Side Channel Cryptanalysis of Product Ciphers, 141-158 A. Wespi, H. Debar, M. Dacier, and M. Nassehi, Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior, 159-182 G. Horn and B. Preneel, Authentication and Payment in Future Mobile Systems, 183-208 Volume 8, Issue 1, 2000Guest Editor: T. Y. Lin (IFIP '97, Part 2)V. Atluri, W. Huang, and E. Bertino, A Semantic-Based Execution Model for Multilevel Secure Workflows, 3-42 J. Hale, J. Threet, and S. Shenoi, A Ticket-Based Access Control Architecture for Object Systems, 43-66 A. Spalka and A. Cremers, Structured Name-Spaces in Secure Databases, 67-86 Volume 7, Issue 4, 1999Guest Editor: T.Y. Lin (IFIP '97, Part 1)E. Bertino and E. Ferrari, Secure Object Deletion and Garbage Collection in Multilevel Object Bases, 257-286 E. Gudes, M. Olivier and R. van de Riet, Modeling, Specifying and Implementing Workflow Security in Cyberspace, 287-316 R. Sandhu and V. Bhamidipati, Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation , 317-342 Volume 7, Issue 2/3, 1999Guest Editor: S. Foley (CSFW-11)G. Lowe, Towards a Completeness Result for Model Checking of Security Protocols, 89-146 A. W. Roscoe and P. Broadfoot, Proving Security Protocols with Model Checkers by Data Independence Techniques, 147-190 J. Thayer, J. Herzog, and J. Guttman, Strand Spaces: Proving Security Protocols Correct, 191-230 D. Volpano and G. Smith, Probabilistic Noninterference in a Concurrent Language, 231-253 Volume 7, Issue 1, 1999C. Blundo and B. Masucci, A Note on the Randomness in Dynamic Threshold Schemes, 73-85Intrusion Detection Guest Editor: P. Porras T. Daniels and E. Spafford, Identification of Host Audit Data to Detect Attacks on Low-level IP, 3-36 G. Vigna and R. Kemmerer, NetSTAT: A Network-based Intrusion Detection System, 37-72 Volume 6, Issue 4, 1998L. Knudsen and K. Martin, In Search of Multiple Domain Key Recovery, 219-236M. Franklin and D. Malkhi, Auditable Metering with Lightweight Security, 237-256 F. Casati, S. Castano, and M. Fugini, Enforcing Workflow Authorization Constraints Using Triggers, 257-286 Volume 6, Issue 3, 1998T. Matsumoto, Human-Computer Cryptography: An Attempt, 129-150S. Hofmeyr, S. Forrest and A. Somayaji, Intrusion Detection Using Sequences of System Calls, 151-180 I. Ray, P. Ammann, and S. Jajodia, A Semantic-Based Transaction Processing Model for Multilevel Transactions, 181-217 Volume 6, Issue 1/2, 1998Guest Editor: S. Foley (CSFW10)M. Abadi, On SDSI's Linked Local Name Spaces, 3-22 J. Gray, K. Ip, and K. Lui, Provable Security for Cryptographic Protocols -- Exact Analysis and Engineering Applications, 23-52 G. Lowe, Casper: A Compiler for the Analysis of Security Protocols, 53-84 L. Paulson, The Inductive Approach to Verifying Cryptographic Protocols, 85-128 Volume 5, Issue 4Guest Editors: P. Samarati, R. Sandhu (IFIP 11.3 Database Security)S. Castano, S. De Capitani di Vimercati, and M. Fugini, Automated Derivation of Global Authorizations for Database Federations, 271-302 V. Atluri and W. Huang, Enforcing Mandatory and Discretionary Security in Workflow Management Systems, 303-340 S. Demurjian and T. Ting, Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications, 341-382
Volume 5, Issue 3Guest Editors: E. Bertino, P. Samarati, G. Rossi (WWW Security)F. Bergadano, B. Crispo, and M. Lomas, Strong Authentication and Privacy with Standard Browsers, 191-212 J. Quisquater and M. Joye, Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences, 213-224 C. Bryce, W. Kuehnhauser, R. Amouroux, M. Lopez, and H. Rudnik, CWASAR: a European Infrastructure for Secure Electronic Commerce, 225-236 P. Syverson, M. Reed, and D. Goldschlag, Private Web Browsing, 237-248 M. Roescheisen and T. Winograd, A Network-Centric Design for Relationship-Based Security and Access Control, 249-254 M. Winslett, N. Ching, V. Jones, and I. Slepchin, Using Digital Credentials on the World Wide Web, 255-266 Volume 5, Issue 2Guest Editor: M. Merritt (CSFW-9)D. Malkhi and M. Reiter, A High-Throughput Secure Reliable Multicast Protocol, 113-128 J. Sinclair, Action Systems for Security Specification, 129-154 S. De Capitani di Vimercati and P. Samarati, Authorization Specification and Enforcement in Federated Database Systems, 155-188 Volume 5, Issue 1Guest Editors: E. Bertino, E. Montolivo, and H. Kurth (ESORICS '96)P. Bonatti, M. Sapino and V. Subrahmanian, Merging Heterogeneous Security Orderings, 3-30 V. Lotz, Threat Scenarios as a Means to Formally Develop Secure Systems, 31-68 J. Camenish, U. Maurer and M. Stadler, Digital Payment Systems With Passive Anonymity-Revoking Trustees, 69-90 N. Asokan, G. Tsudik and M. Waidner, Server-Supported Signatures, 91-108 Volume 4, Issue 4M. Reiter, M. Franklin, J. Lacy, and R. Wright, The Omega Key Management Service, 267-288S. Chuang, Securing ATM Networks, 289-330 M. Bishop, Conspiracy and Information Flow in the Take-Grant Protection Model, 331-360 Volume 4, Issue 2/3S. Shieh and V. Gligor, Detecting Illicit Leakage of Information in Operating Systems, 123-148P. Ammann, R. Lipton, and R. Sandhu, The Expressive Power of Multi-parent Creation in Monotonic Access Control Models, 149-166 D. Volpano, C. Irvine, G. Smith, A Sound Type System for Secure Flow Analysis, 167-188 J. McDermott and R. Mukkamala, A Performance Comparison of Five Transaction Processing Algorithms for the SINTRA Replicated-Architecture Database system, 189-228 Bell and LaPadula, Secure Computer Systems: A Mathematical Model, Volume II, 229-263 (with prefatory remarks by LaPadula and Millen) Volume 4, Issue 1Guest Editors: E. Bertino, G. Eizenberg and R. Needham (ESORICS '94)B. d'Ausbourg and Ch. Calas, Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem, 3-26 A.W. Roscoe, J.C.P. Woodcock, and L. Wulf, Non-interference through Determinism, 27-54 U. M. Maurer and P. E. Schmid, A Calculus for Security Bootstrapping in Distributed Systems, 55-80 A. Jiwa, T. Hardjono and J. Seberry, Beacons for Authentication in Distributed Systems, 81-96 R. Hauser, P. Janson, R. Molva, G. Tsudik, and E. Van Herreweghen Robust and Secure Password and Key Change Method, 97-112 Volume 3, Issue 4S. N. Foley and J. L. Jacob, Specifying Security for Computer Supported Collaborative Working, 233-254L. Chen, D. Gollmann and C. J. Mitchell, Distributing Trust Amongst Multiple Authentication Servers, 255-268 A. Zakinthinos and E. S. Lee, The Composability of Non-Interference, 269-282 M. Bishop, Theft of Information in the Take-Grant Protection Model, 283-308 C. Blundo, L. A. Frota Mattos and D. R. Stinson, Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels, 309-322 Volume 3, Issue 2/3P. Ammann, F. Jaeckle, and S. Jajodia, Concurrency Control in a Secure Database via a Two-Snapshot Algorithm, 87-114I. E. Kang and T. F. Keefe, Transaction Management for Multilevel Secure Replicated Databases, 115-146 T. H. Hinke, H. S. Delugach and A. Chandrasekhar, A Fast Algorithm for Detecting Second Paths in Database Inference Analysis, 147-168 E. Bertino, F. Origgi and P. Samarati, An Extended Authorization Model for Object Databases, 169-206 L. Notargiacomo, B. T. Blaustein, and C. D. McCollum, Merging Models: Integrity, Dynamic Separation of Duty, and Trusted Data Management207-230 Volume 3, Issue 1Guest Editor: L. Gong (CSFW-7)R. Focardi and R. Gorrieri, A Taxonomy of Security Properties for Process Algebras, 5-34 J. K. Millen, Unwinding Forward Correctability, 35-54 W. Bevier and W. Young, A State-Machine Approach to Non-Interference , 55-70 G. Simmons and C. Meadows, The Role of Trust in Information Integrity Protocols , 71-84 Volume 2, Issue 4J. D. Horton, R. H. Cooper, W.F. Hyslop, B. G. Nickerson, O. K. Ward, R. Harland, E. Ashby, and W. M. Stewart, The Cascade Vulnerability Problem, 279-290J. T. Trostle, Modelling a Fuzzy Time System, 291-310 V. Atluri, E. Bertino, and S. Jajodia, Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems, 311-352 Volume 2, Issue 2/3Guest Editors: J. McLean, R. Kemmerer (1992 Security and Privacy Symp.)J. Millen, A Resource Allocation Model for Denial of Service Protection, 89-106 T. Woo and S. Lam, Authorization in Distributed Systems: A New Approach, 107-136 V. Gligor, S. Luan, and J. Pato, On Inter-Realm Authentication in Large Distributed Systems, 137-158 J. Epstein, J. McHugh, H. Orman, R. Pascale, A. Marmor-Squires, B. Danner, C. Martin, M. Branstad, J. Benson, and D. Rothnie, A High Assurance Window System Prototype, 159-190 R. Yahalom, Optimality of Asynchronous Two-Party Secure Data-Exchange Protocols,191-210 B. Littlewood, S. Brocklehurst, N. Fenton, P. Mellor, S. Page, D. Wright, J. Dobson, J. McDermid, and D. Gollman, Towards Operational Measures of Computer Security, 211-230 R. Thomas and R. Sandhu, A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up, 231-275 Volume 2, Issue 1Guest Editors: T. Beth, H. Strack (System Security, Dagstuhl 1992)Th. Beth, Obituary: Fighting for Computer Security - Chris Jahl - in Memoriam, 3-4 H. Haertig, O. Kowalski, and W. Kuehnhauser, The BirliX Security Architecture, 5-22 C. Mitchell and A. Thomas, Standardising Authentication Protocols Based on Public-Key Techniques, 23-36 J. Graham-Cumming, Laws of Non-Interference in CSP, 37-52 A. Sgarro, Information-Theoretic Bounds for Authentication Frauds, 53-64 B. den Boer, A Simple and Key-Economical Unconditional Authentication Scheme, 65-72 K. Lam, Building an Authentication Service for Distributed Systems, 73-84 Volume 1, Issue 3/4Guest Editors: T. Lunt, J. McLean (1991 Security and Privacy Symp.)J. Wray, An Analysis of Covert Timing Channels, 219-232 W. Hu, Reducing Timing Channels with Fuzzy Time, 233-254 J. Gray, Toward a Mathematical Foundation for Information, 255-294 Flow Security J. Tardo and K. Alagappan, SPX: Global Authentication Using Public Key Certificates, 295-316 P. Syverson, Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols, 317-334 P. Ammann and R. Sandhu, The Extended Schematic Protection Model, 335-384 J. Jacob, Basic Theorems About Security, 385-412 Volume 1, Issue 2Guest Editor: R. Sandhu (CSFW-4)S. Gupta and V. Gligor, Towards a Theory of Penetration-Resistant Systems and its Applications, 133-158 S. Foley, Aggregation and Separation as Noninterference Properties, 159-188 A. Motro, A Unified Model for Security and Integrity in Relational Databases, 189-213 Volume 1, Issue 1C. Meadows, Applying Formal Methods to the Analysis of a Key Management Protocol, 5-36J. McLean, Proving Noninterference and Functional Correctness Using Traces, 37-58 R. Sandhu, Expressive Power of the Schematic Protection Model, 59-98 P. Bieber and F. Cuppens, A Logical View of Secure Dependencies, 99-130 |