The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CSFW"( http://dblp.L3S.de/Venues/CSFW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csfw

Publication years (Num. hits)
1988 (17) 1989 (16) 1990 (18) 1991 (31) 1992 (19) 1993 (16) 1994 (20) 1995 (17) 1996 (21) 1997 (20) 1998 (20) 1999 (20) 2000 (24) 2001 (23) 2002 (24) 2003 (18) 2004 (21) 2005 (23) 2006 (26)
Publication types (Num. hits)
inproceedings(375) proceedings(19)
Venues (Conferences, Journals, ...)
CSFW(394)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 262 occurrences of 150 keywords

Results
Found 394 publication records. Showing 394 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Anindya Banerjee 0001, David A. Naumann Secure Information Flow and Pointer Confinement in a Java-like Language. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Security Protocol Design via Authentication Tests. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Vincent Simonet Fine-Grained Information Flow Analysis for a \lambda Calculus with Sum Types. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Pouzol, Mireille Ducassé Formal Specification of Intrusion Signatures and Detection Rules. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Birgit Pfitzmann, Michael Steiner 0001, Michael Waidner Polynomial Fairness and Liveness. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  BibTeX  RDF
1Riccardo Focardi, Sabina Rossi Information Flow Security in Dynamic Contexts. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Dominic Duggan Cryptographic Types. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Somesh Jha, Thomas W. Reps Analysis of SPKI/SDSI Certificates Using Model Checking. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF certificate-chain discovery, certificate-set analysis, model checking, authorization, naming, pushdown system, SPKI/SDSI
1Joseph Y. Halpern, Kevin R. O'Neill Secrecy in Multiagent Systems. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Riccardo Pucella, Vicky Weissman A Logic for Reasoning about Digital Rights. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov A Formal Analysis of Some Properties of Kerberos 5 Using MSR. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Peng Liu 0005, Sushil Jajodia Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Damage Confinement, Database Security, Intrusion Tolerance
1Véronique Cortier, Jonathan K. Millen, Harald Rueß Proving Secrecy is Easy Enough. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Geoffrey Smith 0001 A New Type System for Secure Information Flow. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Joseph Y. Halpern, Ron van der Meyden A Logical Reconstruction of SPKI. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Maritta Heisel, Andreas Pfitzmann, Thomas Santen Confidentiality-Preserving Refinement. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ajay Chander, John C. Mitchell, Drew Dean A State-Transition Model of Trust Management and Access Control. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Eijiro Sumii, Benjamin C. Pierce Logical Relations for Encryption. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  BibTeX  RDF
1Muriel Roger, Jean Goubault-Larrecq Log Auditing through Model-Checking. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Andre Scedrov, Ran Canetti, Joshua D. Guttman, David A. Wagner 0001, Michael Waidner Relating Cryptography and Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic A Compositional Logic for Protocol Correctness. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Somesh Jha, Kymie M. C. Tan, Roy A. Maxion Markov Chains, Classifiers, and Intrusion Detection. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Bruno Blanchet An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Michaël Rusinowitch, Mathieu Turuani Protocol Insecurity with Finite Number of Sessions is NP-Complete. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Olivier Pereira, Jean-Jacques Quisquater A Security Analysis of the Cliques Protocols Suites. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Heiko Mantel, Andrei Sabelfeld A Generic Approach to the Security of Multi-Threaded Programs. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Steve Zdancewic, Andrew C. Myers Robust Declassification. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Sylvan Pinsky, Edward Zieglar Noninterference Equations for Nondeterministic Systems. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera Revocations-A Classification. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Peter Y. A. Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor Non-Interference: Who Needs It? Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Marcelo P. Fiore, Martín Abadi Computing Symbolic Models for Verifying Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Wenliang Du, Mikhail J. Atallah Privacy-Preserving Cooperative Scientific Computations. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Andrew D. Gordon 0001, Alan Jeffrey Authenticity by Typing for Security Protocols. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1James Heather, Gavin Lowe, Steve A. Schneider How to Prevent Type Flaw Attacks on Security Protocols. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ernie Cohen TAPS: A First-Order Verifier for Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Adrian Perrig, Dawn Song Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Grit Denker, Jonathan K. Millen, Antonio Grau, Juliana Küster Filipe Optimizing Protocol Rewrite Rules of CIL Specifications. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jonathan K. Millen, Rebecca N. Wright Reasoning about Trust and Insurance in a Public Key Infrastructure. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cryptography, trust, logic, certificate, public key infrastructure, insurance
1Mads Dam, Pablo Giambiagi Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF information flow, confidentiality, Mobile code
1Günter Karjoth An Operational Semantics of Java 2 Access Control. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Peter Sewell, Jan Vitek Secure Composition of Untrusted Code: Wrappers and Causality Types. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ninghui Li Local Names in SPKI/SDSI. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF SDSI, access control, logic programming, authorization, security policies, trust management, SPKI
1Joshua D. Guttman, F. Javier Thayer Protocol Independence through Disjoint Encryption. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli Information Flow Analysis in a Discrete-Time Process Algebra. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Security, Real-time, Process Algebra, Non interference
1Heiko Mantel Possibilistic Definitions of Security - An Assembly Kit. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF information flow, security models, non-interference
1 Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, Cambridge, England, UK, July 3-5, 2000 Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  BibTeX  RDF
1Anthony E. Sale Lorenz and Colossus. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Dennis M. Volpano Secure Introduction of One-Way Functions. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Teresa F. Lunt Foundations for Intrusion Detection?. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Andrei Sabelfeld, David Sands 0001 Probabilistic Noninterference for Multi-Threaded Programs. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF probabilistic bisimulation, probabilistic scheduling, probabilistic covert channels, hook-up, type-system-based analysis, semantics, confidentiality, noninterference
1Luigia Carlucci Aiello, Fabio Massacci An Executable Specification Language for Planning Attacks to Security Protocols. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Model Checking, Verification, Logic Programs, Planning, Specification Language, Security Protocols
1Tuomas Aura, Matt Bishop, Dean Sniegowski Analyzing Single-Server Network Inhibition. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Anthony H. Dekker C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptographic protocol, soundness, theorem prover, belief logic
1Catherine Meadows 0001 Invariant Generation Techniques in Cryptographic Protocol Analysis. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1James Heather, Steve A. Schneider Towards Automatic Verification of Authentication Protocols on an Unbounded Network. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Pankaj Kakkar, Carl A. Gunter, Martín Abadi Reasoning about Secrecy for Active Networks. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Iliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov Relating Strands and Multiset Rewriting for Security Protocol Analysis. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Elena Ferrari, Francesco Buccafurri, Pasquale Rullo A Logical Framework for Reasoning on Data Access Control Policies. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Dawn Xiaodong Song Athena: A New Efficient Automatic Checker for Security Protocol Analysis. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Colin O'Halloran Trusted System Construction. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Joseph Y. Halpern, Ron van der Meyden A Logic for SDSI's Linked Local Name Spaces. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami Authentication via Localized Names. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Local Environments, Mobility, Authentication, Concurrency, Process Algebras
1Pierre Bieber Security Function Interactions. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Access Control, Formal methods, Computer security
1Nancy A. Lynch I/O Automaton Models and Proofs for Shared-Key Communication Systems. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Mei Lin Hui, Gavin Lowe Safe Simplifying Transformations for Security Protocols. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1A. W. Roscoe 0001, M. H. Goldsmith What Is Intransitive Noninterference? Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Alfred P. Maneki Honest Functions and their Application to the Analysis of Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Peter Y. A. Ryan, Steve A. Schneider Process Algebra and Non-Interference. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1David Monniaux Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF formal methods, cryptographic protocols, forward chaining, BAN logic
1Ninghui Li, Joan Feigenbaum, Benjamin N. Grosof A Logic-based Knowledge Representation for Authorization with Delegation. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF non-monotonicity, conflict handling, knowledge representation, logic programs, Authorization, security policy, trust management, delegation
1Dennis M. Volpano Formalization and Proof of Secrecy Properties. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Antonio Durante, Riccardo Focardi, Roberto Gorrieri CVS: A Compiler for the Analysis of Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authentication, Process Algebras, Automatic Verification, Non-Interference
1Catherine Meadows 0001 A Formal Framework and Evaluation Method for Network Denial of Service. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov A Meta-Notation for Protocol Analysis. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 12th IEEE Computer Security Foundations Workshop, CSFW 1999, Mordano, Italy, June 28-30, 1999 Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  BibTeX  RDF
1Peter Sewell, Jan Vitek Secure Composition of Insecure Components. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman Mixed Strand Spaces. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia, Luigi V. Mancini, Sanjeev Setia A Fair Locking Protocol for Multilevel Secure Databases. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Steve A. Schneider Formal Analysis of a Non-Repudiation Protocol. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998 Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  BibTeX  RDF
1Tuomas Aura On the Structure of Delegation Networks. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Laurence Cholvy, Claire Saurel, Jérôme Carrère Merging Security Policies: Analysis of a Practical Example. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell Panel Introduction: The Security Impact of Distributed Computing Technologies. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Stephen H. Brackin Evaluating and Improving Protocol Analysis by Automatic Proof. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Vitaly Shmatikov, Ulrich Stern Efficient Finite-State Analysis for Large Security Protocols. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Dennis M. Volpano, Geoffrey Smith 0001 Probabilistic Noninterference in a Concurrent Language. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli Partial Model Checking and Theorem Proving for Ensuring Security Properties. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1A. W. Roscoe 0001 Proving Security Protocols with Model Checkers by Data Independence Techniques. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Gavin Lowe Towards a Completeness Result for Model Checking of Security Protocols. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Aris Zakinthinos, E. Stewart Lee Composing Secure Systems that have Emergent Properties. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Paul F. Syverson Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Martín Abadi Two Facets of Authentication. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Levente Buttyán, Sebastian Staamann, Uwe G. Wilhelm A Simple Logic for Authentication Protocol Design. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman Honest Ideals on Strand Spaces. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows 0001 Panel Introduction: Varieties of Authentication. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Raymond W. Yip, Karl N. Levitt Data Level Inference Detection in Database Systems. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Jia-Ling Lin, Xiaoyang Sean Wang, Sushil Jajodia Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Kan Zhang A Theory for System Security. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 394 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license