Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CSF
CSF 2013
Generate Citations
2013 IEEE 26th Computer Security Foundations Symposium (CSF)
June 26 2013 to June 28 2013
New Orleans, LA, USA
Table of Contents
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-vi
Preface
Freely available from IEEE.
pp. vii-vii
by
Stephen Chong
Committees
Freely available from IEEE.
pp. viii-ix
Reviewers
Freely available from IEEE.
pp. x-x
A Theory of Information-Flow Labels
Freely available from IEEE.
pp. 3-17
by
Benoît Montagu
,
Benjamin C. Pierce
,
Randy Pollack
Precise Enforcement of Confidentiality for Reactive Systems
Freely available from IEEE.
pp. 18-32
by
Dante Zanarini
,
Mauro Jaskelioff
,
Alejandro Russo
Secure Multi-execution: Fine-Grained, Declassification-Aware, and Transparent
Freely available from IEEE.
pp. 33-48
by
Willard Rafnsson
,
Andrei Sabelfeld
Memory Trace Oblivious Program Execution
Freely available from IEEE.
pp. 51-65
by
Chang Liu
,
Michael Hicks
,
Elaine Shi
Oblivious Program Execution and Path-Sensitive Non-interference
Freely available from IEEE.
pp. 66-80
by
Jérémy Planul
,
John C Mitchell
Security and Privacy by Declarative Design
Freely available from IEEE.
pp. 81-96
by
Matteo Maffei
,
Kim Pecina
,
Manuel Reinert
Type-Based Analysis of Generic Key Management APIs
Freely available from IEEE.
pp. 97-111
by
Pedro Adão
,
Riccardo Focardi
,
Flaminia L. Luccio
Cryptographically Enforced RBAC
Freely available from IEEE.
pp. 115-129
by
Anna Lisa Ferrara
,
Georg Fuchsbauer
,
Bogdan Warinschi
Quantum Information-Flow Security: Noninterference and Access Control
Freely available from IEEE.
pp. 130-144
by
Mingsheng Ying
,
Yuan Feng
,
Nengkun Yu
Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness
Freely available from IEEE.
pp. 145-160
by
Timothy L. Hinrichs
,
Diego Martinoia
,
William C. Garrison III
,
Adam J. Lee
,
Alessandro Panebianco
,
Lenore Zuck
AnoA: A Framework for Analyzing Anonymous Communication Protocols
Freely available from IEEE.
pp. 163-178
by
Michael Backes
,
Aniket Kate
,
Praveen Manoharan
,
Sebastian Meiser
,
Esfandiar Mohammadi
A Trust Framework for Evaluating GNSS Signal Integrity
Freely available from IEEE.
pp. 179-192
by
Xihui Chen
,
Gabriele Lenzini
,
Miguel Martins
,
Sjouke Mauw
,
Jun Pang
Probabilistic Point-to-Point Information Leakage
Freely available from IEEE.
pp. 193-205
by
Tom Chothia
,
Yusuke Kawamoto
,
Chris Novakovic
,
David Parker
Information Flow Analysis for a Dynamically Typed Language with Staged Metaprogramming
Freely available from IEEE.
pp. 209-223
by
Martin Lester
,
Luke Ong
,
Max Schaefer
Gradual Security Typing with References
Freely available from IEEE.
pp. 224-239
by
Luminous Fennell
,
Peter Thiemann
Hybrid Information Flow Monitoring against Web Tracking
Freely available from IEEE.
pp. 240-254
by
Frederic Besson
,
Nataliia Bielova
,
Thomas Jensen
Symbolic Universal Composability
Freely available from IEEE.
pp. 257-271
by
Florian Böhl
,
Dominique Unruh
Differential Privacy by Typing in Security Protocols
Freely available from IEEE.
pp. 272-286
by
Fabienne Eigner
,
Matteo Maffei
Verified Computational Differential Privacy with Applications to Smart Metering
Freely available from IEEE.
pp. 287-301
by
Gilles Barthe
,
George Danezis
,
Benjamin Grégoire
,
César Kunz
,
Santiago Zanella-Béguelin
Author index
Freely available from IEEE.
pp. 303-303
[Publisher's information]
Freely available from IEEE.
pp. 304-304
Showing 27 out of 27