Default Cover Image

Computer Security Foundations Workshop, IEEE

June 10 1997 to June 12 1997

Rockport, Massachusetts

ISSN: 1063-6900

ISBN: 0-8186-7990-5

Table of Contents

PrefaceFreely available from IEEE.pp. vii
Workshop Committee WelcomeFreely available from IEEE.pp. viii
Session 1: Protocol Checking in CSP: Chair: Roberto Gorrieri
Verifying authentication protocols with CSPFull-text access may be available. Sign in or learn about subscription options.pp. 3
Session 1: Protocol Checking in CSP: Chair: Roberto Gorrieri
Casper: A Compiler for the Analysis of Security ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 18
Session 1: Protocol Checking in CSP: Chair: Roberto Gorrieri
A Hierarchy of Authentication SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 31
Session 2: Protocol Engineering:Chair: Paul Syverson
Provable Security for Cryptographic Protocols: Exact Analysis and Engineering ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 45
Session 2: Protocol Engineering:Chair: Paul Syverson
Strategies against Replay AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 59
Session 3: Protocol Verification in Higher Order Logic:Chair: Michael Merritt
Proving Properties of Security Protocols by InductionFull-text access may be available. Sign in or learn about subscription options.pp. 70
Session 3: Protocol Verification in Higher Order Logic:Chair: Michael Merritt
Mechanized proofs for a recursive authentication protocolFull-text access may be available. Sign in or learn about subscription options.pp. 84
Panel 1: Languages for Formal Specification of Security Protocols: Moderator: Catherine Meadows
Languages for Formal Specification of Security ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 96
Session 4: Distributed System Security:Chair: Li Gong
On SDSI's Linked Local Name SpacesFull-text access may be available. Sign in or learn about subscription options.pp. 98
Session 4: Distributed System Security:Chair: Li Gong
A Different Look at Secure Distributed ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 109
Session 4: Distributed System Security:Chair: Li Gong
Unreliable Intrusion Detection in Distributed ComputationsFull-text access may be available. Sign in or learn about subscription options.pp. 116
Session 5: Protocol Applications: Chair: Peter Ryan
An Efficient Non-repudiation ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 126
Session 5: Protocol Applications: Chair: Peter Ryan
Towards the Formal Verification of Electronic Commerce ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 133
Session 6: Information Flow:Chair: Stewart Lee
A Theory for System SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 148
Session 6: Information Flow:Chair: Stewart Lee
Eliminating Covert Flows with Minimum TypingsFull-text access may be available. Sign in or learn about subscription options.pp. 156
Panel 2: The Computer Security Foundations Workshop: Ten Years on and Ten Years Ahead
The Computer Security Foundations Workshop: Ten Years on and Ten Years AheadFull-text access may be available. Sign in or learn about subscription options.pp. 170
Session 7: Security Policies:Chair: John McLean
A Logic For State Transformations in Authorization PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 173
Session 7: Security Policies:Chair: John McLean
Separation of Duty in Role-based EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 183
Session 7: Security Policies:Chair: John McLean
Security Engineering of Lattice-Based PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 195
Session 7: Security Policies:Chair: John McLean
Index of AuthorsFreely available from IEEE.pp. 209
Showing 23 out of 23