


default search action
28th CSF 2015: Verona, Italy
- Cédric Fournet, Michael W. Hicks, Luca Viganò:

IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7538-2 - Carlos Cotrini Jiménez, Thilo Weghorn, David A. Basin, Manuel Clavel:

Analyzing First-Order Role Based Access Control. 3-17 - William C. Garrison III, Adam J. Lee

:
Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations. 18-32 - Stefano Calzavara

, Alvise Rabitti, Michele Bugliesi
:
Compositional Typed Analysis of ARBAC Policies. 33-45 - Anna Lisa Ferrara, Georg Fuchsbauer, Bin Liu, Bogdan Warinschi:

Policy Privacy in Cryptographic Access Control. 46-60 - Hoa Ngo, Jong Kim:

Location Privacy via Differential Private Perturbation of Cloaking Area. 63-74 - Martin Pettai, Peeter Laud

:
Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active Adversaries. 75-89 - Michela Chessa, Jens Grossklags, Patrick Loiseau:

A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications. 90-104 - Joshua D. Guttman

, Paul D. Rowe:
A Cut Principle for Information Flow. 107-121 - Niklas Broberg, Bart van Delft, David Sands:

The Anatomy and Facets of Dynamic Policies. 122-136 - Aslan Askarov, Stephen Chong, Heiko Mantel:

Hybrid Monitors for Concurrent Noninterference. 137-151 - Gurchetan S. Grewal, Mark Dermot Ryan

, Liqun Chen
, Michael R. Clarkson:
Du-Vote: Remote Electronic Voting with Untrusted Computers. 155-169 - Rémy Chrétien, Véronique Cortier, Stéphanie Delaune:

Decidability of Trace Equivalence for Protocols with Nonces. 170-184 - Alessandro Bruni, Sebastian Mödersheim

, Flemming Nielson
, Hanne Riis Nielson
:
Set-Pi: Set Membership p-Calculus. 185-198 - David A. Basin, Sasa Radomirovic

, Michael Schläpfer:
A Complete Characterization of Secure Human-Server Communication. 199-213 - Christian Matt

, Ueli Maurer:
A Definitional Framework for Functional Encryption. 217-231 - Edelmira Pasarella, Jorge Lobo

:
Reasoning about Policy Behavior in Logic-Based Trust Management Systems: Some Complexity Results and an Operational Framework. 232-242 - M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa:

Picking vs. Guessing Secrets: A Game-Theoretic Analysis. 243-257 - Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha

:
Program Actions as Actual Causes: A Building Block for Accountability. 261-275 - Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici:

BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. 276-289 - David Nuñez

, Isaac Agudo, Javier López:
A Parametric Family of Attack Models for Proxy Re-encryption. 290-301 - Ralf Küsters, Tomasz Truderung, Bernhard Beckert

, Daniel Bruns
, Michael Kirsten
, Martin Mohr:
A Hybrid Approach for Proving Noninterference of Java Programs. 305-319 - Alessandro Armando

, Roberto Carbone
, Gabriele Costa
, Alessio Merlo:
Android Permissions Unleashed. 320-333 - Aslan Askarov, Scott Moore, Christos Dimoulas

, Stephen Chong:
Cryptographic Enforcement of Language-Based Information Erasure. 334-348 - Daniel Hedin, Luciano Bello, Andrei Sabelfeld:

Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language. 351-365 - Vineet Rajani

, Abhishek Bichhawat, Deepak Garg, Christian Hammer
:
Information Flow Control for Event Handling and the DOM in Web Browsers. 366-379 - Christian Müller

, Máté Kovács, Helmut Seidl:
An Analysis of Universal Information Flow Based on Self-Composition. 380-393 - Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor:

On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. 397-411 - Michael Backes, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi, Kim Pecina:

Symbolic Malleable Zero-Knowledge Proofs. 412-426 - Adam Petcher, Greg Morrisett:

A Mechanized Proof of Security for Searchable Symmetric Encryption. 481-494 - Kui Xu, Danfeng (Daphne) Yao

, Barbara G. Ryder, Ke Tian:
Probabilistic Program Modeling for High-Precision Anomaly Classification. 497-511 - Limin Jia

, Shayak Sen, Deepak Garg, Anupam Datta:
A Logic of Programs with Interface-Confined Code. 512-525 - Goran Doychev, Boris Köpf:

Rational Protection against Timing Attacks. 526-536 - Daniel Schoepe, Andrei Sabelfeld:

Understanding and Enforcing Opacity. 539-553 - Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing:

A Methodology for Information Flow Experiments. 554-568 - Owen Arden, Jed Liu, Andrew C. Myers:

Flow-Limited Authorization. 569-583

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














