2012 IEEE 25th Computer Security Foundations Symposium (CSF) : 25 - 27 June 2012, Cambridge, Massachusetts, USA ; [proceedings] (Englisch)

IEEE Computer Security Foundations Symposium ; 25; 2012; Cambridge, Mass.
IEEE , Piscataway, NJ; 2012
  • Neue Suche nach: IEEE
Wie erhalte ich diesen Titel?

Dokumentinformationen

  • Titel:
    2012 IEEE 25th Computer Security Foundations Symposium (CSF) : 25 - 27 June 2012, Cambridge, Massachusetts, USA ; [proceedings]
  • Kongress:
    IEEE Computer Security Foundations Symposium ; 25; 2012; Cambridge, Mass.
    CSF ; 25; 2012; Cambridge, Mass.
  • Verlag:
    IEEE
  • Erscheinungsort:
    Piscataway, NJ
  • Erscheinungsjahr:
    2012
  • Format / Umfang:
    Online-Ressource
  • Anmerkungen:
    graph. Darst.
    Literaturangaben
  • ISBN:
  • Medientyp:
    Konferenzband
  • Format:
    Elektronische Ressource
  • Sprache:
    Englisch
  • Schlagwörter:
  • Klassifikation:
    BKL:    54.38 Computersicherheit

Inhaltsverzeichnis Konferenzband

Das Inhaltsverzeichnis des Konferenzbandes wird automatisch erzeugt, daher kann es lückenhaft sein, obwohl alle Artikel in der TIB verfügbar sind.

3
Information-Flow Security for a Core of JavaScript
Hedin, Daniel / Sabelfeld, Andrei | 2012
19
Secure Information Flow for Concurrent Programs under Total Store Order
Vaughan, Jeffrey A. / Millstein, Todd | 2012
30
ENCoVer: Symbolic Exploration for Information Flow Security
Balliu, Musard / Dam, Mads / Guernic, Gurvan Le | 2012
45
Information-Flow Control for Programming on Encrypted Data
Mitchell, John C. / Sharma, Rahul / Stefan, Deian / Zimmerman, Joe | 2012
63
Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings
Pankova, Alisa / Laud, Peeter | 2012
78
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
Schmidt, Benedikt / Meier, Simon / Cremers, Cas / Basin, David | 2012
95
Verifying Privacy-Type Properties in a Modular Way
Arapinis, Myrto / Cheval, Vincent / Delaune, Stephanie | 2012
113
Security Analysis of Role-Based Access Control through Program Verification
Ferrara, Anna Lisa / Madhusudan, P. / Parlato, Gennaro | 2012
126
Gran: Model Checking Grsecurity RBAC Policies
Bugliesi, Michele / Calzavara, Stefano / Focardi, Riccardo / Squarcina, Marco | 2012
139
Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction
Genovese, Valerio / Garg, Deepak / Rispoli, Daniele | 2012
157
Mashic Compiler: Mashup Sandboxing Based on Inter-frame Communication
Luo, Zhengqin / Rezk, Tamara | 2012
171
Secure Compilation to Modern Processors
Agten, Pieter / Strackx, Raoul / Jacobs, Bart / Piessens, Frank | 2012
186
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization
Barthe, Gilles / Betarte, Gustavo / Campo, Juan Diego / Luna, Carlos | 2012
198
A Framework for the Cryptographic Verification of Java-Like Programs
Kusters, Ralf / Truderung, Tomasz / Graf, Jurgen | 2012
215
Constructing Optimistic Multi-party Contract Signing Protocols
Kordy, Barbara / Radomirovic, Saa | 2012
230
Refining Key Establishment
Sprenger, Christoph / Basin, David | 2012
247
Discovering Concrete Attacks on Website Authorization by Formal Analysis
Bansal, Chetan / Bhargavan, Karthikeyan / Maffeis, Sergio | 2012
265
Measuring Information Leakage Using Generalized Gain Functions
Alvim, M'rio S. / Chatzikokolakis, Kostas / Palamidessi, Catuscia / Smith, Geoffrey | 2012
280
The Thermodynamics of Confidentiality
Malacaria, Pasquale / Smeraldi, Fabrizio | 2012
293
Securing Interactive Programs
Rafnsson, Willard / Hedin, Daniel / Sabelfeld, Andrei | 2012
308
Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies
Askarov, Aslan / Chong, Stephen | 2012
325
Automatically Verified Mechanized Proof of One-Encryption Key Exchange
Blanchet, Bruno | 2012
340
Generic Indifferentiability Proofs of Hash Designs
Daubignard, Marion / Fouque, Pierre-Alain / Lakhnech, Yassine | 2012
354
Verified Security of Merkle-Damgård
Backes, Michael / Barthe, Gilles / Berg, Matthias / Gregoire, Benjamin / Kunz, Cesar / Skoruppa, Malte / Beguelin, Santiago Zanella | 2012
369
Provably Secure and Practical Onion Routing
Backes, Michael / Goldberg, Ian / Kate, Aniket / Mohammadi, Esfandiar | 2012
387
Author Index
| 2012
388
Publisher's Information
| 2012
i
Title Page i
| 2012
iii
Title Page iii
| 2012
iv
Copyright Page
| 2012
ix
Committees
| 2012
v
Table of Contents
| 2012
viii
Preface
| 2012
xi
External Reviewers
| 2012