default search action
27th CSF 2014: Vienna, Austria
- IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4290-9
Software Security
- Christos Dimoulas, Scott Moore, Aslan Askarov, Stephen Chong:
Declarative Policies for Capability Control. 3-17 - Joshua A. Kroll, Gordon Stewart, Andrew W. Appel:
Portable Software Fault Isolation. 18-32 - Radha Jagadeesan, C. M. Lubinski, Corin Pitcher, James Riely, Charles Winebrinner:
Certificates for Verifiable Forensics. 33-47 - Andrey Chudnov, George Kuan, David A. Naumann:
Information Flow Monitoring as Abstract Interpretation for Relational Logic. 48-62
Information Flow I
- Pablo Buiras, Deian Stefan, Alejandro Russo:
On Dynamic Flow-Sensitive Floating-Label Systems. 65-79 - Heiko Mantel, Matthias Perner, Jens Sauer:
Noninterference under Weak Memory Models. 80-94
Usable Security
- Marian Harbach, Sascha Fahl, Matthew Smith:
Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness. 97-110 - Jens Grossklags, David Reitter:
How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of Timing. 111-122
Cryptography I
- Jason Crampton, Alexandre Pinto:
Attribute-Based Encryption for Access Control Using Elementary Operations. 125-139 - Alex J. Malozemoff, Jonathan Katz, Matthew D. Green:
Automated Analysis and Synthesis of Block-Cipher Modes of Operation. 140-152 - Joseph A. Akinyele, Gilles Barthe, Benjamin Grégoire, Benedikt Schmidt, Pierre-Yves Strub:
Certified Synthesis of Efficient Batch Verifiers. 153-165
Cryptography II
- Chris Culnane, Steve A. Schneider:
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems. 169-183 - Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen:
From Input Private to Universally Composable Secure Multi-party Computation Primitives. 184-198 - Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. 199-213
Protocol Verification
- Daniel J. Dougherty, Joshua D. Guttman:
Decidability for Lightweight Diffie-Hellman Protocols. 217-231 - Moses D. Liskov, F. Javier Thayer:
Modeling Diffie-Hellman Derivability for Automated Analysis. 232-243 - David A. Basin, Cas Cremers, Marko Horvat:
Actor Key Compromise: Consequences and Countermeasures. 244-258 - Sebastian Mödersheim, Georgios Katsoris:
A Sound Abstraction of the Parsing Problem. 259-273
Information Flow II
- Willard Rafnsson, Andrei Sabelfeld:
Compositional Information-Flow Security for Interactive Systems. 277-292 - Mathy Vanhoef, Willem De Groef, Dominique Devriese, Frank Piessens, Tamara Rezk:
Stateful Declassification Policies for Event-Driven Programs. 293-307 - Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith:
Additive and Multiplicative Notions of Leakage, and Their Capacities. 308-322
Network Security
- Benjamin Johnson, Aron Laszka, Jens Grossklags:
The Complexity of Estimating Systematic Risk in Networks. 325-336 - Roberto Vigo, Flemming Nielson, Hanne Riis Nielson:
Automated Generation of Attack Trees. 337-350 - Pedro Adão, Claudio Bozzato, G. Dei Rossi, Riccardo Focardi, Flaminia L. Luccio:
Mignis: A Semantic Based Tool for Firewall Configuration. 351-365 - Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro Tempesta:
Provably Sound Browser-Based Enforcement of Web Session Integrity. 366-380
Privacy I
- Michael Backes, Praveen Manoharan, Esfandiar Mohammadi:
TUC: Time-Sensitive and Modular Analysis of Anonymous Communication. 383-397 - Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C. Pierce, Aaron Roth:
Differential Privacy: An Economic Method for Choosing Epsilon. 398-410 - Gilles Barthe, Marco Gaboardi, Emilio Jesús Gallego Arias, Justin Hsu, César Kunz, Pierre-Yves Strub:
Proving Differential Privacy in Hoare Logic. 411-424
Privacy II
- Jia Liu, Mark Dermot Ryan, Liqun Chen:
Balancing Societal Security and Individual Privacy: Accountable Escrow System. 427-440
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.