POST 2014 Accepted Papers

Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti and David Basin. Decentralized Composite Access Control

David Lubicz, Graham Steel and Marion Daubignard. A Secure Key Management Interface with Asymmetric Cryptography

Ralf Kuesters, Enrico Scapin, Tomasz Truderung and Juergen Graf. Extending and Applying a Framework for the Cryptographic Verification of Java Programs

Gilles Barthe, Boris Köpf, Laurent Mauborgne and Martin Ochoa. Leakage Resilience against Concurrent Cache Attacks

Florian Arnold, Holger Hermanns, Reza Pulungan and Marielle I A Stoelinga. Time-Dependent Analysis of Attacks

Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer. Information Flow Control in WebKit’s JavaScript Bytecode

Rohit Chadha, Dileep Kini and Mahesh Viswanathan. Quantitative Information Flow in Boolean Programs

Jed Liu and Andrew Myers. Defining and Enforcing Referential Security

Annabelle McIver, Carroll Morgan, Geoffrey Smith, Barbara Espinoza and Larissa Meinicke. Abstract channels and their robust information-leakage ordering

Michael Backes, Esfandiar Mohammadi and Tim Ruffing. Computational Soundness Results for ProVerif: Bridging the Gap from Trace Properties to Uniformity

David Baelde, Stéphanie Delaune and Lucca Hirschi. A reduced semantics for deciding trace equivalence using constraint systems

Myrto Arapinis, Jia Liu, Eike Ritter and Mark Ryan. Stateful Applied Pi Calculus

Mario S. Alvim, Fred B. Schneider and Andre Scedrov. When not all bits are equal: worth-based information flow

Manuel Barbosa, David Castro and Paulo Silva. Compiling CAO: from Cryptographic Specifications to C Implementations

Michael Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe and Cesar Sanchez. Temporal Logics for Hyperproperties

David Costanzo and Zhong Shao. A Separation Logic for Enforcing Declarative Information Flow Control Policies

Who's online

We have 9 guests and no members online

Site Hosted by