Linked e-resources
Details
Table of Contents
Information Flow
Faceted Dynamic Information Flow via Control and Data Monads
Asymmetric Secure Multi-execution with Declassification
A Taxonomy of Information Flow Monitors
On Improvements of Low-Deterministic Security
Tool Demonstration: JOANA
Models and Applications
Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study
Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels
Correct Audit Logging: Theory and Practice
The Value of Attack-Defence Diagrams
Protocols
Composing protocols with randomized actions
Bounding the number of agents, for equivalence too
AIF-omega: Set-Based Protocol Abstraction with Countable Families
Computational Soundness Results for Stateful Applied pi Calculus. .
Faceted Dynamic Information Flow via Control and Data Monads
Asymmetric Secure Multi-execution with Declassification
A Taxonomy of Information Flow Monitors
On Improvements of Low-Deterministic Security
Tool Demonstration: JOANA
Models and Applications
Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study
Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels
Correct Audit Logging: Theory and Practice
The Value of Attack-Defence Diagrams
Protocols
Composing protocols with randomized actions
Bounding the number of agents, for equivalence too
AIF-omega: Set-Based Protocol Abstraction with Countable Families
Computational Soundness Results for Stateful Applied pi Calculus. .