Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/fmse-ws:"
@inproceedings{DBLP:conf/ccs/ArmandoCCCT08, author = {Alessandro Armando and Roberto Carbone and Luca Compagna and Jorge Cu{\'{e}}llar and Llanos Tobarra}, editor = {Vitaly Shmatikov}, title = {Formal analysis of {SAML} 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps}, booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {1--10}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456396.1456397}, doi = {10.1145/1456396.1456397}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmandoCCCT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KrishnanNSW08, author = {Ram Krishnan and Jianwei Niu and Ravi S. Sandhu and William H. Winsborough}, editor = {Vitaly Shmatikov}, title = {Stale-safe security properties for group-based secure information sharing}, booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {53--62}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456396.1456402}, doi = {10.1145/1456396.1456402}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KrishnanNSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/McCarthyK08, author = {Jay A. McCarthy and Shriram Krishnamurthi}, editor = {Vitaly Shmatikov}, title = {Minimal backups of cryptographic protocol runs}, booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {11--20}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456396.1456398}, doi = {10.1145/1456396.1456398}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/McCarthyK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/McDermottF08, author = {John P. McDermott and Leo Freitas}, editor = {Vitaly Shmatikov}, title = {A formal security policy for xenon}, booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {43--52}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456396.1456401}, doi = {10.1145/1456396.1456401}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/McDermottF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PoturalskiPH08a, author = {Marcin Poturalski and Panagiotis Papadimitratos and Jean{-}Pierre Hubaux}, editor = {Vitaly Shmatikov}, title = {Towards provable secure neighbor discovery in wireless networks}, booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {31--42}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456396.1456400}, doi = {10.1145/1456396.1456400}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PoturalskiPH08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouLL08, author = {Ti Zhou and Mengjun Li and Zhoujun Li}, editor = {Vitaly Shmatikov}, title = {Local abstract verification and refinement of security protocols}, booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {21--30}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456396.1456399}, doi = {10.1145/1456396.1456399}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2008fmse, editor = {Vitaly Shmatikov}, title = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-288-7}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2008fmse.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AmtoftB07, author = {Torben Amtoft and Anindya Banerjee}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Verification condition generation for conditional information flow}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {2--11}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314438}, doi = {10.1145/1314436.1314438}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AmtoftB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesCFM07, author = {Michael Backes and Agostino Cortesi and Riccardo Focardi and Matteo Maffei}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {A calculus of challenges and responses}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {51--60}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314444}, doi = {10.1145/1314436.1314444}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BackesCFM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrunelCCSB07, author = {Julien Brunel and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Thierry Sans and Jean{-}Paul Bodeveix}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Security policy compliance with violation management}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {31--40}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314441}, doi = {10.1145/1314436.1314441}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrunelCCSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrunsDH07, author = {Glenn Bruns and Daniel S. Dantas and Michael Huth}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {A simple and expressive semantic framework for policy composition in access control}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {12--21}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314439}, doi = {10.1145/1314436.1314439}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BrunsDH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaprettaSFM07, author = {Venanzio Capretta and Bernard Stepien and Amy P. Felty and Stan Matwin}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Formal correctness of conflict detection for firewalls}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {22--30}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314440}, doi = {10.1145/1314436.1314440}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaprettaSFM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KurtzKW07, author = {Klaas Ole K{\"{u}}rtz and Ralf K{\"{u}}sters and Thomas Wilke}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Selecting theories and nonce generation for recursive protocols}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {61--70}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314445}, doi = {10.1145/1314436.1314445}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KurtzKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Lewis07, author = {Jeff Lewis}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Cryptol: specification, implementation and verification of high-grade cryptographic applications}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {41}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314442}, doi = {10.1145/1314436.1314442}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Lewis07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/McLean07, author = {John McLean}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Formal methods in security engineering: where we've been, where we are, where we need to go}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {1}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314437}, doi = {10.1145/1314436.1314437}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/McLean07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OliveiraWKK07, author = {Anderson Santana de Oliveira and Eric Ke Wang and Claude Kirchner and H{\'{e}}l{\`{e}}ne Kirchner}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Weaving rewrite-based access control policies}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {71--80}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314446}, doi = {10.1145/1314436.1314446}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OliveiraWKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SinghRRSW07, author = {Anu Singh and C. R. Ramakrishnan and I. V. Ramakrishnan and Scott D. Stoller and David Scott Warren}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Security policy analysis using deductive spreadsheets}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {42--50}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314443}, doi = {10.1145/1314436.1314443}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SinghRRSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2007fmse, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-887-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2007fmse.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesHMU05, author = {Michael Backes and Dennis Hofheinz and J{\"{o}}rn M{\"{u}}ller{-}Quade and Dominique Unruh}, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {On fairness in simulatability-based cryptographic systems}, booktitle = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {13--22}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103576.1103579}, doi = {10.1145/1103576.1103579}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesHMU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChapinSW05, author = {Peter C. Chapin and Christian Skalka and Xiaoyang Sean Wang}, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {Risk assessment in distributed authorization}, booktitle = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {33--42}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103576.1103581}, doi = {10.1145/1103576.1103581}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChapinSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChaudhuriA05, author = {Avik Chaudhuri and Mart{\'{\i}}n Abadi}, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {Formal security analysis of basic network-attached storage}, booktitle = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {43--52}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103576.1103583}, doi = {10.1145/1103576.1103583}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChaudhuriA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EscobarMM05, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {A rewriting-based inference system for the {NRL} protocol analyzer: grammar generation}, booktitle = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {1--12}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103576.1103578}, doi = {10.1145/1103576.1103578}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EscobarMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GarciaHPR05, author = {Flavio D. Garcia and Ichiro Hasuo and Wolter Pieters and Peter van Rossum}, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {Provable anonymity}, booktitle = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {63--72}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103576.1103585}, doi = {10.1145/1103576.1103585}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GarciaHPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuptaS05, author = {Prateek Gupta and Vitaly Shmatikov}, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {Towards computationally sound symbolic analysis of key exchange protocols}, booktitle = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {23--32}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103576.1103580}, doi = {10.1145/1103576.1103580}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuptaS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KaushikWWA05, author = {Saket Kaushik and William H. Winsborough and Duminda Wijesekera and Paul Ammann}, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {Email feedback: a policy-based approach to overcoming false positives}, booktitle = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {73--82}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103576.1103586}, doi = {10.1145/1103576.1103586}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KaushikWWA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Mantel05, author = {Heiko Mantel}, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {The framework of selective interleaving functions and the modular assembly kit}, booktitle = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {53--62}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103576.1103584}, doi = {10.1145/1103576.1103584}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Mantel05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2005fmse, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-231-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2005fmse.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BartheN04, author = {Gilles Barthe and Leonor Prensa Nieto}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Formally verifying information flow type systems for concurrent and thread systems}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {13--22}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029136}, doi = {10.1145/1029133.1029136}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BartheN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BugliesiFM04, author = {Michele Bugliesi and Riccardo Focardi and Matteo Maffei}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Authenticity by tagging and typing}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {1--12}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029135}, doi = {10.1145/1029133.1029135}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BugliesiFM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CorinEHM04, author = {Ricardo Corin and Sandro Etalle and Pieter H. Hartel and Angelika Mader}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Timed model checking of security protocols}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {23--32}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029137}, doi = {10.1145/1029133.1029137}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CorinEHM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DoanDTK04, author = {Thuong Doan and Steven A. Demurjian and T. C. Ting and Andreas Ketterl}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {{MAC} and {UML} for secure software design}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {75--85}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029144}, doi = {10.1145/1029133.1029144}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DoanDTK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DungT04, author = {Phan Minh Dung and Phan Minh Thang}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Stepwise development of security protocols: a speech act-oriented approach}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {33--44}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029139}, doi = {10.1145/1029133.1029139}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DungT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Hashii04, author = {Brant Hashii}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Lessons learned using alloy to formally specify {MLS-PCA} trusted security architecture}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {86--95}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029145}, doi = {10.1145/1029133.1029145}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Hashii04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/UribeC04, author = {Tom{\'{a}}s E. Uribe and Steven Cheung}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Automatic analysis of firewall and network intrusion detection system configurations}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {66--74}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029143}, doi = {10.1145/1029133.1029143}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/UribeC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangWJ04, author = {Lingyu Wang and Duminda Wijesekera and Sushil Jajodia}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {A logic-based framework for attribute based access control}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {45--55}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029140}, doi = {10.1145/1029133.1029140}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangWJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangRG04, author = {Nan Zhang and Mark Ryan and Dimitar P. Guelev}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Synthesising verified access control systems in {XACML}}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {56--65}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029141}, doi = {10.1145/1029133.1029141}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangRG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2004, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, publisher = {{ACM}}, year = {2004}, url = {http://dl.acm.org/citation.cfm?id=1030083}, isbn = {1-58113-971-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlghathbarW03, author = {Khaled Alghathbar and Duminda Wijesekera}, editor = {Michael Backes and David A. Basin}, title = {authUML: a three-phased framework to analyze access control specifications in use cases}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {77--86}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035438}, doi = {10.1145/1035429.1035438}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlghathbarW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesMM03, author = {Michael Backes and Catherine Meadows and John C. Mitchell}, editor = {Michael Backes and David A. Basin}, title = {Relating cryptography and formal methods: a panel}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {61--66}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035436}, doi = {10.1145/1035429.1035436}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BackesMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BraynovJ03, author = {Sviatoslav B. Braynov and Murtuza Jadliwala}, editor = {Michael Backes and David A. Basin}, title = {Representation and analysis of coordinated attacks}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {43--51}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035434}, doi = {10.1145/1035429.1035434}, timestamp = {Fri, 08 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BraynovJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DattaDMP03, author = {Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic}, editor = {Michael Backes and David A. Basin}, title = {Secure protocol composition}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {11--23}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035431}, doi = {10.1145/1035429.1035431}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DattaDMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HamdiB03, author = {Mohamed Hamdi and Noureddine Boudriga}, editor = {Michael Backes and David A. Basin}, title = {Algebraic specification of network security risk management}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {52--60}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035435}, doi = {10.1145/1035429.1035435}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HamdiB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HansenS03, author = {Michael R. Hansen and Robin Sharp}, editor = {Michael Backes and David A. Basin}, title = {Using interval logics for temporal analysis of security protocols}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {24--31}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035432}, doi = {10.1145/1035429.1035432}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HansenS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KochP03, author = {Manuel Koch and Francesco Parisi{-}Presicce}, editor = {Michael Backes and David A. Basin}, title = {Formal access control analysis in the software development process}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {67--76}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035437}, doi = {10.1145/1035429.1035437}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KochP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SieweCZ03, author = {Fran{\c{c}}ois Siewe and Antonio Cau and Hussein Zedan}, editor = {Michael Backes and David A. Basin}, title = {A compositional framework for access control policies enforcement}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {32--42}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035433}, doi = {10.1145/1035429.1035433}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SieweCZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouF03, author = {Hongbin Zhou and Simon N. Foley}, editor = {Michael Backes and David A. Basin}, title = {Fast automatic synthesis of security protocols using backward search}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {1--10}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035430}, doi = {10.1145/1035429.1035430}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2003fmse, editor = {Michael Backes and David A. Basin}, title = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, publisher = {{ACM}}, year = {2003}, isbn = {1-58113-781-8}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2003fmse.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.