Search dblp for Publications

export results for "stream:streams/conf/fmse-ws:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/ArmandoCCCT08,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Llanos Tobarra},
  editor       = {Vitaly Shmatikov},
  title        = {Formal analysis of {SAML} 2.0 web browser single sign-on: breaking
                  the SAML-based single sign-on for google apps},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456396.1456397},
  doi          = {10.1145/1456396.1456397},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmandoCCCT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KrishnanNSW08,
  author       = {Ram Krishnan and
                  Jianwei Niu and
                  Ravi S. Sandhu and
                  William H. Winsborough},
  editor       = {Vitaly Shmatikov},
  title        = {Stale-safe security properties for group-based secure information
                  sharing},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {53--62},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456396.1456402},
  doi          = {10.1145/1456396.1456402},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KrishnanNSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McCarthyK08,
  author       = {Jay A. McCarthy and
                  Shriram Krishnamurthi},
  editor       = {Vitaly Shmatikov},
  title        = {Minimal backups of cryptographic protocol runs},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456396.1456398},
  doi          = {10.1145/1456396.1456398},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McCarthyK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McDermottF08,
  author       = {John P. McDermott and
                  Leo Freitas},
  editor       = {Vitaly Shmatikov},
  title        = {A formal security policy for xenon},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {43--52},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456396.1456401},
  doi          = {10.1145/1456396.1456401},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McDermottF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PoturalskiPH08a,
  author       = {Marcin Poturalski and
                  Panagiotis Papadimitratos and
                  Jean{-}Pierre Hubaux},
  editor       = {Vitaly Shmatikov},
  title        = {Towards provable secure neighbor discovery in wireless networks},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456396.1456400},
  doi          = {10.1145/1456396.1456400},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PoturalskiPH08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouLL08,
  author       = {Ti Zhou and
                  Mengjun Li and
                  Zhoujun Li},
  editor       = {Vitaly Shmatikov},
  title        = {Local abstract verification and refinement of security protocols},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456396.1456399},
  doi          = {10.1145/1456396.1456399},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008fmse,
  editor       = {Vitaly Shmatikov},
  title        = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-60558-288-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2008fmse.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AmtoftB07,
  author       = {Torben Amtoft and
                  Anindya Banerjee},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Verification condition generation for conditional information flow},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {2--11},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314438},
  doi          = {10.1145/1314436.1314438},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AmtoftB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesCFM07,
  author       = {Michael Backes and
                  Agostino Cortesi and
                  Riccardo Focardi and
                  Matteo Maffei},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {A calculus of challenges and responses},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {51--60},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314444},
  doi          = {10.1145/1314436.1314444},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesCFM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrunelCCSB07,
  author       = {Julien Brunel and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Thierry Sans and
                  Jean{-}Paul Bodeveix},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Security policy compliance with violation management},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314441},
  doi          = {10.1145/1314436.1314441},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BrunelCCSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrunsDH07,
  author       = {Glenn Bruns and
                  Daniel S. Dantas and
                  Michael Huth},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {A simple and expressive semantic framework for policy composition
                  in access control},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {12--21},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314439},
  doi          = {10.1145/1314436.1314439},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BrunsDH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaprettaSFM07,
  author       = {Venanzio Capretta and
                  Bernard Stepien and
                  Amy P. Felty and
                  Stan Matwin},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Formal correctness of conflict detection for firewalls},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {22--30},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314440},
  doi          = {10.1145/1314436.1314440},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaprettaSFM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KurtzKW07,
  author       = {Klaas Ole K{\"{u}}rtz and
                  Ralf K{\"{u}}sters and
                  Thomas Wilke},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Selecting theories and nonce generation for recursive protocols},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314445},
  doi          = {10.1145/1314436.1314445},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KurtzKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Lewis07,
  author       = {Jeff Lewis},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Cryptol: specification, implementation and verification of high-grade
                  cryptographic applications},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {41},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314442},
  doi          = {10.1145/1314436.1314442},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Lewis07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McLean07,
  author       = {John McLean},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Formal methods in security engineering: where we've been, where we
                  are, where we need to go},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314437},
  doi          = {10.1145/1314436.1314437},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McLean07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OliveiraWKK07,
  author       = {Anderson Santana de Oliveira and
                  Eric Ke Wang and
                  Claude Kirchner and
                  H{\'{e}}l{\`{e}}ne Kirchner},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Weaving rewrite-based access control policies},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314446},
  doi          = {10.1145/1314436.1314446},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OliveiraWKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SinghRRSW07,
  author       = {Anu Singh and
                  C. R. Ramakrishnan and
                  I. V. Ramakrishnan and
                  Scott D. Stoller and
                  David Scott Warren},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Security policy analysis using deductive spreadsheets},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {42--50},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314443},
  doi          = {10.1145/1314436.1314443},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SinghRRSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007fmse,
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-887-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2007fmse.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesHMU05,
  author       = {Michael Backes and
                  Dennis Hofheinz and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominique Unruh},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {On fairness in simulatability-based cryptographic systems},
  booktitle    = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103576.1103579},
  doi          = {10.1145/1103576.1103579},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesHMU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChapinSW05,
  author       = {Peter C. Chapin and
                  Christian Skalka and
                  Xiaoyang Sean Wang},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {Risk assessment in distributed authorization},
  booktitle    = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103576.1103581},
  doi          = {10.1145/1103576.1103581},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChapinSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChaudhuriA05,
  author       = {Avik Chaudhuri and
                  Mart{\'{\i}}n Abadi},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {Formal security analysis of basic network-attached storage},
  booktitle    = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {43--52},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103576.1103583},
  doi          = {10.1145/1103576.1103583},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChaudhuriA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EscobarMM05,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {A rewriting-based inference system for the {NRL} protocol analyzer:
                  grammar generation},
  booktitle    = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103576.1103578},
  doi          = {10.1145/1103576.1103578},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EscobarMM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GarciaHPR05,
  author       = {Flavio D. Garcia and
                  Ichiro Hasuo and
                  Wolter Pieters and
                  Peter van Rossum},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {Provable anonymity},
  booktitle    = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {63--72},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103576.1103585},
  doi          = {10.1145/1103576.1103585},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GarciaHPR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuptaS05,
  author       = {Prateek Gupta and
                  Vitaly Shmatikov},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {Towards computationally sound symbolic analysis of key exchange protocols},
  booktitle    = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103576.1103580},
  doi          = {10.1145/1103576.1103580},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuptaS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KaushikWWA05,
  author       = {Saket Kaushik and
                  William H. Winsborough and
                  Duminda Wijesekera and
                  Paul Ammann},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {Email feedback: a policy-based approach to overcoming false positives},
  booktitle    = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {73--82},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103576.1103586},
  doi          = {10.1145/1103576.1103586},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KaushikWWA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Mantel05,
  author       = {Heiko Mantel},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {The framework of selective interleaving functions and the modular
                  assembly kit},
  booktitle    = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {53--62},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103576.1103584},
  doi          = {10.1145/1103576.1103584},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Mantel05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2005fmse,
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-231-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2005fmse.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BartheN04,
  author       = {Gilles Barthe and
                  Leonor Prensa Nieto},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Formally verifying information flow type systems for concurrent and
                  thread systems},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029136},
  doi          = {10.1145/1029133.1029136},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BartheN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BugliesiFM04,
  author       = {Michele Bugliesi and
                  Riccardo Focardi and
                  Matteo Maffei},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Authenticity by tagging and typing},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029135},
  doi          = {10.1145/1029133.1029135},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BugliesiFM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CorinEHM04,
  author       = {Ricardo Corin and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Angelika Mader},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Timed model checking of security protocols},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029137},
  doi          = {10.1145/1029133.1029137},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CorinEHM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DoanDTK04,
  author       = {Thuong Doan and
                  Steven A. Demurjian and
                  T. C. Ting and
                  Andreas Ketterl},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {{MAC} and {UML} for secure software design},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {75--85},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029144},
  doi          = {10.1145/1029133.1029144},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DoanDTK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DungT04,
  author       = {Phan Minh Dung and
                  Phan Minh Thang},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Stepwise development of security protocols: a speech act-oriented
                  approach},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {33--44},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029139},
  doi          = {10.1145/1029133.1029139},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DungT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Hashii04,
  author       = {Brant Hashii},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Lessons learned using alloy to formally specify {MLS-PCA} trusted
                  security architecture},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {86--95},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029145},
  doi          = {10.1145/1029133.1029145},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Hashii04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/UribeC04,
  author       = {Tom{\'{a}}s E. Uribe and
                  Steven Cheung},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Automatic analysis of firewall and network intrusion detection system
                  configurations},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {66--74},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029143},
  doi          = {10.1145/1029133.1029143},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/UribeC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangWJ04,
  author       = {Lingyu Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {A logic-based framework for attribute based access control},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {45--55},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029140},
  doi          = {10.1145/1029133.1029140},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangWJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangRG04,
  author       = {Nan Zhang and
                  Mark Ryan and
                  Dimitar P. Guelev},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Synthesising verified access control systems in {XACML}},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {56--65},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029141},
  doi          = {10.1145/1029133.1029141},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangRG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2004,
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {http://dl.acm.org/citation.cfm?id=1030083},
  isbn         = {1-58113-971-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlghathbarW03,
  author       = {Khaled Alghathbar and
                  Duminda Wijesekera},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {authUML: a three-phased framework to analyze access control specifications
                  in use cases},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {77--86},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035438},
  doi          = {10.1145/1035429.1035438},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AlghathbarW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesMM03,
  author       = {Michael Backes and
                  Catherine Meadows and
                  John C. Mitchell},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Relating cryptography and formal methods: a panel},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {61--66},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035436},
  doi          = {10.1145/1035429.1035436},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BraynovJ03,
  author       = {Sviatoslav B. Braynov and
                  Murtuza Jadliwala},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Representation and analysis of coordinated attacks},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {43--51},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035434},
  doi          = {10.1145/1035429.1035434},
  timestamp    = {Fri, 08 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BraynovJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DattaDMP03,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Dusko Pavlovic},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Secure protocol composition},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {11--23},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035431},
  doi          = {10.1145/1035429.1035431},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DattaDMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HamdiB03,
  author       = {Mohamed Hamdi and
                  Noureddine Boudriga},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Algebraic specification of network security risk management},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {52--60},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035435},
  doi          = {10.1145/1035429.1035435},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HamdiB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HansenS03,
  author       = {Michael R. Hansen and
                  Robin Sharp},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Using interval logics for temporal analysis of security protocols},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {24--31},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035432},
  doi          = {10.1145/1035429.1035432},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HansenS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KochP03,
  author       = {Manuel Koch and
                  Francesco Parisi{-}Presicce},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Formal access control analysis in the software development process},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035437},
  doi          = {10.1145/1035429.1035437},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KochP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SieweCZ03,
  author       = {Fran{\c{c}}ois Siewe and
                  Antonio Cau and
                  Hussein Zedan},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {A compositional framework for access control policies enforcement},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {32--42},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035433},
  doi          = {10.1145/1035429.1035433},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SieweCZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouF03,
  author       = {Hongbin Zhou and
                  Simon N. Foley},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Fast automatic synthesis of security protocols using backward search},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035430},
  doi          = {10.1145/1035429.1035430},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2003fmse,
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  publisher    = {{ACM}},
  year         = {2003},
  isbn         = {1-58113-781-8},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2003fmse.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics