Invited Speaker: Andrei Sabelfeld
Dimensions of Declassification in Theory and Practice
A Static Birthmark of Binary Executables Based on API Call Structure
Compiling C Programs into a Strongly Typed Assembly Language
Information Flow Testing
Large Scale Simulation of Tor:
Privacy Enhancing Credentials
Browser Based Agile E-Voting System
Risk Balance in Exchange Protocols
Scalable DRM System for Media Portability
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Management Advantages of Object Classification in Role-Based Access Control (RBAC)
An Integrated Model for Access Control and Information Flow Requirements
Digital Rights Management Using a Master Control Device
Invited Speaker: Joshua Guttman
How to do Things with Cryptographic Protocols
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming
Secure Verification of Location Claims with Simultaneous Distance Modification
Invited Speaker: Kazuhiko Kato
Modeling and Virtualization for Secure Computing Environments
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks
Masquerade Detection Based Upon GUI User Profiling in Linux Systems
One-Time Receiver Address in IPv6 for Protecting Unlinkability
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts
Combining Heterogeneous Classifiers for Network Intrusion Detection
Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments
On Run-Time Enforcement of Policies
Static vs Dynamic Typing for Access Control in Pi-Calculus
A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications.