Table of Contents:
  • Strategic Games on Defense Trees
  • Timed Calculus of Cryptographic Communication
  • A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk
  • Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security
  • Measuring Anonymity with Relative Entropy
  • Formalizing and Analyzing Sender Invariance
  • From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust
  • A Tool for the Synthesis of Controller Programs
  • Where Can an Insider Attack?
  • Maintaining Information Flow Security Under Refinement and Transformation
  • A Classification of Delegation Schemes for Attribute Authority
  • Program Partitioning Using Dynamic Trust Models
  • Locality-Based Security Policies
  • A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols
  • A Formal Specification of the MIDP 2.0 Security Model
  • A Comparison of Semantic Models for Noninterference
  • Hiding Information in Multi Level Security Systems
  • A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks.