POST 2014 accepted papers
Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti and David Basin. Decentralized Composite Access Control
David Lubicz, Graham Steel and Marion Daubignard. A Secure Key Management Interface with Asymmetric Cryptography
Ralf Kuesters, Enrico Scapin, Tomasz Truderung and Juergen Graf. Extending and Applying a Framework for the Cryptographic Verification of Java Programs
Gilles Barthe, Boris Köpf, Laurent Mauborgne and Martin Ochoa. Leakage Resilience against Concurrent Cache Attacks
Florian Arnold, Holger Hermanns, Reza Pulungan and Marielle I A Stoelinga. Time-Dependent Analysis of Attacks
Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer. Information Flow Control in WebKit’s JavaScript Bytecode
Rohit Chadha, Dileep Kini and Mahesh Viswanathan. Quantitative Information Flow in Boolean Programs
Jed Liu and Andrew Myers. Defining and Enforcing Referential Security
Annabelle McIver, Carroll Morgan, Geoffrey Smith, Barbara Espinoza and Larissa Meinicke. Abstract channels and their robust information-leakage ordering
Michael Backes, Esfandiar Mohammadi and Tim Ruffing. Computational Soundness Results for ProVerif: Bridging the Gap from Trace Properties to Uniformity
David Baelde, Stéphanie Delaune and Lucca Hirschi. A reduced semantics for deciding trace equivalence using constraint systems
Myrto Arapinis, Jia Liu, Eike Ritter and Mark Ryan. Stateful Applied Pi Calculus
Mario S. Alvim, Fred B. Schneider and Andre Scedrov. When not all bits are equal: worth-based information flow
Manuel Barbosa, David Castro and Paulo Silva. Compiling CAO: from Cryptographic Specifications to C Implementations
Michael Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe and Cesar Sanchez. Temporal Logics for Hyperproperties
David Costanzo and Zhong Shao. A Separation Logic for Enforcing Declarative Information Flow Control Policies