POST 2012 accepted papers
- Jason Crampton and Charles Morisset. PTaCL: A Language for Attribute-Based Access Control in Open Systems
- Miriam Paiola and Bruno Blanchet. Verification of security protocols with lists: from length one to unbounded length
- Dimiter Milushev and Dave Clarke. Towards Incrementalization of Holistic Hyperproperties
- Matteo Centenaro, Riccardo Focardi and Flaminia Luccio. Type-based Analysis of PKCS#11
- Ting-Fang Yen and Michael Reiter. Revisiting Botnet Models and Their Implications for Takedown Strategies
- Jason Franklin, Sagar Chaki, Anupam Datta, Jonathan Mccune and Amit Vasudevan. Parametric Verification of Address Space Separation
- Veronique Cortier, Jan Degrieck and Stephanie Delaune. Analysing routing protocols: four nodes topologies are sufficient
- Eike Best and Philippe Darondeau. Deciding Selective Declassification of Petri Nets
- Myrto Arapinis, Sergiu Bursuc and Mark Ryan. Privacy supporting cloud computing: ConfiChair, a case study
- Myrto Arapinis, Sergiu Bursuc and Mark Ryan. Reduction of equational theories for verification of trace equivalence: re-encryption and associativity-commutativity
- Veronique Cortier and Cyrille Wiedling. A formal analysis of the Norwegian e-voting protocol
- David Basin, Cas Cremers and Simon Meier. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
- Hubert Comon-Lundh, Véronique Cortier and Guillaume Scerri. Security proof with dishonest keys
- Gilles Barthe, Benjamin Gregoire, Sylvain Heraud, Federico Olmedo and Santiago Zanella Béguelin. Verified Indifferentiable Hashing into Elliptic Curves
- David Basin, Vincent Juge, Felix Klaedtke and Eugen Zalinescu. Enforceable Security Policies Revisited
- Gergei Bana and Hubert Comon-Lundh. Towards Unconditional Soundness: Computationally Complete Symbolic Attacker
- Mu Yang, Vladimiro Sassone and Sardaouna Hamadou. A Game-Theoretic Analysis of Cooperation in Anonymity Networks
- Anupam Datta, Divya Sharma and Arunesh Sinha. Provable De-anonymization of Large Datasets with Sparse Dimensions
- Torben Amtoft, Josiah Dodds, Zhi Zhang, Andrew Appel, Lennart Beringer, John Hatcliff, Xinming Ou and Andrew Cousino. A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flow
- Umut Acar, Amal Ahmed, James Cheney and Roly Perera. A core calculus for provenance