University of Oxford Logo University of OxfordDepartment of Computer Science - Home

Security: Publications

By dateBy titleBy typeBibtex

[1]

Analysing the Security Properties of Object−Capability Patterns

Toby Murray

PhD Thesis University of Oxford. 2010.

[2]

Analysing the Information Flow Properties of Object−Capability Patterns

Toby Murray and Gavin Lowe

In Proceedings of the Sixth International Workshop on Formal Aspects of Security and Trust (FAST2009). Vol. 5983 of Lecture Notes in Computer Science. Pages 81−95. 2010.

[3]

On Refinement−Closed Security Properties and Nondeterministic Compositions

Toby Murray and Gavin Lowe

In Proceedings of the Eighth International Workshop on Automated Verification of Critical Systems (AVoCS '08). Vol. 250 of Electronic Notes in Theoretical Computer Science. No. 2. Pages 49−68. 2009.

[4]

Analysing Object−Capability Security

Toby Murray

In Proceedings of the Joint Workshop on Foundations of Computer Security‚ Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS−ARSPA−WITS'08). 2008.

[5]

Separating two roles of hashing in one−way message authentication

L.H. Nguyen and A.W. Roscoe

In Proceedings of FCS−ARSPA−WITS. 2008.

(This version is extended by appendices not present in proceedings.)

[6]

Authenticating ad hoc networks by comparison of short digests

A. W. Roscoe and L. H. Nguyen

In Information and Computation. Vol. 206. Pages 250−271. 2008.

[7]

Non−Delegatable Authorities in Capability Systems

Toby Murray and Duncan Grove

In Journal of Computer Security. Vol. 16. No. 6. Pages 743−759. 2008.

[8]

Analysing TLS in the Strand Spaces Model

Allaa Kamil and Gavin Lowe

2008.

[9]

On the Specication and Analysis of Secure Transport Layers

Christopher Dilloway

PhD Thesis Oxford University Computing Laboratory. 2008.

[10]

Chaining Secure Channels (Technical Report)

Christopher Dilloway

2008.

[11]

Specifying Secure Transport Layers

Christopher Dilloway and Gavin Lowe

In 21st IEEE Computer Security Foundations Symposium (CSF 21). 2008.

[12]

On Information Flow and Refinement−Closure

Gavin Lowe

In Proceedings of the Workshop on Issues in the Theory of Security (WITS '07). 2007.

[13]

On the Specification of Secure Channels

Christopher Dilloway and Gavin Lowe

In Proceedings of the Workshop on Issues in the Theory of Security (WITS '07). 2007.

[14]

Authority Analysis for Least Privilege Environments

Toby Murray and Gavin Lowe

In Proceedings of Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS−ARSPA'07). 2007.

[15]

Derivation of Error Distribution in Least Squares Steganalysis

Andrew Ker

No. RR−06−03. Oxford University Computing Laboratory. July, 2006.