Abstract :
The following topics are dealt with: computer security foundations; information-flow security; symbolic protocol verification; access control; systems security; information theory; and cryptography proving.
Keywords :
authorisation; cryptographic protocols; information theory; access control; computer security foundations; cryptography proving; information theory; information-flow security; symbolic protocol verification; systems security;
Conference_Titel :
Computer Security Foundations Symposium (CSF), 2012 IEEE 25th
Conference_Location :
Cambridge, MA
Print_ISBN :
978-1-4673-1918-8
Electronic_ISBN :
1940-1434