DocumentCode :
3164150
Title :
Proceedings of the Computer Security Foundations Workshop II (Cat. No.89TH0255-0)
fYear :
1989
fDate :
11-14 June 1989
Abstract :
The following topics are dealt with: information flow; definition and analysis of covert channels; propagation of access rights; secure protocols; verification techniques and proof systems; and other applications of computer science, mathematics, and logic to problems in computer security
Keywords :
formal logic; formal specification; information theory; program verification; security of data; telecommunication channels; access rights propagation; computer security; covert channels; information flow; logic; proof systems; secure protocols; verification techniques;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop II, 1989., Proceedings of the
Conference_Location :
Franconia, NH, USA
Type :
conf
DOI :
10.1109/CSFW.1989.40580
Filename :
40580
Link To Document :
بازگشت