Title :
Proceedings of the Computer Security Foundations Workshop II (Cat. No.89TH0255-0)
Abstract :
The following topics are dealt with: information flow; definition and analysis of covert channels; propagation of access rights; secure protocols; verification techniques and proof systems; and other applications of computer science, mathematics, and logic to problems in computer security
Keywords :
formal logic; formal specification; information theory; program verification; security of data; telecommunication channels; access rights propagation; computer security; covert channels; information flow; logic; proof systems; secure protocols; verification techniques;
Conference_Titel :
Computer Security Foundations Workshop II, 1989., Proceedings of the
Conference_Location :
Franconia, NH, USA
DOI :
10.1109/CSFW.1989.40580