Title :
Proceedings. 18th IEEE Computer Security
Abstract :
The following topics are dealt with: information flow and security goals; logic and knowledge for protocols; protocol case study; protocol verification techniques; computational and formal models; access control and languages; declassification; and availability and denial of services.
Keywords :
formal verification; protocols; security of data; access control; denial of services; formal models; information flow; information security; protocol knowledge; protocol logic; protocol verification;
Conference_Titel :
Computer Security Foundations, 2005. CSFW-18 2005. 18th IEEE Workshop
Conference_Location :
Aix-en-Provence, France
Print_ISBN :
0-7695-2340-4
DOI :
10.1109/CSFW.2005.2