This proceedings volume from the July 2000 workshop for researchers in computer security covers a variety of theories and models of security, techniques for verifying security, and new developments in the field. Presentation topics include: optimizing protocol rewrite rules of CIL specifications, analyzing single-server network inhibition, possibilistic definitions of security, and secure introduction of one- way functions. Also included is the outline for a panel discussion on foundations for intrusion detection and the transcript of an invited talk. Lacks an index. Annotation copyrighted by Book News, Inc., Portland, OR[HT91] Kohei Honda and Mario Tokoro. ... [Jon99] Michael B. Jones. Interposition agents: Transparently interposing user code at the system interface. ... In Proceedings of the 1 2th IEEE Computer Security Foundations Workshop (CSFW -12), Mordano, Italy, June 1999. ... Lecture notes for the Math- fit Instructional Meeting on Recent Advances in Semantics and Types for Concurrency: Theory and Practice, anbsp;...
Title | : | 13th IEEE Computer Security Foundations Workshop, CSFW-13 |
Author | : | |
Publisher | : | IEEE - 2000 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: