LEADER 01815oam 2200409zu 450 001 9910872634703321 005 20241212214947.0 024 7 $a10.1109/CSFW.1993 035 $a(CKB)111026746737424 035 $a(SSID)ssj0000558109 035 $a(PQKBManifestationID)12197954 035 $a(PQKBTitleCode)TC0000558109 035 $a(PQKBWorkID)10559099 035 $a(PQKB)10792273 035 $a(NjHacI)99111026746737424 035 $a(EXLCZ)99111026746737424 100 $a20160829d1993 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aComputer Security Foundations Workshop VI 210 31$a[Place of publication not identified]$cIEEE Computer Society Press$d1993 215 $a1 online resource (224 pages) 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9780818639500 311 08$a0818639504 330 $aThe purpose of the annual Computer Security Foundations Workshop is to bring together researchers to explore fundamental issues in computer security. The emphasis is on formal models that provide a framework for theories of security, and techniques for verifying security as defined by these theories. This volume contains papers presented at the June 1993 Workshop held in Franconia, New Hampshire, as well as position papers for the panels. Topics include covert channel analysis, information flow, integrity and aggregation, access control, and crypto protocol analysis. No index. Annotation copyright by Book News, Inc., Portland, OR. 606 $aComputer security$vCongresses 615 0$aComputer security 676 $a005.8 801 0$bPQKB 906 $aBOOK 912 $a9910872634703321 996 $aComputer Security Foundations Workshop VI$92507912 997 $aUNINA