LEADER 01798oam 2200397zu 450 001 996206163303316 005 20210807003532.0 024 7 $a10.1109/CSFW.1993 035 $a(CKB)111026746737424 035 $a(SSID)ssj0000558109 035 $a(PQKBManifestationID)12197954 035 $a(PQKBTitleCode)TC0000558109 035 $a(PQKBWorkID)10559099 035 $a(PQKB)10792273 035 $a(NjHacI)99111026746737424 035 $a(EXLCZ)99111026746737424 100 $a20160829d1993 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aComputer Security Foundations Workshop VI 210 31$a[Place of publication not identified]$cIEEE Computer Society Press$d1993 215 $a1 online resource (224 pages) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-8186-3950-4 330 $aThe purpose of the annual Computer Security Foundations Workshop is to bring together researchers to explore fundamental issues in computer security. The emphasis is on formal models that provide a framework for theories of security, and techniques for verifying security as defined by these theories. This volume contains papers presented at the June 1993 Workshop held in Franconia, New Hampshire, as well as position papers for the panels. Topics include covert channel analysis, information flow, integrity and aggregation, access control, and crypto protocol analysis. No index. Annotation copyright by Book News, Inc., Portland, OR. 606 $aComputer security$xCongresses 615 0$aComputer security$xCongresses. 676 $a005.8 801 0$bPQKB 906 $aBOOK 912 $a996206163303316 996 $aComputer Security Foundations Workshop VI$92507912 997 $aUNISA