What people are saying - Write a review
We haven't found any reviews in the usual places.
Unwinding Forward Correctability
A StateBased Approach to Noninterference
Combining Components and Policies
16 other sections not shown
Abadi Abadi-Tuttle access control ActH action agent algorithm applied approach assurance attacks authentication protocols authorization BAN logic behavior believes CAS components ciphertext cleartext composition Computer Security confidentiality covert channels cryptographic protocols data item database decryption defined definition denotes deterministic domains encrypted event system example Figure flaws flow policy formal function gist global GLST IEEE Computer Society implementation information flow input integrity ITRANS khat lattice multilevel multilevel security Needham NextState nonce noninterference notion NRL Protocol Analyzer object operation Otway-Rees protocol output paper POSS(Pi predicate principal Proc programs proof protocol run reflexive relation regular expression replay represent requirements restrictions rule Sandhu satisfy scheme secret Section Security and Privacy security level security models security policy security properties semantics separation of duties sequence server session key specification subjects Symposium on Security take-grant model taxonomy TCSEC Theorem tion tocol transitive trusted