Proceedings of the ... ACM Workshop on Formal Methods in Security EngineeringAssociation for Computing Machinery, 2004 - Computer security |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
Formally Verifying Information Flow Type Systems | |
Security Analysis I | |
A Logicbased Framework for Attribute based Access Control | |
Copyright | |
1 other sections not shown
Other editions - View all
Common terms and phrases
ABAC abstract access control action actor agent algorithm allows analysis apply approach assigned associated assurance attack attributes authentication ciphertext communication Computer condition configuration connection consider constraint corresponding decrypt defined definition described distributed effect elements encryption engineering example extend Figure firewall formal framework function given identifiers IEEE implementation initiator instance knows language logic materialization method multisets NIDS node non-interference nonce Note operations packet possible predicate presented principal Proceedings programs proof properties proposed protocol receiving relation represents request requires responder result role rules satisfy secret security protocols semantics sending sequence diagrams specification speech act strand structure Table tion true variables verify XACML