||Document, Internet resource
||Internet Resource, Computer File
||Scholarly & Professional
||1 online resource (340 pages).
||Conference Proceedings Ser.
Papers from a June 2002 workshop report on recent advances in areas of information flow, intrusion, protocols, applications of model checking, games, language-based security, and distributed rights, access control, and watermarking. Specific subjects examined include approximate non-interface, formal specification of intrusion signatures and detection rules, types and effects for asymmetric cryptographic protocols, and probabilistic analysis of anonymity. Other topics include capturing parallel attacks within the data independence framework, polynomial fairness and liveness, game analysis of abuse-free contract signing, a privacy model for enterprises, and hiding functions and computational security of image watermarking systems. There is no subject index. Annotation copyrighted by Book News, Inc., Portland, OR.