License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported license (CC BY-NC-ND 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagRep.1.8.53
URN: urn:nbn:de:0030-drops-33111
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2011/3311/
Go back to Dagstuhl Reports


Comom-Lundh, Hubert ; Küsters, Ralf ; Meadows, Catherine
Weitere Beteiligte (Hrsg. etc.): Hubert Comon-Lundh and Ralf Küsters and Catherine Meadows

Security and Rewriting (Dagstuhl Seminar 11332)

pdf-format:
dagrep_v001_i008_p053_s11332.pdf (0.7 MB)


Abstract

This report documents the program and the outcomes of Dagstuhl Seminar 11332 ``Security and Rewriting''.

BibTeX - Entry

@Article{comomlundh_et_al:DR:2011:3311,
  author =	{Hubert Comom-Lundh and Ralf K{\"u}sters and Catherine Meadows},
  title =	{{Security and Rewriting (Dagstuhl Seminar 11332)}},
  pages =	{53--66},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2011},
  volume =	{1},
  number =	{8},
  editor =	{Hubert Comon-Lundh and Ralf K{\"u}sters and Catherine Meadows},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2011/3311},
  URN =		{urn:nbn:de:0030-drops-33111},
  doi =		{10.4230/DagRep.1.8.53},
  annote =	{Keywords: Rewriting, Security, Access Control, Protocol Verification}
}

Keywords: Rewriting, Security, Access Control, Protocol Verification
Collection: Dagstuhl Reports, Volume 1, Issue 8
Issue Date: 2011
Date of publication: 06.12.2011


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI