License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported license (CC BY-NC-ND 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagRep.1.8.53
URN: urn:nbn:de:0030-drops-33111
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2011/3311/
Comom-Lundh, Hubert ;
Küsters, Ralf ;
Meadows, Catherine
Weitere Beteiligte (Hrsg. etc.): Hubert Comon-Lundh and Ralf Küsters and Catherine Meadows
Security and Rewriting (Dagstuhl Seminar 11332)
Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 11332 ``Security and Rewriting''.
BibTeX - Entry
@Article{comomlundh_et_al:DR:2011:3311,
author = {Hubert Comom-Lundh and Ralf K{\"u}sters and Catherine Meadows},
title = {{Security and Rewriting (Dagstuhl Seminar 11332)}},
pages = {53--66},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2011},
volume = {1},
number = {8},
editor = {Hubert Comon-Lundh and Ralf K{\"u}sters and Catherine Meadows},
publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
address = {Dagstuhl, Germany},
URL = {http://drops.dagstuhl.de/opus/volltexte/2011/3311},
URN = {urn:nbn:de:0030-drops-33111},
doi = {10.4230/DagRep.1.8.53},
annote = {Keywords: Rewriting, Security, Access Control, Protocol Verification}
}
Keywords: |
|
Rewriting, Security, Access Control, Protocol Verification |
Collection: |
|
Dagstuhl Reports, Volume 1, Issue 8 |
Issue Date: |
|
2011 |
Date of publication: |
|
06.12.2011 |