Publisher's Synopsis
Consists of 17 papers from the June 2003 workshop that examine information flow, logic for anonymity and distributed system security, access control, authorization, security policies, and computational analysis of security protocols. Topics include a procedure for verifying security against type confusion attacks, probabilistic noninterference thro