-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
Martín Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 3-21
-
-
Abadi, M.1
-
2
-
-
0043027558
-
On access control, data integration, and their languages
-
Andrew Herbert and Karen Sprck Jones, editors. The volume, with minor updates, may be published by Springer-Verlag
-
Martín Abadi. On access control, data integration, and their languages. In Andrew Herbert and Karen Sprck Jones, editors, Computer systems: Papers for Roger Needham. 2003. The volume, with minor updates, may be published by Springer-Verlag.
-
(2003)
Computer Systems: Papers for Roger Needham
-
-
Abadi, M.1
-
3
-
-
0027667638
-
A calculus for access control in distributed systems
-
October
-
Martín Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, October 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
6
-
-
0041524664
-
A logical framework for reasoning about access control models
-
February
-
Elisa Bertino, Barbara Catania, Elena Ferrari, and Paolo Perlasca. A logical framework for reasoning about access control models. ACM Transactions on Information and System Security, 6(1):71-127, February 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
7
-
-
0004078695
-
-
September
-
Matt Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis. RFC 2704: The KeyNote trust-management system, version 2. On the Web at http://www.ietf.cnri.reston.va.us/rfc/rfc2704. txt, September 1999.
-
(1999)
RFC 2704: The KeyNote Trust-management System, Version 2
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
9
-
-
0035657915
-
A logic of access control
-
Jason Crampton, George Loizou, and Greg O'Shea. A logic of access control. The Computer Journal, 44(2):137-149, 2001.
-
(2001)
The Computer Journal
, vol.44
, Issue.2
, pp. 137-149
-
-
Crampton, J.1
Loizou, G.2
O'Shea, G.3
-
11
-
-
0003618065
-
-
September
-
Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylönen. RFC 2693: SPKI certificate theory. On the Web at http://www.ietf.cnri.reston.va.us/rfc/rfc2693.txt, September 1999.
-
(1999)
RFC 2693: SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylönen, T.6
-
12
-
-
0031095670
-
The TSIMMIS approach to mediation: Data models and languages
-
Hector Garcia-Molina, Yannis Papakonstantinou, Dallan Quass, Anand Rajaraman, Yehoshua Sagiv, Jeffrey D. Ullman, Vasilis Vassalos, and Jennifer Widom. The TSIMMIS approach to mediation: Data models and languages. Journal of Intelligent Information Systems, 8(2):117-132, 1997.
-
(1997)
Journal of Intelligent Information Systems
, vol.8
, Issue.2
, pp. 117-132
-
-
Garcia-Molina, H.1
Papakonstantinou, Y.2
Quass, D.3
Rajaraman, A.4
Sagiv, Y.5
Ullman, J.D.6
Vassalos, V.7
Widom, J.8
-
13
-
-
0003339136
-
The digital distributed system security architecture
-
October
-
Morrie Gasser, Andy Goldstein, Charlie Kaufman, and Butler Lampson. The Digital Distributed System Security Architecture. In Proceedings of the 1989 National Computer Security Conference, pages 305-319, October 1989.
-
(1989)
Proceedings of the 1989 National Computer Security Conference
, pp. 305-319
-
-
Gasser, M.1
Goldstein, A.2
Kaufman, C.3
Lampson, B.4
-
14
-
-
0000920629
-
Naming and identity in epistemic logics, I: The propositional case
-
Adam J. Grove and Joseph Y. Halpern. Naming and identity in epistemic logics, I: The propositional case. Journal of Logic and Computation, 3(4):345-378, 1993.
-
(1993)
Journal of Logic and Computation
, vol.3
, Issue.4
, pp. 345-378
-
-
Grove, A.J.1
Halpern, J.Y.2
-
17
-
-
0016984825
-
Protection in operating systems
-
August
-
Michael A. Harrison, Walter L. Ruzzo, and Jeffrey D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, August 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
18
-
-
84902290299
-
A formal semantics for SPKI
-
Proceedings of the Sixth European Symposium on Research in Computer Security (ESORICS 2000). Springer-Verlag
-
Jon Howell and David Kotz. A formal semantics for SPKI. In Proceedings of the Sixth European Symposium on Research in Computer Security (ESORICS 2000), volume 1895 of Lecture Notes in Computer Science, pages 140-158. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1895
, pp. 140-158
-
-
Howell, J.1
Kotz, D.2
-
20
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
Proceedings of the ACM SIGMOD International Conference on Management of Data, May
-
Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, and Eliza Bertino. A unified framework for enforcing multiple access control policies. In Proceedings of the ACM SIGMOD International Conference on Management of Data, volume 26(2) of SIGMOD Record, pages 474-485, May 1997.
-
(1997)
SIGMOD Record
, vol.26
, Issue.2
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
22
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
November
-
Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
25
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
February
-
Ninghui Li, Benjamin N. Grosof, and Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security, 6(1):128-171, February 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum3
-
26
-
-
35248834606
-
Datalog with constraints: A foundation for trust-management languages
-
Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages (PADL 2003). Springer-Verlag, January
-
[26] Ninghui Li and John C. Mitchell. Datalog with constraints: A foundation for trust-management languages. In Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages (PADL 2003), volume 2562 of Lecture Notes in Computer Science, pages 58-73. Springer-Verlag, January 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2562
, pp. 58-73
-
-
Li, N.1
Mitchell, J.C.2
-
33
-
-
0039334688
-
SAFKASI: A security mechanism for language-based systems
-
October
-
Dan S. Wallach, Andrew W. Appel, and Edward W. Felten. SAFKASI: a security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology, 9(4):341-378, October 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 341-378
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
-
34
-
-
0028380781
-
Authentication in the Taos operating system
-
February
-
Edward Wobber, Martín Abadi, Michael Burrows, and Butler Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3-32, February 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|