메뉴 건너뛰기




Volumn , Issue , 2003, Pages 228-233

Logic in access control

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE; COMPUTER PROGRAMMING; COMPUTER SCIENCE; CONTROL SYSTEMS; SECURITY OF DATA; APPLICATION PROGRAMS; COMPUTATION THEORY; COMPUTER CONTROL; COMPUTER CONTROL SYSTEMS; COMPUTER OPERATING SYSTEMS; COMPUTER SYSTEMS PROGRAMMING; LOGIC PROGRAMMING; MACHINERY; MANY VALUED LOGICS; NETWORK SECURITY; SECURITY SYSTEMS; TRANSISTOR TRANSISTOR LOGIC CIRCUITS; UBIQUITOUS COMPUTING;

EID: 0042467968     PISSN: 10436871     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (94)

References (36)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • Martín Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 3-21
    • Abadi, M.1
  • 2
    • 0043027558 scopus 로고    scopus 로고
    • On access control, data integration, and their languages
    • Andrew Herbert and Karen Sprck Jones, editors. The volume, with minor updates, may be published by Springer-Verlag
    • Martín Abadi. On access control, data integration, and their languages. In Andrew Herbert and Karen Sprck Jones, editors, Computer systems: Papers for Roger Needham. 2003. The volume, with minor updates, may be published by Springer-Verlag.
    • (2003) Computer Systems: Papers for Roger Needham
    • Abadi, M.1
  • 14
    • 0000920629 scopus 로고
    • Naming and identity in epistemic logics, I: The propositional case
    • Adam J. Grove and Joseph Y. Halpern. Naming and identity in epistemic logics, I: The propositional case. Journal of Logic and Computation, 3(4):345-378, 1993.
    • (1993) Journal of Logic and Computation , vol.3 , Issue.4 , pp. 345-378
    • Grove, A.J.1    Halpern, J.Y.2
  • 18
    • 84902290299 scopus 로고    scopus 로고
    • A formal semantics for SPKI
    • Proceedings of the Sixth European Symposium on Research in Computer Security (ESORICS 2000). Springer-Verlag
    • Jon Howell and David Kotz. A formal semantics for SPKI. In Proceedings of the Sixth European Symposium on Research in Computer Security (ESORICS 2000), volume 1895 of Lecture Notes in Computer Science, pages 140-158. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1895 , pp. 140-158
    • Howell, J.1    Kotz, D.2
  • 20
    • 0031162048 scopus 로고    scopus 로고
    • A unified framework for enforcing multiple access control policies
    • Proceedings of the ACM SIGMOD International Conference on Management of Data, May
    • Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, and Eliza Bertino. A unified framework for enforcing multiple access control policies. In Proceedings of the ACM SIGMOD International Conference on Management of Data, volume 26(2) of SIGMOD Record, pages 474-485, May 1997.
    • (1997) SIGMOD Record , vol.26 , Issue.2 , pp. 474-485
    • Jajodia, S.1    Samarati, P.2    Subrahmanian, V.S.3    Bertino, E.4
  • 22
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • November
    • Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
    • (1992) ACM Transactions on Computer Systems , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 25
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • February
    • Ninghui Li, Benjamin N. Grosof, and Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security, 6(1):128-171, February 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum3
  • 26
    • 35248834606 scopus 로고    scopus 로고
    • Datalog with constraints: A foundation for trust-management languages
    • Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages (PADL 2003). Springer-Verlag, January
    • [26] Ninghui Li and John C. Mitchell. Datalog with constraints: A foundation for trust-management languages. In Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages (PADL 2003), volume 2562 of Lecture Notes in Computer Science, pages 58-73. Springer-Verlag, January 2003.
    • (2003) Lecture Notes in Computer Science , vol.2562 , pp. 58-73
    • Li, N.1    Mitchell, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.