-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
M. Abadi. On SDSI's linked local name spaces. J. Computer Security, 6(1-2):3-21, 1998.
-
(1998)
J. Computer Security
, vol.6
, Issue.1-2
, pp. 3-21
-
-
Abadi, M.1
-
2
-
-
0001772130
-
Secrecy by typing in security protocols
-
Sept.
-
M. Abadi. Secrecy by typing in security protocols. J. ACM, 46(5):749-786, Sept. 1999.
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
84958749546
-
From secrecy to authenticity in security protocols
-
9th International Static Analysis Symposium (SAS'02), Springer
-
B. Blanchet. From secrecy to authenticity in security protocols. In 9th International Static Analysis Symposium (SAS'02), volume 2477 of LNCS, pages 342-359. Springer, 2002.
-
(2002)
LNCS
, vol.2477
, pp. 342-359
-
-
Blanchet, B.1
-
8
-
-
1342347429
-
Access control for mobile agents: The calculus of boxed ambients
-
Jan.
-
M. Bugliesi, G. Castagna, and S. Crafa. Access control for mobile agents: the calculus of boxed ambients. ACM TOPLAS, 26(1):57-124, Jan. 2004.
-
(2004)
ACM TOPLAS
, vol.26
, Issue.1
, pp. 57-124
-
-
Bugliesi, M.1
Castagna, G.2
Crafa, S.3
-
9
-
-
35048879172
-
Type based discretionary access control
-
CONCUR'04 - Concurrency Theory, Springer, Sept.
-
M. Bugliesi, D. Colazzo, and S. Crafa. Type based discretionary access control. In CONCUR'04 - Concurrency Theory, volume 3170 of LNCS, pages 225-239. Springer, Sept. 2004.
-
(2004)
LNCS
, vol.3170
, pp. 225-239
-
-
Bugliesi, M.1
Colazzo, D.2
Crafa, S.3
-
10
-
-
0024631953
-
What you always wanted to know about Datalog (and never dared to ask)
-
S. Ceri, G. Gottlob, and L. Tanca. What you always wanted to know about Datalog (and never dared to ask). IEEE Transactions on Knowledge and Data Engineering, 1(1): 146-166, 1989.
-
(1989)
IEEE Transactions on Knowledge and Data Engineering
, vol.1
, Issue.1
, pp. 146-166
-
-
Ceri, S.1
Gottlob, G.2
Tanca, L.3
-
14
-
-
24644469251
-
A type discipline for authorization policies
-
Microsoft Research
-
C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. Technical Report MSR-TR-2005-01, Microsoft Research, 2005.
-
(2005)
Technical Report
, vol.MSR-TR-2005-01
-
-
Fournet, C.1
Gordon, A.D.2
Maffeis, S.3
-
15
-
-
35248815623
-
Typing one-to-one and one-to-many correspondences in security protocols
-
Software Security - Theories and Systems, Springer
-
A.D. Gordon and A. Jeffrey. Typing one-to-one and one-to-many correspondences in security protocols. In Software Security - Theories and Systems, volume 2609 of LNCS, pages 270-282. Springer, 2002.
-
(2002)
LNCS
, vol.2609
, pp. 270-282
-
-
Gordon, A.D.1
Jeffrey, A.2
-
16
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. J. Computer Security, 11(4):451-521, 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.4
, pp. 451-521
-
-
Gordon, A.D.1
Jeffrey, A.2
-
17
-
-
0038414953
-
Typing correspondence assertions for communication protocols
-
A. D. Gordon and A. Jeffrey. Typing correspondence assertions for communication protocols. Theoretical Comput. Sci., 300:379-409, 2003.
-
(2003)
Theoretical Comput. Sci.
, vol.300
, pp. 379-409
-
-
Gordon, A.D.1
Jeffrey, A.2
-
18
-
-
35048849152
-
Model-checking access control policies
-
Seventh Information Security Conference (ISC'04), Springer
-
D. P. Guelev, M. D. Ryan, and P.-Y. Schobbens. Model-checking access control policies. In Seventh Information Security Conference (ISC'04), volume 3225 of LNCS. Springer, 2004.
-
(2004)
LNCS
, vol.3225
-
-
Guelev, D.P.1
Ryan, M.D.2
Schobbens, P.-Y.3
-
19
-
-
35048867881
-
Trust management in strand spaces: A rely-guarantee method
-
13th European Symposium on Programming (ESOP'04), Springer
-
J. D. Guttman, F. J. Thayer, J. A. Carlson, J. C. Herzog, J. D. Ramsdell, and B. T. Sniffen. Trust management in strand spaces: a rely-guarantee method. In 13th European Symposium on Programming (ESOP'04), volume 2986 of LNCS, pages 340-354. Springer, 2004.
-
(2004)
LNCS
, vol.2986
, pp. 340-354
-
-
Guttman, J.D.1
Thayer, F.J.2
Carlson, J.A.3
Herzog, J.C.4
Ramsdell, J.D.5
Sniffen, B.T.6
-
23
-
-
84885202292
-
Programming access control: The KLAIM experience
-
CONCUR 2000, Springer
-
R. D. Nicola, G. Ferrari, and R. Pugliese. Programming access control: The KLAIM experience. In CONCUR 2000, volume 1877 of LNCS, pages 48-65. Springer, 2000.
-
(2000)
LNCS
, vol.1877
, pp. 48-65
-
-
Nicola, R.D.1
Ferrari, G.2
Pugliese, R.3
|