메뉴 건너뛰기




Volumn 3444, Issue , 2005, Pages 141-156

A type discipline for authorization policies

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; LOGIC PROGRAMMING; QUERY LANGUAGES; SECURITY OF DATA;

EID: 24644447402     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-31987-0_11     Document Type: Conference Paper
Times cited : (35)

References (24)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • M. Abadi. On SDSI's linked local name spaces. J. Computer Security, 6(1-2):3-21, 1998.
    • (1998) J. Computer Security , vol.6 , Issue.1-2 , pp. 3-21
    • Abadi, M.1
  • 2
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Sept.
    • M. Abadi. Secrecy by typing in security protocols. J. ACM, 46(5):749-786, Sept. 1999.
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
    • (1999) Information and Computation , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 5
    • 84958749546 scopus 로고    scopus 로고
    • From secrecy to authenticity in security protocols
    • 9th International Static Analysis Symposium (SAS'02), Springer
    • B. Blanchet. From secrecy to authenticity in security protocols. In 9th International Static Analysis Symposium (SAS'02), volume 2477 of LNCS, pages 342-359. Springer, 2002.
    • (2002) LNCS , vol.2477 , pp. 342-359
    • Blanchet, B.1
  • 8
    • 1342347429 scopus 로고    scopus 로고
    • Access control for mobile agents: The calculus of boxed ambients
    • Jan.
    • M. Bugliesi, G. Castagna, and S. Crafa. Access control for mobile agents: the calculus of boxed ambients. ACM TOPLAS, 26(1):57-124, Jan. 2004.
    • (2004) ACM TOPLAS , vol.26 , Issue.1 , pp. 57-124
    • Bugliesi, M.1    Castagna, G.2    Crafa, S.3
  • 9
    • 35048879172 scopus 로고    scopus 로고
    • Type based discretionary access control
    • CONCUR'04 - Concurrency Theory, Springer, Sept.
    • M. Bugliesi, D. Colazzo, and S. Crafa. Type based discretionary access control. In CONCUR'04 - Concurrency Theory, volume 3170 of LNCS, pages 225-239. Springer, Sept. 2004.
    • (2004) LNCS , vol.3170 , pp. 225-239
    • Bugliesi, M.1    Colazzo, D.2    Crafa, S.3
  • 13
  • 14
    • 24644469251 scopus 로고    scopus 로고
    • A type discipline for authorization policies
    • Microsoft Research
    • C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. Technical Report MSR-TR-2005-01, Microsoft Research, 2005.
    • (2005) Technical Report , vol.MSR-TR-2005-01
    • Fournet, C.1    Gordon, A.D.2    Maffeis, S.3
  • 15
    • 35248815623 scopus 로고    scopus 로고
    • Typing one-to-one and one-to-many correspondences in security protocols
    • Software Security - Theories and Systems, Springer
    • A.D. Gordon and A. Jeffrey. Typing one-to-one and one-to-many correspondences in security protocols. In Software Security - Theories and Systems, volume 2609 of LNCS, pages 270-282. Springer, 2002.
    • (2002) LNCS , vol.2609 , pp. 270-282
    • Gordon, A.D.1    Jeffrey, A.2
  • 16
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. J. Computer Security, 11(4):451-521, 2003.
    • (2003) J. Computer Security , vol.11 , Issue.4 , pp. 451-521
    • Gordon, A.D.1    Jeffrey, A.2
  • 17
    • 0038414953 scopus 로고    scopus 로고
    • Typing correspondence assertions for communication protocols
    • A. D. Gordon and A. Jeffrey. Typing correspondence assertions for communication protocols. Theoretical Comput. Sci., 300:379-409, 2003.
    • (2003) Theoretical Comput. Sci. , vol.300 , pp. 379-409
    • Gordon, A.D.1    Jeffrey, A.2
  • 18
    • 35048849152 scopus 로고    scopus 로고
    • Model-checking access control policies
    • Seventh Information Security Conference (ISC'04), Springer
    • D. P. Guelev, M. D. Ryan, and P.-Y. Schobbens. Model-checking access control policies. In Seventh Information Security Conference (ISC'04), volume 3225 of LNCS. Springer, 2004.
    • (2004) LNCS , vol.3225
    • Guelev, D.P.1    Ryan, M.D.2    Schobbens, P.-Y.3
  • 19
    • 35048867881 scopus 로고    scopus 로고
    • Trust management in strand spaces: A rely-guarantee method
    • 13th European Symposium on Programming (ESOP'04), Springer
    • J. D. Guttman, F. J. Thayer, J. A. Carlson, J. C. Herzog, J. D. Ramsdell, and B. T. Sniffen. Trust management in strand spaces: a rely-guarantee method. In 13th European Symposium on Programming (ESOP'04), volume 2986 of LNCS, pages 340-354. Springer, 2004.
    • (2004) LNCS , vol.2986 , pp. 340-354
    • Guttman, J.D.1    Thayer, F.J.2    Carlson, J.A.3    Herzog, J.C.4    Ramsdell, J.D.5    Sniffen, B.T.6
  • 23
    • 84885202292 scopus 로고    scopus 로고
    • Programming access control: The KLAIM experience
    • CONCUR 2000, Springer
    • R. D. Nicola, G. Ferrari, and R. Pugliese. Programming access control: The KLAIM experience. In CONCUR 2000, volume 1877 of LNCS, pages 48-65. Springer, 2000.
    • (2000) LNCS , vol.1877 , pp. 48-65
    • Nicola, R.D.1    Ferrari, G.2    Pugliese, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.