메뉴 건너뛰기




Volumn 3920 LNCS, Issue , 2006, Pages 1-26

Weighted pushdown systems and trust-management systems

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY POLICY; TRUST-MANAGEMENT SYSTEM SPKI/SDSI; WEIGHTED PUSHDOWN SYSTEMS (WPDS);

EID: 33745784544     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11691372_1     Document Type: Conference Paper
Times cited : (6)

References (25)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • M. Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 3-21
    • Abadi, M.1
  • 6
    • 84944409047 scopus 로고    scopus 로고
    • Reachability analysis of pushdown automata: Application to model-checking
    • Proceedings of CONCUR'97. Springer
    • A. Bouajjani, J. Esparza, and O. Maler. Reachability analysis of pushdown automata: Application to model-checking. In Proceedings of CONCUR'97, volume 1243 of Lecture Notes in Computer Science, pages 135-150. Springer, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1243 , pp. 135-150
    • Bouajjani, A.1    Esparza, J.2    Maler, O.3
  • 7
    • 1442308204 scopus 로고    scopus 로고
    • A generic approach to the static analysis of concurrent programs with procedures
    • A. Bouajjani, J. Esparza, and T. Touili. A generic approach to the static analysis of concurrent programs with procedures. In Proceedings of POPL'03, 2003.
    • (2003) Proceedings of POPL'03
    • Bouajjani, A.1    Esparza, J.2    Touili, T.3
  • 10
    • 84944409009 scopus 로고    scopus 로고
    • Efficient algorithms for model checking pushdown systems
    • E. A. Emerson and A. P. Sistla, editors, Proceedings of CAV'2000. Springer, July
    • J. Esparza, D. Hansel, P. Rossmanith, and S. Schwoon. Efficient algorithms for model checking pushdown systems. In E. A. Emerson and A. P. Sistla, editors, Proceedings of CAV'2000, volume 1855 of Lecture Notes in Computer Science, pages 232-247. Springer, July 2000.
    • (2000) Lecture Notes in Computer Science , vol.1855 , pp. 232-247
    • Esparza, J.1    Hansel, D.2    Rossmanith, P.3    Schwoon, S.4
  • 13
    • 0003623954 scopus 로고    scopus 로고
    • A formal semantics for SPKI
    • Department of Computer Science, Dartmouth College, Hanover, NH, Mar.
    • J. Howell and D. Kotz. A formal semantics for SPKI. Technical Report 2000-363, Department of Computer Science, Dartmouth College, Hanover, NH, Mar. 2000.
    • (2000) Technical Report , vol.2000 , Issue.363
    • Howell, J.1    Kotz, D.2
  • 15
    • 3042565619 scopus 로고    scopus 로고
    • Model checking SPKI/SDSI
    • S. Jha and T. Reps. Model checking SPKI/SDSI. Journal of Computer Security, 12(3-4):317-353, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 317-353
    • Jha, S.1    Reps, T.2
  • 20
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • February
    • N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, February 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 21
    • 35448990873 scopus 로고    scopus 로고
    • System description: Twelf - A meta-logical framework for deductive systems
    • H. Ganzinger, editor. Springer-Verlag, LNAI 1632, July
    • F. Pfenning and C. Schürmann. System description: Twelf - a meta-logical framework for deductive systems. In H. Ganzinger, editor, Int. Conf. on Auto. Deduc., pages 202-206. Springer-Verlag, LNAI 1632, July 1999.
    • (1999) Int. Conf. on Auto. Deduc. , pp. 202-206
    • Pfenning, F.1    Schürmann, C.2
  • 23
    • 24344477041 scopus 로고    scopus 로고
    • Weighted pushdown systems and their application to interprocedural dataflow analysis
    • October
    • T. Reps, S. Schwoon, S. Jha, and D. Melski. Weighted pushdown systems and their application to interprocedural dataflow analysis. Science of Computer Programming, 58(1-2):206-263, October 2005.
    • (2005) Science of Computer Programming , vol.58 , Issue.1-2 , pp. 206-263
    • Reps, T.1    Schwoon, S.2    Jha, S.3    Melski, D.4
  • 25
    • 0034835799 scopus 로고    scopus 로고
    • Understanding trust management systems
    • Research in Security and Privacy, Oakland, CA, May. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
    • S. Weeks. Understanding trust management systems. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, Oakland, CA, May 2001. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
    • (2001) Proceedings of the IEEE Symposium on Research in Security and Privacy
    • Weeks, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.