-
1
-
-
0042467968
-
Logic in access control
-
ABADI, M. Logic in access control. In LICS [16], pp. 228-233.
-
LICS [16]
, pp. 228-233
-
-
Abadi, M.1
-
4
-
-
0347526057
-
A tutorial on proof theoretic foundations of logic programming
-
ICLP C. Palamidessi, Ed., Springer
-
BRUSCOLI, P., AND GUGLIELMI, A. A tutorial on proof theoretic foundations of logic programming. In ICLP (2003), C. Palamidessi, Ed., vol. 2916 of Lecture Notes in Computer Science, Springer, pp. 109-127.
-
(2003)
Lecture Notes in Computer Science
, vol.2916
, pp. 109-127
-
-
Bruscoli, P.1
Guglielmi, A.2
-
8
-
-
33244470893
-
Verification and change impact analysis of access-control policies
-
May
-
FISLER, K., KRISHNAMURTHI, S., MEYEROVICH, L. A., AND TSCHANTZ, M. C. Verification and change impact analysis of access-control policies. In International Conference on Software Engineering (May 2005).
-
(2005)
International Conference on Software Engineering
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
12
-
-
84858926178
-
-
Feb. The working server with Soutei Authorization can be accessed via http://www.metnet.navy.mil/cgi-bin/oleg/server
-
KISELYOV, O. Metcast Channels. http://www.metnet.navy.mil/Metcast/Metcast-Channels.html, Feb. 2003. The working server with Soutei Authorization can be accessed via http://www.metnet.navy.mil/cgi-bin/oleg/server.
-
(2003)
Metcast Channels
-
-
Kiselyov, O.1
-
14
-
-
33746031730
-
Backtracking, interleaving, and terminating monad transformers
-
ACM Press
-
KISELYOV, O., SHAN, C., FRIEDMAN, D. P., AND SABRY, A. Backtracking, interleaving, and terminating monad transformers. In ICFP '05: ACM SIGPLAN International Conference on Functional Programming (2005), ACM Press.
-
(2005)
ICFP '05: ACM SIGPLAN International Conference on Functional Programming
-
-
Kiselyov, O.1
Shan, C.2
Friedman, D.P.3
Sabry, A.4
-
15
-
-
35248834606
-
Datalog with constraints: A foundation for trust management languages
-
PADL V. Dahl and P. Wadler, Eds., Springer
-
LI, N., AND MITCHELL, J. C. Datalog with constraints: A foundation for trust management languages. In PADL (2003), V. Dahl and P. Wadler, Eds., vol. 2562 of Lecture Notes in Computer Science, Springer, pp. 58-73.
-
(2003)
Lecture Notes in Computer Science
, vol.2562
, pp. 58-73
-
-
Li, N.1
Mitchell, J.C.2
-
17
-
-
0042969226
-
A proof theory for generic judgments: An extended abstract
-
MILLER, D., AND TIU, A. F. A proof theory for generic judgments: An extended abstract. In LICS [16], pp. 118-127.
-
LICS [16]
, pp. 118-127
-
-
Miller, D.1
Tiu, A.F.2
-
18
-
-
33745847877
-
Embedding prolog in haskell
-
E. Meier, Ed., Tech. Rep. UU-CS-1999-28, Department of Computer Science, Utrecht University
-
SERES, S., AND SPIVEY, J. M. Embedding Prolog in Haskell. In Proceedings of the 1999 Haskell Workshop (1999), E. Meier, Ed., Tech. Rep. UU-CS-1999-28, Department of Computer Science, Utrecht University.
-
(1999)
Proceedings of the 1999 Haskell Workshop
-
-
Seres, S.1
Spivey, J.M.2
-
19
-
-
33745850523
-
Life without firewalls
-
Dec.
-
SINGER, A. Life without firewalls. USENIX ;login: 28, 6 (Dec. 2003), 34-41.
-
(2003)
USENIX; Login
, vol.28
, Issue.6
, pp. 34-41
-
-
Singer, A.1
-
20
-
-
0030262017
-
The execution algorithm of Mercury, an efficient purely declarative logic programming language
-
SOMOGYI, Z., HENDERSON, F., AND CONWAY, T. The execution algorithm of Mercury, an efficient purely declarative logic programming language. J. Log. Program. 29, 1-3 (1996), 17-64.
-
(1996)
J. Log. Program.
, vol.29
, Issue.1-3
, pp. 17-64
-
-
Somogyi, Z.1
Henderson, F.2
Conway, T.3
-
21
-
-
85034994733
-
How to replace failure by a list of successes: A method for exception handling, backtracking, and pattern matching in lazy functional languages
-
WADLER, P. How to replace failure by a list of successes: A method for exception handling, backtracking, and pattern matching in lazy functional languages. In FPCA (1985), pp. 113-128.
-
(1985)
FPCA
, pp. 113-128
-
-
Wadler, P.1
-
22
-
-
0037726388
-
Terminology for policy-based management
-
Nov.
-
WESTERINEN, A., SCHNIZLEIN, J., STRASSNER, J., SCHERLING, M., QUINN, B., HERZOG, S., HUYNH, A., CARLSON, M., PERRY, J., AND WALDBUSSER, S. Terminology for policy-based management. RFC 3198, Nov. 2001.
-
(2001)
RFC
, vol.3198
-
-
Westerinen, A.1
Schnizlein, J.2
Strassner, J.3
Scherling, M.4
Quinn, B.5
Herzog, S.6
Huynh, A.7
Carlson, M.8
Perry, J.9
Waldbusser, S.10
-
23
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
WOOL, A. A quantitative study of firewall configuration errors. IEEE Computer 37, 6 (2004), 62-67.
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 62-67
-
-
Wool, A.1
|