메뉴 건너뛰기




Volumn 4137 LNCS, Issue , 2006, Pages 263-278

Dynamic access control in a concurrent object calculus

Author keywords

[No Author keywords available]

Indexed keywords

CONCURRENCY CONTROL; DATA PRIVACY; RESOURCE ALLOCATION;

EID: 33749574802     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11817949_18     Document Type: Conference Paper
Times cited : (4)

References (33)
  • 1
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theoretical Computer Science, 298(3):387-415, 2003.
    • (2003) Theoretical Computer Science , vol.298 , Issue.3 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 3
    • 33947655397 scopus 로고    scopus 로고
    • Using access control for secure information flow in a Java-like language
    • IEEE
    • A. Banerjee and D. Naumann. Using access control for secure information flow in a Java-like language. In CSFW'03: Computer Security Foundations Workshop, pages 155-169. IEEE, 2003.
    • (2003) CSFW'03: Computer Security Foundations Workshop , pp. 155-169
    • Banerjee, A.1    Naumann, D.2
  • 15
    • 27244444891 scopus 로고    scopus 로고
    • Secrecy despite compromise: Types, cryptography, and the pi-calculus
    • Springer
    • A. D. Gordon and A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the pi-calculus. In CONCUR'05: Concurrency Theory, pages 186-201. Springer, 2005.
    • (2005) CONCUR'05: Concurrency Theory , pp. 186-201
    • Gordon, A.D.1    Jeffrey, A.2
  • 17
    • 27244455595 scopus 로고    scopus 로고
    • Timed spi-calculus with types for secrecy and authenticity
    • Springer
    • C. Haack and A. Jeffrey. Timed spi-calculus with types for secrecy and authenticity. In CONCUR'05: Concurrency Theory, pages 202-216. Springer, 2005.
    • (2005) CONCUR'05: Concurrency Theory , pp. 202-216
    • Haack, C.1    Jeffrey, A.2
  • 21
  • 25
    • 85009120801 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • Springer
    • G. Miklau and D. Suciu. Controlling access to published data using cryptography. In VLDB'03: Very Large Data Bases, pages 898-909. Springer, 2003.
    • (2003) VLDB'03: Very Large Data Bases , pp. 898-909
    • Miklau, G.1    Suciu, D.2
  • 30
    • 33749550010 scopus 로고
    • Naming and protection in extendible operating systems
    • Project MAC, MIT
    • D. D. Redell. Naming and protection in extendible operating systems. Technical Report 140, Project MAC, MIT, 1974.
    • (1974) Technical Report , vol.140
    • Redell, D.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.