-
1
-
-
0037432692
-
Secrecy types for asymmetric communication
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theoretical Computer Science, 298(3):387-415, 2003.
-
(2003)
Theoretical Computer Science
, vol.298
, Issue.3
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
33947655397
-
Using access control for secure information flow in a Java-like language
-
IEEE
-
A. Banerjee and D. Naumann. Using access control for secure information flow in a Java-like language. In CSFW'03: Computer Security Foundations Workshop, pages 155-169. IEEE, 2003.
-
(2003)
CSFW'03: Computer Security Foundations Workshop
, pp. 155-169
-
-
Banerjee, A.1
Naumann, D.2
-
5
-
-
0034228725
-
A control-flow analysis for a calculus of concurrent objects
-
P. D. Blasio, K. Fisher, and C. Talcott. A control-flow analysis for a calculus of concurrent objects. IEEE Transactions on Software Engineering, 26(7):617-634, 2000.
-
(2000)
IEEE Transactions on Software Engineering
, vol.26
, Issue.7
, pp. 617-634
-
-
Blasio, P.D.1
Fisher, K.2
Talcott, C.3
-
7
-
-
1342347429
-
Access control for mobile agents: The calculus of boxed ambients
-
M. Bugliesi, G. Castagna, and S. Crafa. Access control for mobile agents: The calculus of boxed ambients. ACM Transactions on Programming Languages and Systems, 26(1 ):57-124,2004.
-
(2004)
ACM Transactions on Programming Languages and Systems
, vol.26
, Issue.1
, pp. 57-124
-
-
Bugliesi, M.1
Castagna, G.2
Crafa, S.3
-
9
-
-
12444303307
-
Secrecy and group creation
-
L. Cardelli, G. Ghelli, and A. D. Gordon. Secrecy and group creation. Information and Computation, 196(2):127-155, 2005.
-
(2005)
Information and Computation
, vol.196
, Issue.2
, pp. 127-155
-
-
Cardelli, L.1
Ghelli, G.2
Gordon, A.D.3
-
15
-
-
27244444891
-
Secrecy despite compromise: Types, cryptography, and the pi-calculus
-
Springer
-
A. D. Gordon and A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the pi-calculus. In CONCUR'05: Concurrency Theory, pages 186-201. Springer, 2005.
-
(2005)
CONCUR'05: Concurrency Theory
, pp. 186-201
-
-
Gordon, A.D.1
Jeffrey, A.2
-
17
-
-
27244455595
-
Timed spi-calculus with types for secrecy and authenticity
-
Springer
-
C. Haack and A. Jeffrey. Timed spi-calculus with types for secrecy and authenticity. In CONCUR'05: Concurrency Theory, pages 202-216. Springer, 2005.
-
(2005)
CONCUR'05: Concurrency Theory
, pp. 202-216
-
-
Haack, C.1
Jeffrey, A.2
-
25
-
-
85009120801
-
Controlling access to published data using cryptography
-
Springer
-
G. Miklau and D. Suciu. Controlling access to published data using cryptography. In VLDB'03: Very Large Data Bases, pages 898-909. Springer, 2003.
-
(2003)
VLDB'03: Very Large Data Bases
, pp. 898-909
-
-
Miklau, G.1
Suciu, D.2
-
28
-
-
0000413440
-
Types for access control
-
R. D. Nicola, G. Ferrari, R. Pugliese, and B. Venneri. Types for access control. Theoretical Computer Science, 240(1):215-254, 2000.
-
(2000)
Theoretical Computer Science
, vol.240
, Issue.1
, pp. 215-254
-
-
Nicola, R.D.1
Ferrari, G.2
Pugliese, R.3
Venneri, B.4
-
29
-
-
27844549441
-
A systematic approach to static access control
-
F. Pottier, C. Skalka, and S. Smith. A systematic approach to static access control. ACM Transactions on Programming Languages and Systems, 27(2):344-382, 2005.
-
(2005)
ACM Transactions on Programming Languages and Systems
, vol.27
, Issue.2
, pp. 344-382
-
-
Pottier, F.1
Skalka, C.2
Smith, S.3
-
30
-
-
33749550010
-
Naming and protection in extendible operating systems
-
Project MAC, MIT
-
D. D. Redell. Naming and protection in extendible operating systems. Technical Report 140, Project MAC, MIT, 1974.
-
(1974)
Technical Report
, vol.140
-
-
Redell, D.D.1
|