메뉴 건너뛰기




Volumn 4189 LNCS, Issue , 2006, Pages 297-312

A linear logic of authorization and knowledge

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; INFERENCE ENGINES; KNOWLEDGE ENGINEERING; MATHEMATICAL MODELS; MODAL ANALYSIS; SECURITY SYSTEMS;

EID: 33750280592     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11863908_19     Document Type: Conference Paper
Times cited : (44)

References (20)
  • 1
    • 84941155390 scopus 로고    scopus 로고
    • Personal communication
    • Martín Abadi. Personal communication.
    • Abadi, M.1
  • 5
    • 0000421604 scopus 로고
    • Logic programming with focusing proofs in linear logic
    • Jean-Marc Andreoli. Logic programming with focusing proofs in linear logic. Journal of Logic and Computation, 2(3):297-347, 1992.
    • (1992) Journal of Logic and Computation , vol.2 , Issue.3 , pp. 297-347
    • Andreoli, J.-M.1
  • 8
    • 33750236737 scopus 로고    scopus 로고
    • Consumable credentials in logic-based access control
    • Carnegie Mellon University, February
    • Lujo Bauer, Kevin D. Bowers, Frank Pfenning, and Michael K. Reiter. Consumable credentials in logic-based access control. Technical Report CMU-CYLAB-06-002, Carnegie Mellon University, February 2006.
    • (2006) Technical Report , vol.CMU-CYLAB-06-002
    • Bauer, L.1    Bowers, K.D.2    Pfenning, F.3    Reiter, M.K.4
  • 9
    • 0041524664 scopus 로고    scopus 로고
    • A logical frame-work for reasoning about access control models
    • Elisa Bertino, Barbara Catania, Elena Ferrari, and Paolo Perlasca. A logical frame-work for reasoning about access control models. ACM Trans. Inf. Syst. Secur., 6(1):71-127, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.1 , pp. 71-127
    • Bertino, E.1    Catania, B.2    Ferrari, E.3    Perlasca, P.4
  • 10
    • 11944275908 scopus 로고    scopus 로고
    • Relating multiset rewriting and process algebras for security protocol analysis
    • February
    • Stefane Bistarelli, Iliano Cervesato, Gabriele Lenzini, and Fabio Martinelli. Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis. Journal of Computer Security, 13:3-47, February 2005.
    • (2005) Journal of Computer Security , vol.13 , pp. 3-47
    • Bistarelli, S.1    Cervesato, I.2    Lenzini, G.3    Martinelli, F.4
  • 11
    • 26944457536 scopus 로고    scopus 로고
    • A judgmental analysis of linear logic
    • Submitted. December
    • Bor-Yuh Evan Chang, Kaustuv Chaudhuri, and Frank Pfenning. A judgmental analysis of linear logic. Submitted. Extended version available as Technical Report CMU-CS-03-131R, December 2003.
    • (2003) Technical Report , vol.CMU-CS-03-131R
    • Chang, B.-Y.E.1    Chaudhuri, K.2    Pfenning, F.3
  • 13
    • 0036083264 scopus 로고    scopus 로고
    • Binder, a logic-based security language
    • M.Abadi and S.Bellovin, editors, Berkeley, California, May IEEE Computer Society Press
    • John DeTreville. Binder, a logic-based security language. In M.Abadi and S.Bellovin, editors, Proceedings of the 2002 Symposium on Security and Privacy (S&P'02), pages 105-113, Berkeley, California, May 2002. IEEE Computer Society Press.
    • (2002) Proceedings of the 2002 Symposium on Security and Privacy (S&P'02) , pp. 105-113
    • DeTreville, J.1
  • 15
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • Ninghui Li, Benjamin N. Grosof, and Joan Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1):128-171, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 18
    • 0034711981 scopus 로고    scopus 로고
    • Structural cut elimination I. Intuitionistic and classical logic
    • March
    • Frank Pfenning. Structural cut elimination I. Intuitionistic and classical logic. Information and Computation, 157(1/2):84-141, March 2000.
    • (2000) Information and Computation , vol.157 , Issue.1-2 , pp. 84-141
    • Pfenning, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.