-
1
-
-
84941155390
-
-
Personal communication
-
Martín Abadi. Personal communication.
-
-
-
Abadi, M.1
-
3
-
-
0032681509
-
A core calculus of dependency
-
San Antonio, Texas, January ACM Press
-
Martin Abadi, Anindya Banerjee, Nevin Heintze, and Jon G. Riecke. A core calculus of dependency. In Conference Record of the 26th Sympoisum on Principles Of Programming Languages (POPL'99), pages 147-160, San Antonio, Texas, January 1999. ACM Press.
-
(1999)
Conference Record of the 26th Sympoisum on Principles of Programming Languages (POPL'99)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
4
-
-
0027667638
-
A calculus for access control in distributed systems
-
October
-
Martín Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, October 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
5
-
-
0000421604
-
Logic programming with focusing proofs in linear logic
-
Jean-Marc Andreoli. Logic programming with focusing proofs in linear logic. Journal of Logic and Computation, 2(3):297-347, 1992.
-
(1992)
Journal of Logic and Computation
, vol.2
, Issue.3
, pp. 297-347
-
-
Andreoli, J.-M.1
-
6
-
-
0033281265
-
Proof-carrying authentication
-
G. Tsudik, editor, Singapore, November ACM Press
-
Andrew W. Appel and Edward W. Felten. Proof-carrying authentication. In G. Tsudik, editor, Proceedings of the 6th Conference on Computer and Communications Security, pages 52-62, Singapore, November 1999. ACM Press.
-
(1999)
Proceedings of the 6th Conference on Computer and Communications Security
, pp. 52-62
-
-
Appel, A.W.1
Felten, E.W.2
-
8
-
-
33750236737
-
Consumable credentials in logic-based access control
-
Carnegie Mellon University, February
-
Lujo Bauer, Kevin D. Bowers, Frank Pfenning, and Michael K. Reiter. Consumable credentials in logic-based access control. Technical Report CMU-CYLAB-06-002, Carnegie Mellon University, February 2006.
-
(2006)
Technical Report
, vol.CMU-CYLAB-06-002
-
-
Bauer, L.1
Bowers, K.D.2
Pfenning, F.3
Reiter, M.K.4
-
9
-
-
0041524664
-
A logical frame-work for reasoning about access control models
-
Elisa Bertino, Barbara Catania, Elena Ferrari, and Paolo Perlasca. A logical frame-work for reasoning about access control models. ACM Trans. Inf. Syst. Secur., 6(1):71-127, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
10
-
-
11944275908
-
Relating multiset rewriting and process algebras for security protocol analysis
-
February
-
Stefane Bistarelli, Iliano Cervesato, Gabriele Lenzini, and Fabio Martinelli. Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis. Journal of Computer Security, 13:3-47, February 2005.
-
(2005)
Journal of Computer Security
, vol.13
, pp. 3-47
-
-
Bistarelli, S.1
Cervesato, I.2
Lenzini, G.3
Martinelli, F.4
-
11
-
-
26944457536
-
A judgmental analysis of linear logic
-
Submitted. December
-
Bor-Yuh Evan Chang, Kaustuv Chaudhuri, and Frank Pfenning. A judgmental analysis of linear logic. Submitted. Extended version available as Technical Report CMU-CS-03-131R, December 2003.
-
(2003)
Technical Report
, vol.CMU-CS-03-131R
-
-
Chang, B.-Y.E.1
Chaudhuri, K.2
Pfenning, F.3
-
12
-
-
0035657915
-
A logic of access control
-
Jason Crampton, George Loizou, and Greg O' Shea. A logic of access control. The Computer Journal, 44(1):137-149, 2001.
-
(2001)
The Computer Journal
, vol.44
, Issue.1
, pp. 137-149
-
-
Crampton, J.1
Loizou, G.2
O'Shea, G.3
-
13
-
-
0036083264
-
Binder, a logic-based security language
-
M.Abadi and S.Bellovin, editors, Berkeley, California, May IEEE Computer Society Press
-
John DeTreville. Binder, a logic-based security language. In M.Abadi and S.Bellovin, editors, Proceedings of the 2002 Symposium on Security and Privacy (S&P'02), pages 105-113, Berkeley, California, May 2002. IEEE Computer Society Press.
-
(2002)
Proceedings of the 2002 Symposium on Security and Privacy (S&P'02)
, pp. 105-113
-
-
DeTreville, J.1
-
15
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Ninghui Li, Benjamin N. Grosof, and Joan Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1):128-171, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
17
-
-
33744908423
-
Monadic concurrent linear logic programming
-
Lisbon, Portugal
-
Pablo López, Frank Pfenning, Jeff Polakow, and Kevin Watkins. Monadic concurrent linear logic programming. In Proceedings of the 7th International Symposium on Principles and Practice of Declarative Programming (PPDP'05), Lisbon, Portugal, 2005.
-
(2005)
Proceedings of the 7th International Symposium on Principles and Practice of Declarative Programming (PPDP'05)
-
-
López, P.1
Pfenning, F.2
Polakow, J.3
Watkins, K.4
-
18
-
-
0034711981
-
Structural cut elimination I. Intuitionistic and classical logic
-
March
-
Frank Pfenning. Structural cut elimination I. Intuitionistic and classical logic. Information and Computation, 157(1/2):84-141, March 2000.
-
(2000)
Information and Computation
, vol.157
, Issue.1-2
, pp. 84-141
-
-
Pfenning, F.1
|