메뉴 건너뛰기




Volumn 172, Issue , 2007, Pages 5-31

Access Control in a Core Calculus of Dependency

Author keywords

Authorization; Types

Indexed keywords

DEPENDENCY CORE CALCULUS (DCC); LAMBDA CALCULUS;

EID: 33847791903     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2007.02.002     Document Type: Article
Times cited : (42)

References (31)
  • 1
    • 0042467968 scopus 로고    scopus 로고
    • Martín Abadi. Logic in access control. In Proceedings of the Eighteenth Annual IEEE Symposium on Logic in Computer Science, pages 228-233, 2003
  • 2
    • 34247276117 scopus 로고    scopus 로고
    • Martín Abadi. Access control in a core calculus of dependency. In Proceedings of the 11th ACM International Conference on Functional Programming (ICFP 2006), pages 263-273, September 2006
  • 3
    • 0032681509 scopus 로고    scopus 로고
    • Martín Abadi, Anindya Banerjee, Nevin Heintze, and Jon G. Riecke. A core calculus of dependency. In Proceedings of the 26th ACM Symposium on Principles of Programming Languages, pages 147-160, January 1999
  • 5
    • 0033281265 scopus 로고    scopus 로고
    • Andrew W. Appel and Edward W. Felten. Proof-carrying authentication. In Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 52-62, November 1999
  • 6
    • 27544508109 scopus 로고    scopus 로고
    • Lujo Bauer, Scott Garriss, and Michael K. Reiter. Distributed proving in access-control systems. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 81-95, May 2005
  • 7
    • 0001472378 scopus 로고    scopus 로고
    • Type systems
    • Tucker A.B. (Ed), CRC Press, Boca Raton, FL chapter 103
    • Cardelli L. Type systems. In: Tucker A.B. (Ed). The Computer Science and Engineering Handbook (1997), CRC Press, Boca Raton, FL 2208-2236 chapter 103
    • (1997) The Computer Science and Engineering Handbook , pp. 2208-2236
    • Cardelli, L.1
  • 9
    • 0036083264 scopus 로고    scopus 로고
    • John DeTreville. Binder, a logic-based security language. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 105-113, May 2002
  • 11
    • 33947650706 scopus 로고    scopus 로고
    • Deepak Garg and Frank Pfenning. Non-interference in constructive authorization logic. A revised version of this paper appears in the Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW 19). Manuscript, February 2006
  • 13
    • 33847791318 scopus 로고    scopus 로고
    • Jean-Yves Girard. Interprétation Fonctionnelle et Elimination des Coupures de l'Arithmétique d'Ordre Supérieur. Thèse de doctorat d'état, Université Paris VII, June 1972
  • 15
    • 0034829512 scopus 로고    scopus 로고
    • Trevor Jim. SD3: A trust management system with certified evaluation. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 106-115, May 2001
  • 17
    • 17544394392 scopus 로고    scopus 로고
    • Computer security in the real world
    • Lampson B.W. Computer security in the real world. IEEE Computer 37 6 (June 2004) 37-46
    • (2004) IEEE Computer , vol.37 , Issue.6 , pp. 37-46
    • Lampson, B.W.1
  • 18
    • 33847769623 scopus 로고    scopus 로고
    • David Langworthy. Private communication. February 2006
  • 20
    • 35248834606 scopus 로고    scopus 로고
    • Datalog with constraints: A foundation for trust-management languages
    • Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages. (PADL 2003), Springer-Verlag
    • Li N., and Mitchell J.C. Datalog with constraints: A foundation for trust-management languages. Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages. (PADL 2003). Lecture Notes in Computer Science volume 2562 (January 2003), Springer-Verlag 58-73
    • (2003) Lecture Notes in Computer Science , vol.2562 , pp. 58-73
    • Li, N.1    Mitchell, J.C.2
  • 22
    • 0026188821 scopus 로고
    • Notions of computation and monads
    • Moggi E. Notions of computation and monads. Information and Control 93 1 (1991) 55-92
    • (1991) Information and Control , vol.93 , Issue.1 , pp. 55-92
    • Moggi, E.1
  • 23
    • 0032646625 scopus 로고    scopus 로고
    • Andrew C. Myers. JFlow: Practical mostly-static information flow control. In Proceedings of the 26th ACM Symposium on Principles of Programming Languages, pages 228-241, January 1999
  • 24
    • 18944377121 scopus 로고
    • Call-by-name, call-by-value and the λ-calculus
    • Plotkin G.D. Call-by-name, call-by-value and the λ-calculus. Theoretical Computer Science 1 (1975) 125-159
    • (1975) Theoretical Computer Science , vol.1 , pp. 125-159
    • Plotkin, G.D.1
  • 25
    • 0034545418 scopus 로고    scopus 로고
    • François Pottier and Sylvain Conchon. Information flow inference for free. In Proceedings of the Fifth ACM SIGPLAN International Conference on Functional Programming, pages 46-57, September 2000
  • 27
    • 33847774772 scopus 로고    scopus 로고
    • Stephen Tse and Steve Zdancewic. Translating dependency into parametricity. Journal of Functional Programming. To appear
  • 28
    • 17244377166 scopus 로고    scopus 로고
    • Philip Wadler. The marriage of effects and monads. In Proceedings of the 3rd ACM SIGPLAN International Conference on Functional Programming, pages 63-74, 1998
  • 31
    • 33847779101 scopus 로고    scopus 로고
    • Steve Zdancewic. Private communication. August 2006


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.