-
1
-
-
0042467968
-
-
Martín Abadi. Logic in access control. In Proceedings of the Eighteenth Annual IEEE Symposium on Logic in Computer Science, pages 228-233, 2003
-
-
-
-
2
-
-
34247276117
-
-
Martín Abadi. Access control in a core calculus of dependency. In Proceedings of the 11th ACM International Conference on Functional Programming (ICFP 2006), pages 263-273, September 2006
-
-
-
-
3
-
-
0032681509
-
-
Martín Abadi, Anindya Banerjee, Nevin Heintze, and Jon G. Riecke. A core calculus of dependency. In Proceedings of the 26th ACM Symposium on Principles of Programming Languages, pages 147-160, January 1999
-
-
-
-
4
-
-
0027667638
-
A calculus for access control in distributed systems
-
Abadi M., Burrows M., Lampson B., and Plotkin G. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems 15 4 (October 1993) 706-734
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
5
-
-
0033281265
-
-
Andrew W. Appel and Edward W. Felten. Proof-carrying authentication. In Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 52-62, November 1999
-
-
-
-
6
-
-
27544508109
-
-
Lujo Bauer, Scott Garriss, and Michael K. Reiter. Distributed proving in access-control systems. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 81-95, May 2005
-
-
-
-
7
-
-
0001472378
-
Type systems
-
Tucker A.B. (Ed), CRC Press, Boca Raton, FL chapter 103
-
Cardelli L. Type systems. In: Tucker A.B. (Ed). The Computer Science and Engineering Handbook (1997), CRC Press, Boca Raton, FL 2208-2236 chapter 103
-
(1997)
The Computer Science and Engineering Handbook
, pp. 2208-2236
-
-
Cardelli, L.1
-
9
-
-
0036083264
-
-
John DeTreville. Binder, a logic-based security language. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 105-113, May 2002
-
-
-
-
11
-
-
33947650706
-
-
Deepak Garg and Frank Pfenning. Non-interference in constructive authorization logic. A revised version of this paper appears in the Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW 19). Manuscript, February 2006
-
-
-
-
13
-
-
33847791318
-
-
Jean-Yves Girard. Interprétation Fonctionnelle et Elimination des Coupures de l'Arithmétique d'Ordre Supérieur. Thèse de doctorat d'état, Université Paris VII, June 1972
-
-
-
-
14
-
-
84969385445
-
Report on the programming language Haskell: a non-strict, purely functional language
-
Version 1.2
-
Hudak P., Jones S.P., Wadler P., Boutel B., Fairbairn J., Fasel J., Guzmán M.M., Hammond K., Hughes J., Johnsson T., Kieburtz D., Nikhil R., Partain W., and Peterson J. Report on the programming language Haskell: a non-strict, purely functional language. Version 1.2. ACM SIGPLAN Notices 27 5 (1992) 1-164
-
(1992)
ACM SIGPLAN Notices
, vol.27
, Issue.5
, pp. 1-164
-
-
Hudak, P.1
Jones, S.P.2
Wadler, P.3
Boutel, B.4
Fairbairn, J.5
Fasel, J.6
Guzmán, M.M.7
Hammond, K.8
Hughes, J.9
Johnsson, T.10
Kieburtz, D.11
Nikhil, R.12
Partain, W.13
Peterson, J.14
-
15
-
-
0034829512
-
-
Trevor Jim. SD3: A trust management system with certified evaluation. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 106-115, May 2001
-
-
-
-
16
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson B., Abadi M., Burrows M., and Wobberm E. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems 10 4 (November 1992) 265-310
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobberm, E.4
-
17
-
-
17544394392
-
Computer security in the real world
-
Lampson B.W. Computer security in the real world. IEEE Computer 37 6 (June 2004) 37-46
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B.W.1
-
18
-
-
33847769623
-
-
David Langworthy. Private communication. February 2006
-
-
-
-
20
-
-
35248834606
-
Datalog with constraints: A foundation for trust-management languages
-
Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages. (PADL 2003), Springer-Verlag
-
Li N., and Mitchell J.C. Datalog with constraints: A foundation for trust-management languages. Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages. (PADL 2003). Lecture Notes in Computer Science volume 2562 (January 2003), Springer-Verlag 58-73
-
(2003)
Lecture Notes in Computer Science
, vol.2562
, pp. 58-73
-
-
Li, N.1
Mitchell, J.C.2
-
22
-
-
0026188821
-
Notions of computation and monads
-
Moggi E. Notions of computation and monads. Information and Control 93 1 (1991) 55-92
-
(1991)
Information and Control
, vol.93
, Issue.1
, pp. 55-92
-
-
Moggi, E.1
-
23
-
-
0032646625
-
-
Andrew C. Myers. JFlow: Practical mostly-static information flow control. In Proceedings of the 26th ACM Symposium on Principles of Programming Languages, pages 228-241, January 1999
-
-
-
-
24
-
-
18944377121
-
Call-by-name, call-by-value and the λ-calculus
-
Plotkin G.D. Call-by-name, call-by-value and the λ-calculus. Theoretical Computer Science 1 (1975) 125-159
-
(1975)
Theoretical Computer Science
, vol.1
, pp. 125-159
-
-
Plotkin, G.D.1
-
25
-
-
0034545418
-
-
François Pottier and Sylvain Conchon. Information flow inference for free. In Proceedings of the Fifth ACM SIGPLAN International Conference on Functional Programming, pages 46-57, September 2000
-
-
-
-
27
-
-
33847774772
-
-
Stephen Tse and Steve Zdancewic. Translating dependency into parametricity. Journal of Functional Programming. To appear
-
-
-
-
28
-
-
17244377166
-
-
Philip Wadler. The marriage of effects and monads. In Proceedings of the 3rd ACM SIGPLAN International Conference on Functional Programming, pages 63-74, 1998
-
-
-
-
30
-
-
0028380781
-
Authentication in the Taos operating system
-
Wobber E., Abadi M., Burrows M., and Lampson B. Authentication in the Taos operating system. ACM Transactions on Computer Systems 12 1 (February 1994) 3-32
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
31
-
-
33847779101
-
-
Steve Zdancewic. Private communication. August 2006
-
-
-
|