-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
Oct
-
M. Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, Oct. 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 3-21
-
-
Abadi, M.1
-
3
-
-
0032681509
-
A core calculus of dependency
-
San Antonio, Texas, Jan, ACM Press
-
M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke. A core calculus of dependency. In Conference Record of the 26th Sympoisum on Principles Of Programming Languages (POPL'99), pages 147-160, San Antonio, Texas, Jan. 1999. ACM Press.
-
(1999)
Conference Record of the 26th Sympoisum on Principles Of Programming Languages (POPL'99)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
4
-
-
0027667638
-
A calculus for access control in distributed systems
-
Oct
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, Oct. 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
5
-
-
0033281265
-
Proof-carrying authentication
-
G. Tsudik, editor, Singapore, Nov, ACM Press
-
A. W. Appel and E. W. Felten. Proof-carrying authentication. In G. Tsudik, editor, Proceedings of the 6th Conference on Computer and Communications Security, pages 52-62, Singapore, Nov. 1999. ACM Press.
-
(1999)
Proceedings of the 6th Conference on Computer and Communications Security
, pp. 52-62
-
-
Appel, A.W.1
Felten, E.W.2
-
7
-
-
33750236737
-
Consumable credentials in logic-based access control
-
Technical Report CMU-CYLAB-06-002, Carnegie Mellon University, Feb
-
L. Bauer, K. D. Bowers, F. Pfenning, and M. K. Reiter. Consumable credentials in logic-based access control. Technical Report CMU-CYLAB-06-002, Carnegie Mellon University, Feb. 2006.
-
(2006)
-
-
Bauer, L.1
Bowers, K.D.2
Pfenning, F.3
Reiter, M.K.4
-
8
-
-
33645995393
-
Device-enabled authorization in the Grey system
-
Proceedings of the 8th Information Security Conference ISC'05, Singapore, Sept, Springer Verlag
-
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the Grey system. In Proceedings of the 8th Information Security Conference (ISC'05), pages 431-445, Singapore, Sept. 2005. Springer Verlag LNCS 3650.
-
(2005)
LNCS
, vol.3650
, pp. 431-445
-
-
Bauer, L.1
Garriss, S.2
McCune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
9
-
-
27544508109
-
Distributed proving in access-control systems
-
V.Paxon and M.Waidner, editors, Oakland, California, May, IEEE Computer Society Press
-
L. Bauer, S. Garriss, and M. K. Reiter. Distributed proving in access-control systems. In V.Paxon and M.Waidner, editors, Proceedings of the 2005 Symposium on Security and Privacy (S&P'05), pages 81-95, Oakland, California, May 2005. IEEE Computer Society Press.
-
(2005)
Proceedings of the 2005 Symposium on Security and Privacy (S&P'05)
, pp. 81-95
-
-
Bauer, L.1
Garriss, S.2
Reiter, M.K.3
-
10
-
-
0041524664
-
A logical framework for reasoning about access control models
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. ACM Trans. Inf. Syst. Secur., 6(1):71-127, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
12
-
-
0035657915
-
A logic of access control
-
J. Crampton, G. Loizou, and G. O. Shea. A logic of access control. The Computer Journal, 44(1): 137-149, 2001.
-
(2001)
The Computer Journal
, vol.44
, Issue.1
, pp. 137-149
-
-
Crampton, J.1
Loizou, G.2
Shea, G.O.3
-
13
-
-
0036083264
-
Binder, a logic-based security language
-
M.Abadi and S.Bellovin, editors, Berkeley, California, May, IEEE Computer Society Press
-
J. DeTreville. Binder, a logic-based security language. In M.Abadi and S.Bellovin, editors, Proceedings of the 2002 Symposium on Security and Privacy (S&P'02), pages 105-113, Berkeley, California, May 2002. IEEE Computer Society Press.
-
(2002)
Proceedings of the 2002 Symposium on Security and Privacy (S&P'02)
, pp. 105-113
-
-
DeTreville, J.1
-
15
-
-
27944496797
-
Untersuchungen über das logische Schließen
-
G. Gentzen. Untersuchungen über das logische Schließen. Mathematische Zeitschrift, 39:176-210, 405-431, 1935.
-
(1935)
Mathematische Zeitschrift
, vol.39
-
-
Gentzen, G.1
-
16
-
-
33947616273
-
-
English translation in M. E. Szabo, editor, The Collected Papers of Gerhard Gentzen, pages 68-131, North-Holland, 1969.
-
English translation in M. E. Szabo, editor, The Collected Papers of Gerhard Gentzen, pages 68-131, North-Holland, 1969.
-
-
-
-
17
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1): 128-171, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
19
-
-
0002140364
-
On the meanings of the logical constants and the justifications of the logical laws
-
P. Martin-Löf. On the meanings of the logical constants and the justifications of the logical laws. Nordic Journal of Philosophical Logic, 1(1): 11-60, 1996.
-
(1996)
Nordic Journal of Philosophical Logic
, vol.1
, Issue.1
, pp. 11-60
-
-
Martin-Löf, P.1
-
20
-
-
0026188821
-
Notions of computation and monads
-
E. Moggi. Notions of computation and monads. Information and Computation, 93(1):55-92, 1991.
-
(1991)
Information and Computation
, vol.93
, Issue.1
, pp. 55-92
-
-
Moggi, E.1
-
21
-
-
0034711981
-
Structural cut elimination I. Intuitionistic and classical logic
-
Mar
-
F. Pfenning. Structural cut elimination I. Intuitionistic and classical logic. Information and Computation, 157(1/2):84-141, Mar. 2000.
-
(2000)
Information and Computation
, vol.157
, Issue.1-2
, pp. 84-141
-
-
Pfenning, F.1
-
23
-
-
33947636126
-
-
Notes to an invited talk at the Workshop on Intuitionistic Modal Logics and Applications (IMLA'99), Trento, Italy, July 1999.
-
Notes to an invited talk at the Workshop on Intuitionistic Modal Logics and Applications (IMLA'99), Trento, Italy, July 1999.
-
-
-
-
24
-
-
35448990873
-
System description: Twelf - a meta-logical framework for deductive systems
-
H. Ganzinger, editor, Proceedings of the 16th International Conference on Automated Deduction CADE-16, Trento, Italy, July, Springer-Verlag
-
F. Pfenning and C. Schürmann. System description: Twelf - a meta-logical framework for deductive systems. In H. Ganzinger, editor, Proceedings of the 16th International Conference on Automated Deduction (CADE-16), pages 202-206, Trento, Italy, July 1999. Springer-Verlag LNAI 1632.
-
(1632)
LNAI
, pp. 202-206
-
-
Pfenning, F.1
Schürmann, C.2
-
27
-
-
12344320856
-
A concurrent logical framework I: Judgments and properties
-
Technical Report CMU-CS-02-101, Department of Computer Science, Carnegie Mellon University, 2002. Revised May
-
K. Watkins, I. Cervesato, F. Pfenning, and D. Walker. A concurrent logical framework I: Judgments and properties. Technical Report CMU-CS-02-101, Department of Computer Science, Carnegie Mellon University, 2002. Revised May 2003.
-
(2003)
-
-
Watkins, K.1
Cervesato, I.2
Pfenning, F.3
Walker, D.4
|