메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 112-123

Secrecy by typing and file-access control

Author keywords

[No Author keywords available]

Indexed keywords

DYNAMIC CHECK; FILE ACCESS CONTROL; FILE SYSTEM;

EID: 33947703717     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2006.28     Document Type: Conference Paper
Times cited : (9)

References (17)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theoretical Computer Science, 298(3):387-415, 2003.
    • (2003) Theoretical Computer Science , vol.298 , Issue.3 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 6
    • 35048879172 scopus 로고    scopus 로고
    • Type based discretionary access control
    • International Conference on Concurrency Theory CONCUR
    • M. Bugliesi, D. Colazzo, and S. Crafa. Type based discretionary access control. In International Conference on Concurrency Theory (CONCUR), pages 225-239. Springer LNCS, 2004.
    • (2004) Springer LNCS , pp. 225-239
    • Bugliesi, M.1    Colazzo, D.2    Crafa, S.3
  • 10
    • 24644447402 scopus 로고    scopus 로고
    • A type discipline for authorization policies
    • European Symposium on Programming ESOP
    • C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. In European Symposium on Programming (ESOP), pages 141-156. Springer LNCS, 2005.
    • (2005) Springer LNCS , pp. 141-156
    • Fournet, C.1    Gordon, A.D.2    Maffeis, S.3
  • 12
    • 0038414953 scopus 로고    scopus 로고
    • Typing correspondence assertions for communication protocols
    • A. D. Gordon and A. Jeffrey. Typing correspondence assertions for communication protocols. Theoretical Computer Science, 300(1-3):379-409, 2003.
    • (2003) Theoretical Computer Science , vol.300 , Issue.1-3 , pp. 379-409
    • Gordon, A.D.1    Jeffrey, A.2
  • 13
    • 0003539084 scopus 로고    scopus 로고
    • Resource access control in systems of mobile agents
    • Elsevier Science Publishers
    • M. Hennessy and J. Riely. Resource access control in systems of mobile agents. In High-Level Concurrent Languages (HLCL), pages 3-17. Elsevier Science Publishers, 1998.
    • (1998) High-Level Concurrent Languages (HLCL) , pp. 3-17
    • Hennessy, M.1    Riely, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.