-
1
-
-
0003650163
-
-
Cambridge University Press, New York, NY, USA
-
Baader F., and Nipkow T. Term rewriting and all that (1998), Cambridge University Press, New York, NY, USA
-
(1998)
Term rewriting and all that
-
-
Baader, F.1
Nipkow, T.2
-
2
-
-
33746684330
-
Term rewriting for access control
-
DBSec. Damiani E., and Liu P. (Eds)
-
Barker S., and Fernández M. Term rewriting for access control. In: Damiani E., and Liu P. (Eds). DBSec. Lecture Notes in Computer Science 4127 (2006) 179-193
-
(2006)
Lecture Notes in Computer Science
, vol.4127
, pp. 179-193
-
-
Barker, S.1
Fernández, M.2
-
3
-
-
33745267229
-
-
Bauer, L., J. Ligatti and D. Walker, Composing security policies with polymer., in: V. Sarkar and M.W. Hall, editors, PLDI (2005), pp. 305-314
-
-
-
-
4
-
-
34250830678
-
-
Bell, E. D. and L.J. LaPadula, Secure computer systems: Mathematical foundations, Technical Report Mitre Report ESD-TR-73-278 (Vol. I-III), Mitre Corporation (1974)
-
-
-
-
6
-
-
34250857759
-
-
Bouhoula, A. and F. Jacquemard, Automatic verification of sufficient completeness for conditional constrained term rewriting systems, Technical Report RR-5863, INRIA (2006). URL http://hal.inria.fr/inria-00070163/en/
-
-
-
-
7
-
-
84949232265
-
Specifying authentication protocols using rewriting and strategies
-
PADL. Ramakrishnan I.V. (Ed)
-
Cirstea H. Specifying authentication protocols using rewriting and strategies. In: Ramakrishnan I.V. (Ed). PADL. Lecture Notes in Computer Science 1990 (2001) 138-152
-
(2001)
Lecture Notes in Computer Science
, vol.1990
, pp. 138-152
-
-
Cirstea, H.1
-
9
-
-
0037190144
-
Maude: specification and programming in rewriting logic
-
Clavel M., Durán F., Eker S., Lincoln P., Martí-Oliet N., Meseguer J., and Quesada J.F. Maude: specification and programming in rewriting logic. Theor. Comput. Sci. 285 (2002) 187-243
-
(2002)
Theor. Comput. Sci.
, vol.285
, pp. 187-243
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
Meseguer, J.6
Quesada, J.F.7
-
10
-
-
24644431553
-
Policies, models, and languages for access control
-
DNIS. Bhalla S. (Ed)
-
di Vimercati S.D.C., Samarati P., and Jajodia S. Policies, models, and languages for access control. In: Bhalla S. (Ed). DNIS. Lecture Notes in Computer Science 3433 (2005) 225-237
-
(2005)
Lecture Notes in Computer Science
, vol.3433
, pp. 225-237
-
-
di Vimercati, S.D.C.1
Samarati, P.2
Jajodia, S.3
-
11
-
-
33749558954
-
Specifying and reasoning about dynamic access-control policies
-
IJCAR. Furbach U., and Shankar N. (Eds)
-
Dougherty D.J., Fisler K., and Krishnamurthi S. Specifying and reasoning about dynamic access-control policies. In: Furbach U., and Shankar N. (Eds). IJCAR. Lecture Notes in Computer Science 4130 (2006) 632-646
-
(2006)
Lecture Notes in Computer Science
, vol.4130
, pp. 632-646
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
12
-
-
33746103319
-
-
Echahed, R. and F. Prost, Security policy in a declarative style., in: P. Barahona and A.P. Felty, editors, PPDP (2005), pp. 153-163. URL http://doi.acm.org/10.1145/1069774.1069789
-
-
-
-
13
-
-
33750921115
-
-
Gnaedig, I. and H. Kirchner, Computing constructor forms with non terminating rewrite programs., in: A. Bossi and M.J. Maher, editors, PPDP (2006), pp. 121-132
-
-
-
-
14
-
-
0020299523
-
-
Goguen, J. A. and J. Meseguer, Security policies and security models., in: IEEE Symposium on Security and Privacy, 1982, pp. 11-20
-
-
-
-
15
-
-
0030244718
-
On termination and confluence properties of disjoint and constructor-sharing conditional rewrite systems
-
Gramlich B. On termination and confluence properties of disjoint and constructor-sharing conditional rewrite systems. Theor. Comput. Sci. 165 (1996) 97-131
-
(1996)
Theor. Comput. Sci.
, vol.165
, pp. 97-131
-
-
Gramlich, B.1
-
16
-
-
84942243858
-
-
Halpern, J. Y. and V. Weissman, Using first-order logic to reason about policies., in: CSFW (2003), pp. 187-201
-
-
-
-
17
-
-
84956860311
-
Compiling and verifying security protocols
-
LPAR. Parigot M., and Voronkov A. (Eds)
-
Jacquemard F., Rusinowitch M., and Vigneron L. Compiling and verifying security protocols. In: Parigot M., and Voronkov A. (Eds). LPAR. Lecture Notes in Computer Science 1955 (2000) 131-160
-
(2000)
Lecture Notes in Computer Science
, vol.1955
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
19
-
-
0024873046
-
-
Middeldorp, A., A sufficient condition for the termination of the direct sum of term rewriting systems, in: LICS (1989), pp. 396-401
-
-
-
-
20
-
-
34250797713
-
-
Moses, T., Extensible access control markup language (xacml) version 2.0, Technical report, OASIS (2005)
-
-
-
-
21
-
-
33646186281
-
A formal enforcement framework for role-based access control using aspect-oriented programming
-
MoDELS. Briand L.C., and Williams C. (Eds)
-
Pavlich-Mariscal J.A., Michel L., and Demurjian S.A. A formal enforcement framework for role-based access control using aspect-oriented programming. In: Briand L.C., and Williams C. (Eds). MoDELS. Lecture Notes in Computer Science 3713 (2005) 537-552
-
(2005)
Lecture Notes in Computer Science
, vol.3713
, pp. 537-552
-
-
Pavlich-Mariscal, J.A.1
Michel, L.2
Demurjian, S.A.3
-
22
-
-
0023435204
-
On termination of the direct sum of term-rewriting systems
-
Rusinowitch M. On termination of the direct sum of term-rewriting systems. Inf. Process. Lett. 26 (1987) 65-70
-
(1987)
Inf. Process. Lett.
, vol.26
, pp. 65-70
-
-
Rusinowitch, M.1
-
24
-
-
0023345304
-
Counterexamples to termination for the direct sum of term rewriting systems
-
Toyama Y. Counterexamples to termination for the direct sum of term rewriting systems. Inf. Process. Lett. 25 (1987) 141-143
-
(1987)
Inf. Process. Lett.
, vol.25
, pp. 141-143
-
-
Toyama, Y.1
-
25
-
-
0023252439
-
On the church-rosser property for the direct sum of term rewriting systems
-
Toyama Y. On the church-rosser property for the direct sum of term rewriting systems. J. ACM 34 (1987) 128-143
-
(1987)
J. ACM
, vol.34
, pp. 128-143
-
-
Toyama, Y.1
|