메뉴 건너뛰기




Volumn , Issue , 2007, Pages 31-45

A type discipline for authorization in distributed systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTHORIZATION DECISION; SECURITY CREDENTIALS;

EID: 35048817499     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.7     Document Type: Conference Paper
Times cited : (56)

References (49)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Sept
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, Sept. 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 4
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theoretical Computer Science, 298(3):387-415, 2003.
    • (2003) Theoretical Computer Science , vol.298 , Issue.3 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 5
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • M. Abadi and B. Blanchet. Analyzing security protocols with secrecy types and logic programs. Journal of the ACM, 52(1):102-146, 2005.
    • (2005) Journal of the ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 8
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • J. Bacon, K. Moody, and W Yao. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security, 5(4):492-540, 2002.
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 13
    • 33845212195 scopus 로고    scopus 로고
    • Verified reference implementations of WS-Security protocols
    • 3rd International Workshop on Web Services and Formal Methods WS-FM 2006, of, Springer
    • K. Bhargavan, C. Fournet, and A. D. Gordon. Verified reference implementations of WS-Security protocols. In 3rd International Workshop on Web Services and Formal Methods (WS-FM 2006), volume 4184 of Lecture Notes in Computer Science, pages 88-106. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4184 , pp. 88-106
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 20
    • 84867167943 scopus 로고    scopus 로고
    • J. DeTreville. Binder, a logic-based security language. In IEEE Computer Society Symposium on Research in Security and Privacy, pages 105-113, 2002.
    • J. DeTreville. Binder, a logic-based security language. In IEEE Computer Society Symposium on Research in Security and Privacy, pages 105-113, 2002.
  • 21
  • 22
    • 35048867728 scopus 로고    scopus 로고
    • C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory, RFC 2693, 1999. See http://www.ietf.org/rfc/ rfc2693.txt.
    • C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory, RFC 2693, 1999. See http://www.ietf.org/rfc/ rfc2693.txt.
  • 23
    • 24644447402 scopus 로고    scopus 로고
    • A type discipline for authorization policies
    • 14th European Symposium on Programming ESOP'05, of, Springer
    • C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. In 14th European Symposium on Programming (ESOP'05), volume 3444 of Lecture Notes in Computer Science, pages 141-156. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3444 , pp. 141-156
    • Fournet, C.1    Gordon, A.D.2    Maffeis, S.3
  • 24
    • 35048813364 scopus 로고    scopus 로고
    • A type discipline for authorization policies in distribued systems
    • Technical Report MSR-TR-2007-47, Microsoft Research
    • C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies in distribued systems. Technical Report MSR-TR-2007-47, Microsoft Research, 2007.
    • (2007)
    • Fournet, C.1    Gordon, A.D.2    Maffeis, S.3
  • 28
    • 35248815623 scopus 로고    scopus 로고
    • Typing one-to-one and one-to-many correspondences in security protocols
    • Software Security-Theories and Systems, of, Springer
    • A. D. Gordon and A. Jeffrey. Typing one-to-one and one-to-many correspondences in security protocols. In Software Security-Theories and Systems, volume 2609 of Lecture Notes in Computer Science, pages 270-282. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2609 , pp. 270-282
    • Gordon, A.D.1    Jeffrey, A.2
  • 29
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451-521, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 451-521
    • Gordon, A.D.1    Jeffrey, A.2
  • 30
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A. D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3/4):435-484, 2003.
    • (2003) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 435-484
    • Gordon, A.D.1    Jeffrey, A.2
  • 31
    • 27244444891 scopus 로고    scopus 로고
    • Secrecy despite compromise: Types, cryptography, and the pi-calculus
    • CONCUR 2005, Concurrency Theory, of, Springer
    • A. D. Gordon and A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the pi-calculus. In CONCUR 2005 - Concurrency Theory, volume 3653 of Lecture Notes in Computer Science, pages 186-201. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3653 , pp. 186-201
    • Gordon, A.D.1    Jeffrey, A.2
  • 32
    • 35048867881 scopus 로고    scopus 로고
    • Trust management in strand spaces: A rely-guarantee method
    • 13th European Symposium on Programming ESOP'04, of, Springer
    • J. D. Guttman, F. J. Thayer, J. A. Carlson, J. C. Herzog, J. D. Ramsdell, and B. T. Sniffen. Trust management in strand spaces: a rely-guarantee method. In 13th European Symposium on Programming (ESOP'04), volume 2986 of Lecture Notes in Computer Science, pages 340-354. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2986 , pp. 340-354
    • Guttman, J.D.1    Thayer, F.J.2    Carlson, J.A.3    Herzog, J.C.4    Ramsdell, J.D.5    Sniffen, B.T.6
  • 36
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
    • Tools and Algorithms for the Construction and Analysis of Systems, of, Springer
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 37
    • 84858370708 scopus 로고    scopus 로고
    • M. Maffei. Dynamic typing for security protocols. PhD thesis, Università Ca' Foscari Venezia, 2006.
    • M. Maffei. Dynamic typing for security protocols. PhD thesis, Università Ca' Foscari Venezia, 2006.
  • 40
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 41
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.1
  • 42
    • 35048885429 scopus 로고    scopus 로고
    • R. L. Rivest and B. Lampson. SDSI - A simple distributed security infrastructure, 1996. See http://theory.lcs.mit.edu/~rivest/sdsi10.ps.
    • R. L. Rivest and B. Lampson. SDSI - A simple distributed security infrastructure, 1996. See http://theory.lcs.mit.edu/~rivest/sdsi10.ps.
  • 45
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • FOSAD 2000, of, Springer
    • P. Samarati and S. de Capitani di Vimercati. Access control: Policies, models, and mechanisms. In FOSAD 2000, volume 2171 of Lecture Notes in Computer Science, pages 137-196. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2171 , pp. 137-196
    • Samarati, P.1    de Capitani di Vimercati, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.