-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
Sept
-
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, Sept. 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
33847791903
-
Access control in a core calculus of dependency
-
Elsevier, of ENTCS
-
M. Abadi. Access control in a core calculus of dependency. In Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin, pages 5-31. Elsevier, 2007. Volume 172 of ENTCS.
-
(2007)
Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin
, vol.172
, pp. 5-31
-
-
Abadi, M.1
-
3
-
-
0032681509
-
A core calculus of dependency
-
M. Abadi, A. Banarjee, N. Heintz, and J. G. Riecke. A core calculus of dependency. In 26th ACM Symposium on Principles of Programming Languages (POPL'99), pages 147-160, 1999.
-
(1999)
26th ACM Symposium on Principles of Programming Languages (POPL'99)
, pp. 147-160
-
-
Abadi, M.1
Banarjee, A.2
Heintz, N.3
Riecke, J.G.4
-
4
-
-
0037432692
-
Secrecy types for asymmetric communication
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theoretical Computer Science, 298(3):387-415, 2003.
-
(2003)
Theoretical Computer Science
, vol.298
, Issue.3
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
5
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
M. Abadi and B. Blanchet. Analyzing security protocols with secrecy types and logic programs. Journal of the ACM, 52(1):102-146, 2005.
-
(2005)
Journal of the ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
6
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
8
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
J. Bacon, K. Moody, and W Yao. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security, 5(4):492-540, 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
11
-
-
0035790640
-
A logical framework for reasoning about access control models
-
New York, NY, USA, ACM Press
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. In SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies, pages 41-52, New York, NY, USA, 2001. ACM Press.
-
(2001)
SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies
, pp. 41-52
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
13
-
-
33845212195
-
Verified reference implementations of WS-Security protocols
-
3rd International Workshop on Web Services and Formal Methods WS-FM 2006, of, Springer
-
K. Bhargavan, C. Fournet, and A. D. Gordon. Verified reference implementations of WS-Security protocols. In 3rd International Workshop on Web Services and Formal Methods (WS-FM 2006), volume 4184 of Lecture Notes in Computer Science, pages 88-106. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4184
, pp. 88-106
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
14
-
-
33947683919
-
Verified interoperable implementations of security protocols
-
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In 19th IEEE Computer Security Foundations Workshop (CSFW'06), pages 139-152, 2006.
-
(2006)
19th IEEE Computer Security Foundations Workshop (CSFW'06)
, pp. 139-152
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Tse, S.4
-
19
-
-
0035657915
-
A logic of access control
-
J. Crampton, G. Loizou, and G. O'Shea. A logic of access control. The Computer Journal, 44(2):137-149, 2001.
-
(2001)
The Computer Journal
, vol.44
, Issue.2
, pp. 137-149
-
-
Crampton, J.1
Loizou, G.2
O'Shea, G.3
-
20
-
-
84867167943
-
-
J. DeTreville. Binder, a logic-based security language. In IEEE Computer Society Symposium on Research in Security and Privacy, pages 105-113, 2002.
-
J. DeTreville. Binder, a logic-based security language. In IEEE Computer Society Symposium on Research in Security and Privacy, pages 105-113, 2002.
-
-
-
-
22
-
-
35048867728
-
-
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory, RFC 2693, 1999. See http://www.ietf.org/rfc/ rfc2693.txt.
-
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory, RFC 2693, 1999. See http://www.ietf.org/rfc/ rfc2693.txt.
-
-
-
-
23
-
-
24644447402
-
A type discipline for authorization policies
-
14th European Symposium on Programming ESOP'05, of, Springer
-
C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. In 14th European Symposium on Programming (ESOP'05), volume 3444 of Lecture Notes in Computer Science, pages 141-156. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3444
, pp. 141-156
-
-
Fournet, C.1
Gordon, A.D.2
Maffeis, S.3
-
24
-
-
35048813364
-
A type discipline for authorization policies in distribued systems
-
Technical Report MSR-TR-2007-47, Microsoft Research
-
C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies in distribued systems. Technical Report MSR-TR-2007-47, Microsoft Research, 2007.
-
(2007)
-
-
Fournet, C.1
Gordon, A.D.2
Maffeis, S.3
-
28
-
-
35248815623
-
Typing one-to-one and one-to-many correspondences in security protocols
-
Software Security-Theories and Systems, of, Springer
-
A. D. Gordon and A. Jeffrey. Typing one-to-one and one-to-many correspondences in security protocols. In Software Security-Theories and Systems, volume 2609 of Lecture Notes in Computer Science, pages 270-282. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2609
, pp. 270-282
-
-
Gordon, A.D.1
Jeffrey, A.2
-
29
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451-521, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 451-521
-
-
Gordon, A.D.1
Jeffrey, A.2
-
30
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A. D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3/4):435-484, 2003.
-
(2003)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 435-484
-
-
Gordon, A.D.1
Jeffrey, A.2
-
31
-
-
27244444891
-
Secrecy despite compromise: Types, cryptography, and the pi-calculus
-
CONCUR 2005, Concurrency Theory, of, Springer
-
A. D. Gordon and A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the pi-calculus. In CONCUR 2005 - Concurrency Theory, volume 3653 of Lecture Notes in Computer Science, pages 186-201. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3653
, pp. 186-201
-
-
Gordon, A.D.1
Jeffrey, A.2
-
32
-
-
35048867881
-
Trust management in strand spaces: A rely-guarantee method
-
13th European Symposium on Programming ESOP'04, of, Springer
-
J. D. Guttman, F. J. Thayer, J. A. Carlson, J. C. Herzog, J. D. Ramsdell, and B. T. Sniffen. Trust management in strand spaces: a rely-guarantee method. In 13th European Symposium on Programming (ESOP'04), volume 2986 of Lecture Notes in Computer Science, pages 340-354. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2986
, pp. 340-354
-
-
Guttman, J.D.1
Thayer, F.J.2
Carlson, J.A.3
Herzog, J.C.4
Ramsdell, J.D.5
Sniffen, B.T.6
-
36
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
-
Tools and Algorithms for the Construction and Analysis of Systems, of, Springer
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
37
-
-
84858370708
-
-
M. Maffei. Dynamic typing for security protocols. PhD thesis, Università Ca' Foscari Venezia, 2006.
-
M. Maffei. Dynamic typing for security protocols. PhD thesis, Università Ca' Foscari Venezia, 2006.
-
-
-
-
40
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
41
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.1
-
42
-
-
35048885429
-
-
R. L. Rivest and B. Lampson. SDSI - A simple distributed security infrastructure, 1996. See http://theory.lcs.mit.edu/~rivest/sdsi10.ps.
-
R. L. Rivest and B. Lampson. SDSI - A simple distributed security infrastructure, 1996. See http://theory.lcs.mit.edu/~rivest/sdsi10.ps.
-
-
-
-
45
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
FOSAD 2000, of, Springer
-
P. Samarati and S. de Capitani di Vimercati. Access control: Policies, models, and mechanisms. In FOSAD 2000, volume 2171 of Lecture Notes in Computer Science, pages 137-196. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2171
, pp. 137-196
-
-
Samarati, P.1
de Capitani di Vimercati, S.2
-
47
-
-
0028380781
-
Authentication in the Taos operating system
-
T. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3-32, 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, T.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
49
-
-
0037974191
-
Secure program partitioning
-
S. Zdancevic, L. Zheng, N. Nystrom, and A. C. Myers. Secure program partitioning. Transactions on Computer Systems, 20(3):283-328, 2002.
-
(2002)
Transactions on Computer Systems
, vol.20
, Issue.3
, pp. 283-328
-
-
Zdancevic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
|