-
2
-
-
34247276117
-
Access control in a core calculus of dependency
-
ACM
-
M. Abadi. Access control in a core calculus of dependency. In ICFP, pages 263-273. ACM, 2006.
-
(2006)
ICFP
, pp. 263-273
-
-
Abadi, M.1
-
3
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. W. Lampson, and G. D. Plotkin. A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst., 15(4):706-734, 1993.
-
(1993)
ACM Trans. Program. Lang. Syst
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.W.3
Plotkin, G.D.4
-
5
-
-
0033715532
-
Authentication primitives and their compilation
-
M. Abadi, C. Fournet, and G. Gonthier. Authentication primitives and their compilation. In POPL, pages 302-315, 2000.
-
(2000)
POPL
, pp. 302-315
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
7
-
-
4043119674
-
On decidability of the control reachability problem in the asynchronous π-calculus
-
R. M. Amadio and C. Meyssonnier. On decidability of the control reachability problem in the asynchronous π-calculus. Nord. J. Comput., 9(1):70-101, 2002.
-
(2002)
Nord. J. Comput
, vol.9
, Issue.1
, pp. 70-101
-
-
Amadio, R.M.1
Meyssonnier, C.2
-
8
-
-
85000819056
-
Localities and failures (extended abstract)
-
FSTTCS, of, Springer
-
R. M. Amadio and S. Prasad. Localities and failures (extended abstract). In FSTTCS, volume 880 of LNCS, pages 205-216. Springer, 1994.
-
(1994)
LNCS
, vol.880
, pp. 205-216
-
-
Amadio, R.M.1
Prasad, S.2
-
9
-
-
34548051301
-
SecPAL: Design and semantics of a decentralized authorization language
-
Technical Report MSR-TR-2006-120, Microsoft Research
-
M. Y. Becker, A. D. Gordon, and C. Fournet. SecPAL: Design and semantics of a decentralized authorization language. Technical Report MSR-TR-2006-120, Microsoft Research, 2006.
-
(2006)
-
-
Becker, M.Y.1
Gordon, A.D.2
Fournet, C.3
-
10
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
E. Bertino, P. A. Bonatti, and E. Ferrari. TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur., 4(3):191-233, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
11
-
-
17144474103
-
The Klaim project: Theory and practice
-
Global Computing, of, Springer
-
L. Bettini, V. Bono, R. D. Nicola, G. L. Ferrari, D. Gorla, M. Loreti, E. Moggi, R. Pugliese, E. Tuosto, and B. Venneri. The Klaim project: Theory and practice. In Global Computing, volume 2874 of LNCS, pages 88-150. Springer, 2003.
-
(2003)
LNCS
, vol.2874
, pp. 88-150
-
-
Bettini, L.1
Bono, V.2
Nicola, R.D.3
Ferrari, G.L.4
Gorla, D.5
Loreti, M.6
Moggi, E.7
Pugliese, R.8
Tuosto, E.9
Venneri, B.10
-
12
-
-
1242332714
-
Automatic verification of cryptographic protocols: A logic programming approach
-
ACM
-
B. Blanchet. Automatic verification of cryptographic protocols: a logic programming approach. In PPDP, pages 1-3. ACM, 2003.
-
(2003)
PPDP
, pp. 1-3
-
-
Blanchet, B.1
-
14
-
-
85025424440
-
An algebra for composing access control policies
-
P. Bonatti, S. D. C. di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur., 5(1):1-35, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
di Vimercati, S.D.C.2
Samarati, P.3
-
15
-
-
4944266669
-
A distributed calculus for role-based access control
-
C. Braghin, D. Gorla, and V. Sassone. A distributed calculus for role-based access control. In CSFW, pages 48-60, 2004.
-
(2004)
CSFW
, pp. 48-60
-
-
Braghin, C.1
Gorla, D.2
Sassone, V.3
-
16
-
-
1342347429
-
Access control for mobile agents: The calculus of boxed ambients
-
M. Bugliesi, G. Castagna, and S. Crafa. Access control for mobile agents: The calculus of boxed ambients. ACM Trans. Program. Lang. Syst., 26(1):57-124, 2004.
-
(2004)
ACM Trans. Program. Lang. Syst
, vol.26
, Issue.1
, pp. 57-124
-
-
Bugliesi, M.1
Castagna, G.2
Crafa, S.3
-
17
-
-
0038460668
-
Process algebras with localities
-
chapter 15, North-Holland
-
I. Castellani. Process algebras with localities. In Handbook of Process Algebra, chapter 15, pages 945-1045. North-Holland, 2001.
-
(2001)
Handbook of Process Algebra
, pp. 945-1045
-
-
Castellani, I.1
-
18
-
-
0344443746
-
Reconstructing trust management
-
A. Chander, D. Dean, and J. C. Mitchell. Reconstructing trust management. Journal of Computer Security, 12(1):131-164, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 131-164
-
-
Chander, A.1
Dean, D.2
Mitchell, J.C.3
-
20
-
-
84867167943
-
-
J. DeTreville. Binder, a logic-based security language. In IEEE Symposium on Security and Privacy, pages 105-113, 2002.
-
J. DeTreville. Binder, a logic-based security language. In IEEE Symposium on Security and Privacy, pages 105-113, 2002.
-
-
-
-
21
-
-
24644503267
-
Model checking for nominal calculi
-
FoSSaCS, of, Springer
-
G. L. Ferrari, U. Montanari, and E. Tuosto. Model checking for nominal calculi. In FoSSaCS, volume 3441 of LNCS, pages 1-24. Springer, 2005.
-
(2005)
LNCS
, vol.3441
, pp. 1-24
-
-
Ferrari, G.L.1
Montanari, U.2
Tuosto, E.3
-
22
-
-
24644447402
-
A type discipline for authorization policies
-
ESOP, of, Springer
-
C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. In ESOP, volume 3444 of LNCS, pages 141-156. Springer, 2005.
-
(2005)
LNCS
, vol.3444
, pp. 141-156
-
-
Fournet, C.1
Gordon, A.D.2
Maffeis, S.3
-
23
-
-
33750280592
-
A linear logic of authorization and knowledge
-
D. Garg, L. Bauer, K. D. Bowers, F. Pfenning, and M. K. Reiter. A linear logic of authorization and knowledge. In ESORICS, pages 297-312, 2006.
-
(2006)
ESORICS
, pp. 297-312
-
-
Garg, D.1
Bauer, L.2
Bowers, K.D.3
Pfenning, F.4
Reiter, M.K.5
-
24
-
-
33947650706
-
19th IEEE Computer Security Foundations Workshop (CSFW'06)
-
0:283-296
-
D. Garg and F. Pfenning. Non-interference in constructive authorization logic. 19th IEEE Computer Security Foundations Workshop (CSFW'06), 0:283-296, 2006.
-
(2006)
-
-
Garg, D.1
Pfenning, F.2
-
25
-
-
35048849152
-
Model-checking access control policies
-
Springer
-
D. P. Guelev, M. Ryan, and P.-Y. Schobbens. Model-checking access control policies. In ISC, volume 3225 of LNCS, pages 219-230. Springer, 2004.
-
(2004)
ISC, volume 3225 of LNCS
, pp. 219-230
-
-
Guelev, D.P.1
Ryan, M.2
Schobbens, P.-Y.3
-
26
-
-
11944266314
-
Verifying information flow goals in Security-Enhanced Linux
-
J. D. Guttman, A. L. Herzog, J. D. Ramsdell, and C. W. Skorupka. Verifying information flow goals in Security-Enhanced Linux. Journal of Computer Security, 13(1):115-134, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 115-134
-
-
Guttman, J.D.1
Herzog, A.L.2
Ramsdell, J.D.3
Skorupka, C.W.4
-
28
-
-
0037170503
-
Resource access control in systems of mobile agents
-
M. Hennessy and J. Riely. Resource access control in systems of mobile agents. Information and Computation, 173:82-120, 2002.
-
(2002)
Information and Computation
, vol.173
, pp. 82-120
-
-
Hennessy, M.1
Riely, J.2
-
30
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: theory and practice. ACM Trans. Comput. Syst., 10(4):265-310, 1992.
-
(1992)
ACM Trans. Comput. Syst
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
33
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1):128-171, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
35
-
-
0003799504
-
-
Springer-Verlag New York, Inc, New York, NY, USA
-
Z. Manna and A. Pnueli. The temporal logic of reactive and concurrent systems. Springer-Verlag New York, Inc., New York, NY, USA, 1992.
-
(1992)
The temporal logic of reactive and concurrent systems
-
-
Manna, Z.1
Pnueli, A.2
-
36
-
-
33745788969
-
Dynamic policy discovery with remote attestation
-
FoSSaCS, of, Springer
-
C. Pitcher and J. Riely. Dynamic policy discovery with remote attestation. In FoSSaCS, volume 3921 of LNCS, pages 111-125. Springer, 2006.
-
(2006)
LNCS
, vol.3921
, pp. 111-125
-
-
Pitcher, C.1
Riely, J.2
-
37
-
-
1942504253
-
Trust and partial typing in open systems of mobile agents
-
J. Riely and M. Hennessy. Trust and partial typing in open systems of mobile agents. Journal of Automated Reasoning, 31(3-4):335-370, 2003.
-
(2003)
Journal of Automated Reasoning
, vol.31
, Issue.3-4
, pp. 335-370
-
-
Riely, J.1
Hennessy, M.2
-
38
-
-
0002276433
-
Power domains
-
M. B. Smyth. Power domains. J. Comput. Syst. Sci., 16(1):23-36, 1978.
-
(1978)
J. Comput. Syst. Sci
, vol.16
, Issue.1
, pp. 23-36
-
-
Smyth, M.B.1
-
39
-
-
13344286261
-
Translating dependency into parametricity
-
ACM
-
S. Tse and S. Zdancewic. Translating dependency into parametricity. In ICFP, pages 115-125. ACM, 2004.
-
(2004)
ICFP
, pp. 115-125
-
-
Tse, S.1
Zdancewic, S.2
-
40
-
-
0037673317
-
Policy algebras for access control - the predicate case
-
ACM Press
-
D. Wijesekera and S. Jajodia. Policy algebras for access control - the predicate case. In Computer and Communications Security, pages 171-180. ACM Press, 2002.
-
(2002)
Computer and Communications Security
, pp. 171-180
-
-
Wijesekera, D.1
Jajodia, S.2
-
41
-
-
3142523600
-
A propositional policy algebra for access control
-
D. Wijesekera and S. Jajodia. A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur., 6(2):286-325, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.2
, pp. 286-325
-
-
Wijesekera, D.1
Jajodia, S.2
-
42
-
-
0028380781
-
Authentication in the Taos operating system
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Trans. Comput. Syst., 12(1):3-32, 1994.
-
(1994)
ACM Trans. Comput. Syst
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
44
-
-
33645964601
-
-
N. Zhang, M. Ryan, and D. P. Guelev. Evaluating access control policies through model checking. In ISC, 3650 of LNCS, pages 446-460. Springer, 2005.
-
N. Zhang, M. Ryan, and D. P. Guelev. Evaluating access control policies through model checking. In ISC, volume 3650 of LNCS, pages 446-460. Springer, 2005.
-
-
-
-
45
-
-
4143074723
-
A logical specification for usage control
-
ACM Press
-
X. Zhang, J. Park, F. Parisi-Presicce, and R. Sandhu. A logical specification for usage control. In SACMAT '04: Proceedings of the Ninth ACM Symposium on Access Control Models And Technologies, pages 1-10. ACM Press, 2004.
-
(2004)
SACMAT '04: Proceedings of the Ninth ACM Symposium on Access Control Models And Technologies
, pp. 1-10
-
-
Zhang, X.1
Park, J.2
Parisi-Presicce, F.3
Sandhu, R.4
|