메뉴 건너뛰기




Volumn , Issue , 2007, Pages 16-30

Do as i SaY! Programmatic access control with explicit identities

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODEL; PROGRAMMATIC REALIZATION;

EID: 35048840249     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.19     Document Type: Conference Paper
Times cited : (11)

References (45)
  • 2
    • 34247276117 scopus 로고    scopus 로고
    • Access control in a core calculus of dependency
    • ACM
    • M. Abadi. Access control in a core calculus of dependency. In ICFP, pages 263-273. ACM, 2006.
    • (2006) ICFP , pp. 263-273
    • Abadi, M.1
  • 5
    • 0033715532 scopus 로고    scopus 로고
    • Authentication primitives and their compilation
    • M. Abadi, C. Fournet, and G. Gonthier. Authentication primitives and their compilation. In POPL, pages 302-315, 2000.
    • (2000) POPL , pp. 302-315
    • Abadi, M.1    Fournet, C.2    Gonthier, G.3
  • 7
    • 4043119674 scopus 로고    scopus 로고
    • On decidability of the control reachability problem in the asynchronous π-calculus
    • R. M. Amadio and C. Meyssonnier. On decidability of the control reachability problem in the asynchronous π-calculus. Nord. J. Comput., 9(1):70-101, 2002.
    • (2002) Nord. J. Comput , vol.9 , Issue.1 , pp. 70-101
    • Amadio, R.M.1    Meyssonnier, C.2
  • 8
    • 85000819056 scopus 로고
    • Localities and failures (extended abstract)
    • FSTTCS, of, Springer
    • R. M. Amadio and S. Prasad. Localities and failures (extended abstract). In FSTTCS, volume 880 of LNCS, pages 205-216. Springer, 1994.
    • (1994) LNCS , vol.880 , pp. 205-216
    • Amadio, R.M.1    Prasad, S.2
  • 9
    • 34548051301 scopus 로고    scopus 로고
    • SecPAL: Design and semantics of a decentralized authorization language
    • Technical Report MSR-TR-2006-120, Microsoft Research
    • M. Y. Becker, A. D. Gordon, and C. Fournet. SecPAL: Design and semantics of a decentralized authorization language. Technical Report MSR-TR-2006-120, Microsoft Research, 2006.
    • (2006)
    • Becker, M.Y.1    Gordon, A.D.2    Fournet, C.3
  • 12
    • 1242332714 scopus 로고    scopus 로고
    • Automatic verification of cryptographic protocols: A logic programming approach
    • ACM
    • B. Blanchet. Automatic verification of cryptographic protocols: a logic programming approach. In PPDP, pages 1-3. ACM, 2003.
    • (2003) PPDP , pp. 1-3
    • Blanchet, B.1
  • 15
    • 4944266669 scopus 로고    scopus 로고
    • A distributed calculus for role-based access control
    • C. Braghin, D. Gorla, and V. Sassone. A distributed calculus for role-based access control. In CSFW, pages 48-60, 2004.
    • (2004) CSFW , pp. 48-60
    • Braghin, C.1    Gorla, D.2    Sassone, V.3
  • 16
    • 1342347429 scopus 로고    scopus 로고
    • Access control for mobile agents: The calculus of boxed ambients
    • M. Bugliesi, G. Castagna, and S. Crafa. Access control for mobile agents: The calculus of boxed ambients. ACM Trans. Program. Lang. Syst., 26(1):57-124, 2004.
    • (2004) ACM Trans. Program. Lang. Syst , vol.26 , Issue.1 , pp. 57-124
    • Bugliesi, M.1    Castagna, G.2    Crafa, S.3
  • 17
    • 0038460668 scopus 로고    scopus 로고
    • Process algebras with localities
    • chapter 15, North-Holland
    • I. Castellani. Process algebras with localities. In Handbook of Process Algebra, chapter 15, pages 945-1045. North-Holland, 2001.
    • (2001) Handbook of Process Algebra , pp. 945-1045
    • Castellani, I.1
  • 20
    • 84867167943 scopus 로고    scopus 로고
    • J. DeTreville. Binder, a logic-based security language. In IEEE Symposium on Security and Privacy, pages 105-113, 2002.
    • J. DeTreville. Binder, a logic-based security language. In IEEE Symposium on Security and Privacy, pages 105-113, 2002.
  • 21
    • 24644503267 scopus 로고    scopus 로고
    • Model checking for nominal calculi
    • FoSSaCS, of, Springer
    • G. L. Ferrari, U. Montanari, and E. Tuosto. Model checking for nominal calculi. In FoSSaCS, volume 3441 of LNCS, pages 1-24. Springer, 2005.
    • (2005) LNCS , vol.3441 , pp. 1-24
    • Ferrari, G.L.1    Montanari, U.2    Tuosto, E.3
  • 22
    • 24644447402 scopus 로고    scopus 로고
    • A type discipline for authorization policies
    • ESOP, of, Springer
    • C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. In ESOP, volume 3444 of LNCS, pages 141-156. Springer, 2005.
    • (2005) LNCS , vol.3444 , pp. 141-156
    • Fournet, C.1    Gordon, A.D.2    Maffeis, S.3
  • 24
    • 33947650706 scopus 로고    scopus 로고
    • 19th IEEE Computer Security Foundations Workshop (CSFW'06)
    • 0:283-296
    • D. Garg and F. Pfenning. Non-interference in constructive authorization logic. 19th IEEE Computer Security Foundations Workshop (CSFW'06), 0:283-296, 2006.
    • (2006)
    • Garg, D.1    Pfenning, F.2
  • 28
    • 0037170503 scopus 로고    scopus 로고
    • Resource access control in systems of mobile agents
    • M. Hennessy and J. Riely. Resource access control in systems of mobile agents. Information and Computation, 173:82-120, 2002.
    • (2002) Information and Computation , vol.173 , pp. 82-120
    • Hennessy, M.1    Riely, J.2
  • 30
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: theory and practice. ACM Trans. Comput. Syst., 10(4):265-310, 1992.
    • (1992) ACM Trans. Comput. Syst , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 33
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1):128-171, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 36
    • 33745788969 scopus 로고    scopus 로고
    • Dynamic policy discovery with remote attestation
    • FoSSaCS, of, Springer
    • C. Pitcher and J. Riely. Dynamic policy discovery with remote attestation. In FoSSaCS, volume 3921 of LNCS, pages 111-125. Springer, 2006.
    • (2006) LNCS , vol.3921 , pp. 111-125
    • Pitcher, C.1    Riely, J.2
  • 37
    • 1942504253 scopus 로고    scopus 로고
    • Trust and partial typing in open systems of mobile agents
    • J. Riely and M. Hennessy. Trust and partial typing in open systems of mobile agents. Journal of Automated Reasoning, 31(3-4):335-370, 2003.
    • (2003) Journal of Automated Reasoning , vol.31 , Issue.3-4 , pp. 335-370
    • Riely, J.1    Hennessy, M.2
  • 38
    • 0002276433 scopus 로고
    • Power domains
    • M. B. Smyth. Power domains. J. Comput. Syst. Sci., 16(1):23-36, 1978.
    • (1978) J. Comput. Syst. Sci , vol.16 , Issue.1 , pp. 23-36
    • Smyth, M.B.1
  • 39
    • 13344286261 scopus 로고    scopus 로고
    • Translating dependency into parametricity
    • ACM
    • S. Tse and S. Zdancewic. Translating dependency into parametricity. In ICFP, pages 115-125. ACM, 2004.
    • (2004) ICFP , pp. 115-125
    • Tse, S.1    Zdancewic, S.2
  • 40
    • 0037673317 scopus 로고    scopus 로고
    • Policy algebras for access control - the predicate case
    • ACM Press
    • D. Wijesekera and S. Jajodia. Policy algebras for access control - the predicate case. In Computer and Communications Security, pages 171-180. ACM Press, 2002.
    • (2002) Computer and Communications Security , pp. 171-180
    • Wijesekera, D.1    Jajodia, S.2
  • 41
    • 3142523600 scopus 로고    scopus 로고
    • A propositional policy algebra for access control
    • D. Wijesekera and S. Jajodia. A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur., 6(2):286-325, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.2 , pp. 286-325
    • Wijesekera, D.1    Jajodia, S.2
  • 44
    • 33645964601 scopus 로고    scopus 로고
    • N. Zhang, M. Ryan, and D. P. Guelev. Evaluating access control policies through model checking. In ISC, 3650 of LNCS, pages 446-460. Springer, 2005.
    • N. Zhang, M. Ryan, and D. P. Guelev. Evaluating access control policies through model checking. In ISC, volume 3650 of LNCS, pages 446-460. Springer, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.