-
1
-
-
84957872542
-
Reasoning about cryptographic protocols in the Spi calculus
-
CONCUR'97
-
M. Abadi and A. D. Gordon. Reasoning about cryptographic protocols in the Spi calculus. In CONCUR'97, volume 1243 of LNCS, pages 59-73, 1997.
-
(1997)
LNCS
, vol.1243
, pp. 59-73
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
84865445501
-
Secrecy and group creation
-
Proceedings of CONCUR, Springer-Verlag
-
L. Cardelli, G. Ghelli, and A. D. Gordon. Secrecy and group creation. In Proceedings of CONCUR, number 1877 in LNCS, pages 365-379. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1877
, pp. 365-379
-
-
Cardelli, L.1
Ghelli, G.2
Gordon, A.D.3
-
3
-
-
84942244044
-
Type-based distributed access control
-
IEEE
-
T. Chothia, D. Duggan, and J. Vitek. Type-based distributed access control. In CSFW 2003, pages 170-184. IEEE, 2003.
-
(2003)
CSFW 2003
, pp. 170-184
-
-
Chothia, T.1
Duggan, D.2
Vitek, J.3
-
4
-
-
0038893943
-
Information flow vs resource access in the asynchronous π-calculus
-
M. Hennessy and J. Riely. Information flow vs resource access in the asynchronous π-calculus. ACM TOPLAS, 24(5):566-591, 2002.
-
(2002)
ACM TOPLAS
, vol.24
, Issue.5
, pp. 566-591
-
-
Hennessy, M.1
Riely, J.2
-
5
-
-
0037170503
-
Resource access control in systems of mobile agents
-
M. Hennessy and J. Riely. Resource access control in systems of mobile agents. I&C, 173:82-120, 2002.
-
(2002)
I&C
, vol.173
, pp. 82-120
-
-
Hennessy, M.1
Riely, J.2
-
6
-
-
35048904090
-
SafeDpi: A language for controlling mobile code
-
LNCS
-
Matthew Hennessy, Julian Rathke, and Nobuko Yoshida. SafeDpi: a language for controlling mobile code. In FoSSaCS'04, number 2987 in LNCS, pages 241-256, 2004.
-
(2004)
FoSSaCS'04
, vol.2987
, pp. 241-256
-
-
Hennessy, M.1
Rathke, J.2
Yoshida, N.3
-
7
-
-
84947741770
-
Language primitives and type discipline for structured communication-based programming
-
LNCS, Springer-Verlag
-
K. Honda, V. Vasconcelos, and M. Kubo. Language primitives and type discipline for structured communication-based programming. In ESOP '98, number 1381 in LNCS, pages 122-138. Springer-Verlag, 1998.
-
(1998)
ESOP '98
, vol.1381
, pp. 122-138
-
-
Honda, K.1
Vasconcelos, V.2
Kubo, M.3
-
8
-
-
84947269249
-
Secure information flow as typed process behaviour
-
ESOP '00, Springer-Verlag
-
K. Honda, V.T. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In ESOP '00, volume 1782 of LNCS, pages 180-199. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1782
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.T.2
Yoshida, N.3
-
9
-
-
24644522100
-
Type-based information flow analysis for the pi-calculus
-
Dept. of Computer Science, Tokyo Institute of Technology
-
Naoki Kobayashi. Type-based information flow analysis for the pi-calculus. Technical Report TR03-0007, Dept. of Computer Science, Tokyo Institute of Technology, 2003.
-
(2003)
Technical Report TR03-0007
-
-
Kobayashi, N.1
-
12
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
Andrew C. Myers and Barbara Liskov. Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol, (4):410-442, 2000.
-
(2000)
ACM Trans. Softw. Eng. Methodol
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
15
-
-
0037848141
-
Access control: Policies, models, and mechanisms
-
R. Focardi and R. Gorrieri, editors, LNCS. Springer-Verlag
-
P. Samarati and S. De Capitani di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, FOSAD 2002, number 2171 in LNCS. Springer-Verlag, 2002.
-
(2002)
FOSAD 2002
, vol.2171
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
17
-
-
84881225236
-
Enforceable security policies
-
Fred B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3(1):30-50, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
18
-
-
0037272061
-
Secure composition of untrusted code: Boxmpi, wrappers and causality types
-
P. Sewell and J. Vitek. Secure composition of untrusted code: Boxmpi, wrappers and causality types. Journal of Computer Security, 11(2):135-188, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.2
, pp. 135-188
-
-
Sewell, P.1
Vitek, J.2
|