메뉴 건너뛰기




Volumn 3170, Issue , 2004, Pages 225-239

Type based discretionary access control

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS;

EID: 35048879172     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-28644-8_15     Document Type: Article
Times cited : (9)

References (18)
  • 1
    • 84957872542 scopus 로고    scopus 로고
    • Reasoning about cryptographic protocols in the Spi calculus
    • CONCUR'97
    • M. Abadi and A. D. Gordon. Reasoning about cryptographic protocols in the Spi calculus. In CONCUR'97, volume 1243 of LNCS, pages 59-73, 1997.
    • (1997) LNCS , vol.1243 , pp. 59-73
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 84865445501 scopus 로고    scopus 로고
    • Secrecy and group creation
    • Proceedings of CONCUR, Springer-Verlag
    • L. Cardelli, G. Ghelli, and A. D. Gordon. Secrecy and group creation. In Proceedings of CONCUR, number 1877 in LNCS, pages 365-379. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1877 , pp. 365-379
    • Cardelli, L.1    Ghelli, G.2    Gordon, A.D.3
  • 3
    • 84942244044 scopus 로고    scopus 로고
    • Type-based distributed access control
    • IEEE
    • T. Chothia, D. Duggan, and J. Vitek. Type-based distributed access control. In CSFW 2003, pages 170-184. IEEE, 2003.
    • (2003) CSFW 2003 , pp. 170-184
    • Chothia, T.1    Duggan, D.2    Vitek, J.3
  • 4
    • 0038893943 scopus 로고    scopus 로고
    • Information flow vs resource access in the asynchronous π-calculus
    • M. Hennessy and J. Riely. Information flow vs resource access in the asynchronous π-calculus. ACM TOPLAS, 24(5):566-591, 2002.
    • (2002) ACM TOPLAS , vol.24 , Issue.5 , pp. 566-591
    • Hennessy, M.1    Riely, J.2
  • 5
    • 0037170503 scopus 로고    scopus 로고
    • Resource access control in systems of mobile agents
    • M. Hennessy and J. Riely. Resource access control in systems of mobile agents. I&C, 173:82-120, 2002.
    • (2002) I&C , vol.173 , pp. 82-120
    • Hennessy, M.1    Riely, J.2
  • 6
    • 35048904090 scopus 로고    scopus 로고
    • SafeDpi: A language for controlling mobile code
    • LNCS
    • Matthew Hennessy, Julian Rathke, and Nobuko Yoshida. SafeDpi: a language for controlling mobile code. In FoSSaCS'04, number 2987 in LNCS, pages 241-256, 2004.
    • (2004) FoSSaCS'04 , vol.2987 , pp. 241-256
    • Hennessy, M.1    Rathke, J.2    Yoshida, N.3
  • 7
    • 84947741770 scopus 로고    scopus 로고
    • Language primitives and type discipline for structured communication-based programming
    • LNCS, Springer-Verlag
    • K. Honda, V. Vasconcelos, and M. Kubo. Language primitives and type discipline for structured communication-based programming. In ESOP '98, number 1381 in LNCS, pages 122-138. Springer-Verlag, 1998.
    • (1998) ESOP '98 , vol.1381 , pp. 122-138
    • Honda, K.1    Vasconcelos, V.2    Kubo, M.3
  • 8
    • 84947269249 scopus 로고    scopus 로고
    • Secure information flow as typed process behaviour
    • ESOP '00, Springer-Verlag
    • K. Honda, V.T. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In ESOP '00, volume 1782 of LNCS, pages 180-199. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1782 , pp. 180-199
    • Honda, K.1    Vasconcelos, V.T.2    Yoshida, N.3
  • 9
    • 24644522100 scopus 로고    scopus 로고
    • Type-based information flow analysis for the pi-calculus
    • Dept. of Computer Science, Tokyo Institute of Technology
    • Naoki Kobayashi. Type-based information flow analysis for the pi-calculus. Technical Report TR03-0007, Dept. of Computer Science, Tokyo Institute of Technology, 2003.
    • (2003) Technical Report TR03-0007
    • Kobayashi, N.1
  • 12
    • 0001048139 scopus 로고    scopus 로고
    • Protecting privacy using the decentralized label model
    • Andrew C. Myers and Barbara Liskov. Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol, (4):410-442, 2000.
    • (2000) ACM Trans. Softw. Eng. Methodol , Issue.4 , pp. 410-442
    • Myers, A.C.1    Liskov, B.2
  • 15
    • 0037848141 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • R. Focardi and R. Gorrieri, editors, LNCS. Springer-Verlag
    • P. Samarati and S. De Capitani di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, FOSAD 2002, number 2171 in LNCS. Springer-Verlag, 2002.
    • (2002) FOSAD 2002 , vol.2171
    • Samarati, P.1    De Capitani Di Vimercati, S.2
  • 17
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Fred B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3(1):30-50, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 18
    • 0037272061 scopus 로고    scopus 로고
    • Secure composition of untrusted code: Boxmpi, wrappers and causality types
    • P. Sewell and J. Vitek. Secure composition of untrusted code: Boxmpi, wrappers and causality types. Journal of Computer Security, 11(2):135-188, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.2 , pp. 135-188
    • Sewell, P.1    Vitek, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.