-
1
-
-
85084162952
-
A domain and type enforcement UNIX prototype
-
Salt Lake City, Utah June
-
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat. A domain and type enforcement UNIX prototype. In Proceedings of the 5th Usenix UNIX Security Symposium, Salt Lake City, Utah, June 1995.
-
(1995)
Proceedings of the 5th Usenix UNIX Security Symposium
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
2
-
-
84947782221
-
Rewriting logic as a metalogical framework
-
S. Kapoor and S. Prasad, editors New Delhi, India December 13-15 2000, Proceedings
-
D. Basin, M. Clavel, and J. Meseguer. "rewriting logic as a metalogical framework". In S. Kapoor and S. Prasad, editors, Twentieth Conference on the Foundations of Software Technology and Theoretical Computer Science, New Delhi, India, December 13-15, 2000, Proceedings, volume 1974, pages 55-80, 2000.
-
(2000)
Twentieth Conference on the Foundations of Software Technology and Theoretical Computer Science
, vol.1974
, pp. 55-80
-
-
Basin, D.1
Clavel, M.2
Meseguer, J.3
-
5
-
-
35248825518
-
-
Internet Draft February 24
-
J. Boyle et al. The COPS protocol. Internet Draft, February 24, 1999.
-
(1999)
The COPS Protocol
-
-
Boyle, J.1
-
7
-
-
84962248491
-
Seraphim: Dynamic interoperable security architecture for active networks
-
Tel-Aviv, Israel, March 26-27
-
R. H. Campbell, Z. Liu, M. D. Mickunas, P. Naldurg, and S. Yi. Seraphim: dynamic interoperable security architecture for active networks. In OPENARCH 2000, Tel-Aviv, Israel, March 26-27, 2000.
-
(2000)
OPENARCH 2000
-
-
Campbell, R.H.1
Liu, Z.2
Mickunas, M.D.3
Naldurg, P.4
Yi, S.5
-
8
-
-
0034823078
-
A state-transition model of trust management and access control
-
Cape Breton, Nova Scotia, June
-
A. Chander, D. Dean, and J. Mitchell. A state-transition model of trust management and access control. In 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, June 2001.
-
(2001)
14th IEEE Computer Security Foundations Workshop
-
-
Chander, A.1
Dean, D.2
Mitchell, J.3
-
10
-
-
3042768691
-
Maude: Specification and programming in rewriting logic
-
To appear
-
M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Mart-Oliet, J. Meseguer, and J. F. Quesada. Maude: Specification and programming in rewriting logic. Theoretical Computer Science, 2001. To appear.
-
(2001)
Theoretical Computer Science
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Mart-Oliet, N.5
Meseguer, J.6
Quesada, J.F.7
-
11
-
-
0003042004
-
Ponder: A language for specifying secuirty and management policies for distributed systems
-
July
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. Ponder: A language for specifying secuirty and management policies for distributed systems. Imperial College Research Report, July 2000.
-
(2000)
Imperial College Research Report
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
12
-
-
0016543936
-
Guarded commands, nondeterminacy, and formal derivation of programs
-
E. Dijkstra. Guarded commands, nondeterminacy, and formal derivation of programs. Communications of the ACM, 18(8):453-457, 1975.
-
(1975)
Communications of the ACM
, vol.18
, Issue.8
, pp. 453-457
-
-
Dijkstra, E.1
-
13
-
-
0003593599
-
-
RFC September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, et al. SPKI certificate theory. RFC 2693, September 1999.
-
(1999)
SPKI Certificate Theory
, pp. 2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
-
14
-
-
0031606027
-
PLAN: A packet language for active networks
-
ACM
-
M. Hicks, P. Kakkar, J. T. Moore, C. A. Gunter, and S. Nettles. PLAN: A Packet Language for Active Networks. In Proceedings of the Third ACM SIGPLAN International Conference on Functional Programming Languages, pages 86-93. ACM, 1998.
-
(1998)
Proceedings of the Third ACM SIGPLAN International Conference on Functional Programming Languages
, pp. 86-93
-
-
Hicks, M.1
Kakkar, P.2
Moore, J.T.3
Gunter, C.A.4
Nettles, S.5
-
15
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In In Proceedings of the ACM SIGMOD International Conference on Management of Data, volume 26,2 of SIGMOD Record, pages 474-485, 1997.
-
(1997)
Proceedings of the ACM SIGMOD International Conference on Management of Data of SIGMOD Record
, vol.26
, Issue.2
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
16
-
-
84909735622
-
-
In System Research Center, DEC, Palo Alto, CA Report No.,15
-
L. Lamport. A simple approach to specifying concurrent systems. In System Research Center, DEC, Palo Alto, CA, Report No.,15, 1986.
-
(1986)
A Simple Approach to Specifying Concurrent Systems
-
-
Lamport, L.1
-
17
-
-
0012695908
-
Specifying concurrent systems with TLA+
-
M. Broy and R. Steinbrggen, editors
-
L. Lamport. Specifying concurrent systems with TLA+. In Calculational System Design. M. Broy and R. Steinbrggen, editors, 1999.
-
(1999)
Calculational System Design
-
-
Lamport, L.1
-
19
-
-
0242434986
-
-
PhD thesis, University of Illinois, Department of Computer Science, Dec.
-
Z. Liu. Securing the Node of an Active Network. PhD thesis, University of Illinois, Department of Computer Science, Dec. 2001.
-
(2001)
Securing the Node of An Active Network
-
-
Liu, Z.1
-
20
-
-
0010951688
-
Securing the node of an active network
-
Kluwer Academic Publishers, Boston, Massachusetts, September
-
Z. Liu, R. H. Campbell, and M. D. Mickunas. Securing the node of an active network. In Active Middleware Services. Kluwer Academic Publishers, Boston, Massachusetts, September, 2000.
-
(2000)
Active Middleware Services
-
-
Liu, Z.1
Campbell, R.H.2
Mickunas, M.D.3
-
21
-
-
27744560030
-
Flexible secure multicasting in active networks
-
April
-
Z. Liu, R. H. Campbell, S. K. Varadarajan, P. Naldurg, S. Yi, and M. D. Mickunas. Flexible secure multicasting in active networks. In ICDCS International Workshop on Group Computation and Communication, Taipei, Taiwan, April, 2000.
-
(2000)
ICDCS International Workshop on Group Computation and Communication, Taipei, Taiwan
-
-
Liu, Z.1
Campbell, R.H.2
Varadarajan, S.K.3
Naldurg, P.4
Yi, S.5
Mickunas, M.D.6
-
22
-
-
84949647152
-
Pluggable active security for active networks
-
Las Vegas, Nevada, November 6-9
-
Z. Liu, P. Naldurg, S. Yi, R. H. Campbell, and M. D. Mickunas. Pluggable active security for active networks. In International Conference on Parallel and Distributed Computing and Systems (PDCS 2000), Las Vegas, Nevada, November 6-9, 2000.
-
(2000)
International Conference on Parallel and Distributed Computing and Systems (PDCS 2000)
-
-
Liu, Z.1
Naldurg, P.2
Yi, S.3
Campbell, R.H.4
Mickunas, M.D.5
-
23
-
-
84961734844
-
An agent based architecture for supporting application level security
-
Hilton Head Island, SC January 25-27
-
Z. Liu, P. Naldurg, S. Yi, T. Qian, R. H. Campbell, and M. D. Mickunas. An agent based architecture for supporting application level security. In DARPA Information Survivability Conference and Exposition, Hilton Head Island, SC, January 25-27, 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
-
-
Liu, Z.1
Naldurg, P.2
Yi, S.3
Qian, T.4
Campbell, R.H.5
Mickunas, M.D.6
-
27
-
-
84871138999
-
Security architecture for active nets
-
July 15
-
S. Murphy et al. Security architecture for active nets. AN Security Working Group, July 15, 1998.
-
(1998)
AN Security Working Group
-
-
Murphy, S.1
-
28
-
-
84962141555
-
Strong security for active networks
-
Anchorage, AL, Apr 27-28
-
S. Murphy, E. Lewis, R. Puga, R. Watson, and R. Yee. Strong security for active networks. In 2001 IEEE Open Architectures and Network Programming Proceedings (OpenArch 2001), Anchorage, AL, Apr 27-28, 2001. pp 63-70.
-
(2001)
2001 IEEE Open Architectures and Network Programming Proceedings (Open Arch 2001)
, pp. 63-70
-
-
Murphy, S.1
Lewis, E.2
Puga, R.3
Watson, R.4
Yee, R.5
-
29
-
-
0242571322
-
-
Technical report Department of Computer Science University of Illinois at Urbana-Champaign
-
P. Naldurg and R. Campbell. Dynamic access control policies in seraphim. Technical report, Department of Computer Science, University of Illinois at Urbana-Champaign, 2002.
-
(2002)
Dynamic Access Control Policies in Seraphim
-
-
Naldurg, P.1
Campbell, R.2
-
31
-
-
84949673052
-
-
SecPol. SecPol project homepage URL
-
SecPol. SecPol project homepage, 2000. URL: http://wwwdse. doc.ic.ac.uk/projects/secpol/SecPol-overview.html.
-
(2000)
-
-
-
32
-
-
0002836659
-
Safety,liveness and fairness in temporal logic
-
updated 1999
-
A. P. Sistla. Safety,liveness and fairness in temporal logic. Formal Aspects of Computing 6(5): 495-512 (1994), updated 1999.
-
(1994)
Formal Aspects of Computing
, vol.6
, Issue.5
, pp. 495-512
-
-
Sistla, A.P.1
-
35
-
-
0023829320
-
A formal specification and verification method for the prevention of denial of service
-
(Oakland '88), Oakland, CA, USA, Apr.
-
C.-F. Yu and V. D. Gligor. A formal specification and verification method for the prevention of denial of service. In Proc. 1988 IEEE Symposium on Security and Privacy (Oakland '88), Oakland, CA, USA, Apr. 1988, pp.187-202.
-
(1988)
Proc. 1988 IEEE Symposium on Security and Privacy
, pp. 187-202
-
-
Yu, C.-F.1
Gligor, V.D.2
|