메뉴 건너뛰기




Volumn 389, Issue 1-2, 2007, Pages 56-72

On complexity of grammars related to the safety problem

Author keywords

Accessibility problem; Automata and formal languages; Leftist grammars; Protection system

Indexed keywords

AUTOMATA THEORY; FORMAL LANGUAGES; PROBLEM SOLVING;

EID: 36048950692     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2007.07.043     Document Type: Article
Times cited : (2)

References (19)
  • 1
    • 36049011981 scopus 로고    scopus 로고
    • S. Bandyopadhyay, M. Mahajan, K.N. Kumar, A non-regular leftist language, Manuscript, 2005
  • 2
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed security
    • Proc. Editors, Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Springer
    • Blaze M., Feigenbaum J., Ioannidis J., and Keromytis A. The role of trust management in distributed security. Proc. Editors, Secure Internet Programming: Security Issues for Distributed and Mobile Objects. LNCS vol. 1603 (1999), Springer 185-210
    • (1999) LNCS , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 4
    • 36048953883 scopus 로고    scopus 로고
    • O. Cheiner, V. Saraswat, Security Analysis of Matrix, Technical Report, AT&T Shannon Laboratory, 1999
  • 8
    • 26844535811 scopus 로고    scopus 로고
    • Leftist grammars and the Chomsky hierarchy
    • 15th International Symposium Fundamentals of Computation Theory. FCT 2005
    • Jurdziński T., and Loryś K. Leftist grammars and the Chomsky hierarchy. 15th International Symposium Fundamentals of Computation Theory. FCT 2005. LNCS vol. 3623 (2005) 282-293
    • (2005) LNCS , vol.3623 , pp. 282-293
    • Jurdziński, T.1    Loryś, K.2
  • 9
    • 34547470407 scopus 로고    scopus 로고
    • Leftist grammars and the Chomsky hierarchy
    • Full version of~[8]
    • Jurdziński T., and Loryś K. Leftist grammars and the Chomsky hierarchy. Theory of Computing Systems 41 (2007) 233-256 Full version of~[8]
    • (2007) Theory of Computing Systems , vol.41 , pp. 233-256
    • Jurdziński, T.1    Loryś, K.2
  • 13
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • Lipton R., and Snyder L. A linear time algorithm for deciding subject security. Journal of the ACM 24 3 (1977) 455-464
    • (1977) Journal of the ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.1    Snyder, L.2
  • 14
    • 0033720107 scopus 로고    scopus 로고
    • R. Motwani, R. Panigrahy, V.A. Saraswat, S. Venkatasubramanian, On the decidability of accessibility problems (extended abstract), in: STOC 2000, pp. 306-315
  • 15
    • 0026851842 scopus 로고    scopus 로고
    • Ravi S. Sandhu, The typed access matrix model, in: Proceedings IEEE Computer Society Symposium on Research in Security and Privacy, May 1992, pp. 122-136
  • 16
    • 36048978190 scopus 로고    scopus 로고
    • V. Saraswat, The Matrix Design, Technical Report, AT&T Laboratory, April 1997
  • 17
    • 36048951442 scopus 로고    scopus 로고
    • V. Saraswat, R. Jagadeesan, Static support for capability-based programming in Java, Manuscript
  • 18
    • 0842288709 scopus 로고    scopus 로고
    • The dynamic-typed access matrix model and decidability of the safety problem
    • Soshi M., Maekawa M., and Okamoto E. The dynamic-typed access matrix model and decidability of the safety problem. IEICE Transactions on Fundamentals E87-A 1 (2004) 190-203
    • (2004) IEICE Transactions on Fundamentals , vol.E87-A , Issue.1 , pp. 190-203
    • Soshi, M.1    Maekawa, M.2    Okamoto, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.