-
2
-
-
33847791903
-
Access control in a core calculus of dependency
-
April
-
Abadi, M.: Access control in a core calculus of dependency. Electronic Notes in Theoretical Computer Science, Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin 172, 5-31 (April 2007)
-
(2007)
Electronic Notes in Theoretical Computer Science, Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin
, vol.172
, pp. 5-31
-
-
Abadi, M.1
-
3
-
-
0027667638
-
A calculus for access control in distributed systems
-
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems 15(4), 706-734 (1993)
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
4
-
-
33845936084
-
A logical account of NGSCB
-
de Frutos-Escrig, D, Núñez, M, eds, FORTE 2004, Springer, Heidelberg
-
Abadi, M., Wobber, T.: A logical account of NGSCB. In: de Frutos-Escrig, D., Núñez, M. (eds.) FORTE 2004. LNCS, vol. 3235, pp. 1-12. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3235
, pp. 1-12
-
-
Abadi, M.1
Wobber, T.2
-
5
-
-
84944182544
-
-
Alechina, N., Mendler, M., de Paiva, V., Ritter, E.: Categorical and kripke semantics for constructive S4 modal logic. In: Fribourg, L. (ed.) CSL 2001. LNCS, 2142, pp. 292-307. Springer, Heidelberg (2001)
-
Alechina, N., Mendler, M., de Paiva, V., Ritter, E.: Categorical and kripke semantics for constructive S4 modal logic. In: Fribourg, L. (ed.) CSL 2001. LNCS, vol. 2142, pp. 292-307. Springer, Heidelberg (2001)
-
-
-
-
7
-
-
33645995393
-
-
Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J., Rutenbar, P.: Device-enabled authorization in the Grey system. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, 3650, pp. 431-445. Springer, Heidelberg (2005)
-
Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J., Rutenbar, P.: Device-enabled authorization in the Grey system. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 431-445. Springer, Heidelberg (2005)
-
-
-
-
9
-
-
27544508109
-
Distributed proving in access-control systems
-
May
-
Bauer, L., Garriss, S., Reiter, M.K.: Distributed proving in access-control systems. In: Proceedings of the 2005 Symposium on Security and Privacy, pp. 81-95 (May 2005)
-
(2005)
Proceedings of the 2005 Symposium on Security and Privacy
, pp. 81-95
-
-
Bauer, L.1
Garriss, S.2
Reiter, M.K.3
-
10
-
-
35048879241
-
Design and semantics of a decentralized authorization language
-
Becker, M.Y., Fournet, C., Gordon, A.D.: Design and semantics of a decentralized authorization language. In: 20th IEEE Computer Security Foundations Symposium, pp. 3-15 (2007)
-
(2007)
20th IEEE Computer Security Foundations Symposium
, pp. 3-15
-
-
Becker, M.Y.1
Fournet, C.2
Gordon, A.D.3
-
11
-
-
0032399912
-
Computational types from a logical perspective
-
Benton, P.N., Bierman, G.M., de Paiva, V.C.V.: Computational types from a logical perspective. Journal of Functional Programming 8(2), 177-193 (1998)
-
(1998)
Journal of Functional Programming
, vol.8
, Issue.2
, pp. 177-193
-
-
Benton, P.N.1
Bierman, G.M.2
de Paiva, V.C.V.3
-
12
-
-
0001472378
-
Type systems
-
Tucker, A.B, ed, ch. 103, pp, CRC Press, Boca Raton, FL
-
Cardelli, L.: Type systems. In: Tucker, A.B. (ed.) The Computer Science and Engineering Handbook, ch. 103, pp. 2208-2236. CRC Press, Boca Raton, FL (1997)
-
(1997)
The Computer Science and Engineering Handbook
, pp. 2208-2236
-
-
Cardelli, L.1
-
13
-
-
33947670402
-
Audit-based compliance control
-
Cederquist, J.G., Corin, R., Dekker, M.A.C., Etalle, S., den Hartog, J.I., Lenzini, G.: Audit-based compliance control. Int. J. Inf. Secur. 6(2), 133-151 (2007)
-
(2007)
Int. J. Inf. Secur
, vol.6
, Issue.2
, pp. 133-151
-
-
Cederquist, J.G.1
Corin, R.2
Dekker, M.A.C.3
Etalle, S.4
den Hartog, J.I.5
Lenzini, G.6
-
14
-
-
35048840249
-
-
Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do as I SaY! programmatic access control with explicit identities. In: 20th IEEE Computer Security Foundations Symposium, pp. 16-30 (July 2007)
-
Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do as I SaY! programmatic access control with explicit identities. In: 20th IEEE Computer Security Foundations Symposium, pp. 16-30 (July 2007)
-
-
-
-
15
-
-
0347006812
-
The elimination theorem when modality is present
-
Curry, H.B.: The elimination theorem when modality is present. Journal of Symbolic Logic 17(4), 249-265 (1952)
-
(1952)
Journal of Symbolic Logic
, vol.17
, Issue.4
, pp. 249-265
-
-
Curry, H.B.1
-
18
-
-
35048817499
-
A type discipline for authorization in distributed systems
-
Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization in distributed systems. In: 20th IEEE Computer Security Foundations Symposium, pp. 31-45 (2007)
-
(2007)
20th IEEE Computer Security Foundations Symposium
, pp. 31-45
-
-
Fournet, C.1
Gordon, A.D.2
Maffeis, S.3
-
19
-
-
33750280592
-
A linear logic of authorization and knowledge
-
Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
-
Garg, D., Bauer, L., Bowers, K.D., Pfenning, F., Reiter, M.K.: A linear logic of authorization and knowledge. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 297-312. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 297-312
-
-
Garg, D.1
Bauer, L.2
Bowers, K.D.3
Pfenning, F.4
Reiter, M.K.5
-
22
-
-
0001794166
-
Eine Interpretation des intuitionistischen Aussagenkalkuls.
-
Gödel, K.: Eine Interpretation des intuitionistischen Aussagenkalkuls. Ergebnisse eines mathematischen Kolloquiums 8, 39-40 (1933)
-
(1933)
Ergebnisse eines mathematischen Kolloquiums
, vol.8
, pp. 39-40
-
-
Gödel, K.1
-
25
-
-
0000595575
-
The computational complexity of provability in systems of modal propositional logic
-
Ladner, R.E.: The computational complexity of provability in systems of modal propositional logic. SIAM Journal on Computing 6(3), 467-480 (1977)
-
(1977)
SIAM Journal on Computing
, vol.6
, Issue.3
, pp. 467-480
-
-
Ladner, R.E.1
-
26
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems 10(4), 265-310 (1992)
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
28
-
-
17544394392
-
Computer security in the real world
-
Lampson, B.W.: Computer security in the real world. IEEE Computer 37(6), 37-46 (2004)
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B.W.1
-
29
-
-
77952364800
-
Alpaca: Extensible authorization for distributed services
-
Lesniewski-Laas, C., Ford, B., Strauss, J., Kaashoek, M.F., Morris, R.: Alpaca: Extensible authorization for distributed services. In: 14th ACM Conference on Computer and Communications Security, pp. 432-444 (2007)
-
(2007)
14th ACM Conference on Computer and Communications Security
, pp. 432-444
-
-
Lesniewski-Laas, C.1
Ford, B.2
Strauss, J.3
Kaashoek, M.F.4
Morris, R.5
-
30
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Li, N., Grosof, B.N., Feigenbaum, J.: Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security 6(1), 128-171 (2003)
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
32
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3), 474-514 (2005)
-
(2005)
J. ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
33
-
-
0026188821
-
Notions of computation and monads
-
Moggi, E.: Notions of computation and monads. Information and Computation 93(1), 55-92 (1991)
-
(1991)
Information and Computation
, vol.93
, Issue.1
, pp. 55-92
-
-
Moggi, E.1
-
35
-
-
0028380781
-
Authentication in the Taos operating system
-
Wobber, E., Abadi, M., Burrows, M., Lampson, B.: Authentication in the Taos operating system. ACM Transactions on Computer Systems 12(1), 3-32 (1994)
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|