메뉴 건너뛰기




Volumn 4960 LNCS, Issue , 2008, Pages 208-223

TAPIDO: Trust and Authorization Via Provenance and Integrity in Distributed Objects

Author keywords

[No Author keywords available]

Indexed keywords

CONFERENCES (CHEMICAL INDUSTRY); DISTRIBUTED APPLICATIONS (DA); DISTRIBUTED OBJECTS; EUROPEAN; FLEXIBLE CONSTRUCTION; HEIDELBERG (CO); LANGUAGES AND SYSTEMS; PROGRAMMING MODELS; SECURITY POLICIES;

EID: 47249132159     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78739-6_17     Document Type: Conference Paper
Times cited : (10)

References (42)
  • 1
    • 47249116548 scopus 로고    scopus 로고
    • Chess, B., O'Neil, Y.T., West, J.: Javascript hijacking. Technical report, Fortify Software (2007), http://www.fortifysoftware.com/news-events/ releases/2007/2007-04-02.jsp
    • Chess, B., O'Neil, Y.T., West, J.: Javascript hijacking. Technical report, Fortify Software (2007), http://www.fortifysoftware.com/news-events/ releases/2007/2007-04-02.jsp
  • 2
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10(4), 265-310 (1992)
    • (1992) ACM Trans. Comput. Syst , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 4
    • 0033715532 scopus 로고    scopus 로고
    • Abadi, M., Fournet, C., Gonthier, G.: Authentication primitives and their compilation. In: POPL, pp. 302-315 (2000)
    • Abadi, M., Fournet, C., Gonthier, G.: Authentication primitives and their compilation. In: POPL, pp. 302-315 (2000)
  • 6
    • 21644477867 scopus 로고    scopus 로고
    • Securing Java RMI-based distributed applications. In: ACSAC
    • Los Alamitos
    • Li, N., Mitchell, J.C., Tong, D.: Securing Java RMI-based distributed applications. In: ACSAC, pp. 262-271. IEEE Computer Society, Los Alamitos (2004)
    • (2004) IEEE Computer Society , pp. 262-271
    • Li, N.1    Mitchell, J.C.2    Tong, D.3
  • 8
    • 26844492006 scopus 로고    scopus 로고
    • Gordon, A.D., Pucella, R.: Validating a web service security abstraction by typing. Formal Asp. Comput. 17(3), 277-318 (2005)
    • Gordon, A.D., Pucella, R.: Validating a web service security abstraction by typing. Formal Asp. Comput. 17(3), 277-318 (2005)
  • 10
    • 33750387038 scopus 로고    scopus 로고
    • Abadi, M.: Access control in a core calculus of dependency. In: ICFP, pp. 263-273. ACM, New York (2006)
    • Abadi, M.: Access control in a core calculus of dependency. In: ICFP, pp. 263-273. ACM, New York (2006)
  • 11
    • 33947650706 scopus 로고    scopus 로고
    • Non-interference in constructive authorization logic
    • Garg, D., Pfenning, F.: Non-interference in constructive authorization logic. CSFW 19, 283-296 (2006)
    • (2006) CSFW , vol.19 , pp. 283-296
    • Garg, D.1    Pfenning, F.2
  • 12
    • 33750280592 scopus 로고    scopus 로고
    • A linear logic of authorization and knowledge
    • Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
    • Garg, D., Bauer, L., Bowers, K.D., Pfenning, F., Reiter, M.K.: A linear logic of authorization and knowledge. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 297-312. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189 , pp. 297-312
    • Garg, D.1    Bauer, L.2    Bowers, K.D.3    Pfenning, F.4    Reiter, M.K.5
  • 15
    • 35048840249 scopus 로고    scopus 로고
    • Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do As I SaY! programmatic access control with explicit identities. In: CSF, IEEE, Los Alamitos (2007)
    • Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do As I SaY! programmatic access control with explicit identities. In: CSF, IEEE, Los Alamitos (2007)
  • 16
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • Gordon, A.D., Jeffrey, A.: Authenticity by typing for security protocols. Journal of Computer Security 11(4), 451-520 (2003)
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 451-520
    • Gordon, A.D.1    Jeffrey, A.2
  • 17
    • 35448946495 scopus 로고    scopus 로고
    • Provenance in databases
    • ACM, New York
    • Buneman, P., Tan, W.C.: Provenance in databases. In: SIGMOD Conference, pp. 1171-1173. ACM, New York (2007)
    • (2007) SIGMOD Conference , pp. 1171-1173
    • Buneman, P.1    Tan, W.C.2
  • 21
    • 85030037503 scopus 로고    scopus 로고
    • Lucassen, J.M., Gifford, D.K.: Polymorphic effect systems. In: POPL, pp. 47-57 (1988)
    • Lucassen, J.M., Gifford, D.K.: Polymorphic effect systems. In: POPL, pp. 47-57 (1988)
  • 22
    • 84974191759 scopus 로고
    • Polymorphic type, region and effect inference
    • Talpin, J., Jouvelot, P.: Polymorphic type, region and effect inference. J. Funct. Program. 2(3), 245-271 (1992)
    • (1992) J. Funct. Program , vol.2 , Issue.3 , pp. 245-271
    • Talpin, J.1    Jouvelot, P.2
  • 23
    • 0000549632 scopus 로고
    • The type and effect discipline
    • Talpin, J., Jouvelot, P.: The type and effect discipline. Inf. Comput. 111(2), 245-296 (1994)
    • (1994) Inf. Comput , vol.111 , Issue.2 , pp. 245-296
    • Talpin, J.1    Jouvelot, P.2
  • 24
    • 1442284573 scopus 로고    scopus 로고
    • MJ: An imperative core calculus for Java and Java with effects
    • Technical Report 563, Cambridge University Computer Laboratory
    • Bierman, G., Parkinson, M., Pitts, A.: MJ: An imperative core calculus for Java and Java with effects. Technical Report 563, Cambridge University Computer Laboratory (2003)
    • (2003)
    • Bierman, G.1    Parkinson, M.2    Pitts, A.3
  • 25
    • 84947944620 scopus 로고    scopus 로고
    • An object-oriented effects system
    • Guerraoui, R, ed, ECOOP 1999, Springer, Heidelberg
    • Greenhouse, A., Boyland, J.: An object-oriented effects system. In: Guerraoui, R. (ed.) ECOOP 1999. LNCS, vol. 1628, pp. 205-229. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1628 , pp. 205-229
    • Greenhouse, A.1    Boyland, J.2
  • 26
    • 36048984982 scopus 로고    scopus 로고
    • Encapsulating objects with confined types
    • to appear
    • Grothoff, C., Palsberg, J., Vitek, J.: Encapsulating objects with confined types. In: TOPLAS (to appear, 2007)
    • (2007) TOPLAS
    • Grothoff, C.1    Palsberg, J.2    Vitek, J.3
  • 28
    • 0142156593 scopus 로고    scopus 로고
    • 3
    • Blundo, C, Laneve, C, eds, ICTCS 2003, Springer, Heidelberg
    • 3. In: Blundo, C., Laneve, C. (eds.) ICTCS 2003. LNCS, vol. 2841, pp. 97-110. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2841 , pp. 97-110
    • Damiani, F.1    Drossopoulou, S.2    Giannini, P.3
  • 29
    • 0034826554 scopus 로고    scopus 로고
    • Enforcing high-level protocols in low-level software
    • DeLine, R., Fähndrich, M.: Enforcing high-level protocols in low-level software. In: PLDI, pp. 59-69 (2001)
    • (2001) PLDI , pp. 59-69
    • DeLine, R.1    Fähndrich, M.2
  • 30
    • 33646191938 scopus 로고    scopus 로고
    • Dezani-Ciancaglini, M., Yoshida, N., Ahern, A., Drossopoulou, S.: A distributed object-oriented language with session types. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, 3705, pp. 299-318. Springer, Heidelberg (2005)
    • Dezani-Ciancaglini, M., Yoshida, N., Ahern, A., Drossopoulou, S.: A distributed object-oriented language with session types. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, vol. 3705, pp. 299-318. Springer, Heidelberg (2005)
  • 31
    • 24644447402 scopus 로고    scopus 로고
    • Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 141-156. Springer, Heidelberg (2005)
    • Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 141-156. Springer, Heidelberg (2005)
  • 33
    • 0031674984 scopus 로고    scopus 로고
    • Flatt, M., Krishnamurthi, S., Felleisen, M.: Classes and mixins. In: POPL, pp. 171-183 (1998)
    • Flatt, M., Krishnamurthi, S., Felleisen, M.: Classes and mixins. In: POPL, pp. 171-183 (1998)
  • 34
    • 0033203773 scopus 로고    scopus 로고
    • Igarashi, A., Pierce, B., Wadler, P.: Featherweight Java: A minimal core calculus for Java and GJ. In: OOPSLA (1999)
    • Igarashi, A., Pierce, B., Wadler, P.: Featherweight Java: A minimal core calculus for Java and GJ. In: OOPSLA (1999)
  • 36
    • 0345884636 scopus 로고    scopus 로고
    • Making the future safe for the past: Adding genericity to the Java programming language
    • Bracha, G., Odersky, M., Stoutamire, D., Wadler, P.: Making the future safe for the past: Adding genericity to the Java programming language. In: OOPSLA, pp. 183-200 (1998)
    • (1998) OOPSLA , pp. 183-200
    • Bracha, G.1    Odersky, M.2    Stoutamire, D.3    Wadler, P.4
  • 39
    • 0029192639 scopus 로고    scopus 로고
    • Cardelli, L.: A language with distributed scope. In: POPL, pp. 286-297. ACM Press, New York (1995)
    • Cardelli, L.: A language with distributed scope. In: POPL, pp. 286-297. ACM Press, New York (1995)
  • 41
    • 0038460668 scopus 로고    scopus 로고
    • Process algebras with localities
    • North-Holland, pp
    • Castellani, I.: Process algebras with localities. In: Handbook of Process Algebra, North-Holland, pp. 945-1045 (2001)
    • (2001) Handbook of Process Algebra , pp. 945-1045
    • Castellani, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.