-
2
-
-
33847791903
-
-
Abadi, M.: Access control in a core calculus of dependency. Electronic Notes in Theoretical Computer Science 172, 5-31 (2007); Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin
-
Abadi, M.: Access control in a core calculus of dependency. Electronic Notes in Theoretical Computer Science 172, 5-31 (2007); Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin
-
-
-
-
3
-
-
0032681509
-
A core calculus of dependency
-
January
-
Abadi, M., Banerjee, A., Heintze, N., Riecke, J.G.: A core calculus of dependency. In: Proceedings of the 26th ACM Symposium on Principles of Programming Languages, pp. 147-160 (January 1999)
-
(1999)
Proceedings of the 26th ACM Symposium on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
4
-
-
0027667638
-
A calculus for access control in distributed systems
-
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems 15(4), 706-734 (1993)
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
5
-
-
27544508109
-
Distributed proving in access-control systems
-
May
-
Bauer, L., Garriss, S., Reiter, M.K.: Distributed proving in access-control systems. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 81-95 (May 2005)
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 81-95
-
-
Bauer, L.1
Garriss, S.2
Reiter, M.K.3
-
6
-
-
35048879241
-
Design and semantics of a decentralized authorization language
-
Becker, M.Y., Fournet, C., Gordon, A.D.: Design and semantics of a decentralized authorization language. In: 20th IEEE Computer Security Foundations Symposium, pp. 3-15 (2007)
-
(2007)
20th IEEE Computer Security Foundations Symposium
, pp. 3-15
-
-
Becker, M.Y.1
Fournet, C.2
Gordon, A.D.3
-
7
-
-
0001472378
-
Type systems
-
Tucker, A.B, ed, ch.103, pp, CRC Press, Boca Raton
-
Cardelli, L.: Type systems. In: Tucker, A.B. (ed.) The Computer Science and Engineering Handbook, ch.103, pp. 2208-2236. CRC Press, Boca Raton (1997)
-
(1997)
The Computer Science and Engineering Handbook
, pp. 2208-2236
-
-
Cardelli, L.1
-
8
-
-
35048840249
-
-
Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do as I SaY! programmatic access control with explicit identities. In: 20th IEEE Computer Security Foundations Symposium, pp. 16-30 (July 2007)
-
Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do as I SaY! programmatic access control with explicit identities. In: 20th IEEE Computer Security Foundations Symposium, pp. 16-30 (July 2007)
-
-
-
-
11
-
-
35048817499
-
A type discipline for authorization in distributed systems
-
Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization in distributed systems. In: 20th IEEE Computer Security Foundations Symposium, pp. 31-45 (2007)
-
(2007)
20th IEEE Computer Security Foundations Symposium
, pp. 31-45
-
-
Fournet, C.1
Gordon, A.D.2
Maffeis, S.3
-
14
-
-
48949100055
-
DKAL: Distributed-knowledge authorization language
-
Technical Report MSR-TR-2007-116, Microsoft Research August
-
Gurevich, Y., Neeman, I.: DKAL: Distributed-knowledge authorization language. Technical Report MSR-TR-2007-116, Microsoft Research (August 2007)
-
(2007)
-
-
Gurevich, Y.1
Neeman, I.2
-
16
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems 10(4), 265-310 (1992)
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
18
-
-
17544394392
-
Computer security in the real world
-
Lampson, B.W.: Computer security in the real world. IEEE Computer 37(6), 37-46 (2004)
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B.W.1
-
19
-
-
77952364800
-
Alpaca: Extensible authorization for distributed services
-
Lesniewski-Laas, C., Ford, B., Strauss, J., Kaashoek, M.F., Morris, R.: Alpaca: extensible authorization for distributed services. In: 14th ACM Conference on Computer and Communications Security, pp. 432-444 (2007)
-
(2007)
14th ACM Conference on Computer and Communications Security
, pp. 432-444
-
-
Lesniewski-Laas, C.1
Ford, B.2
Strauss, J.3
Kaashoek, M.F.4
Morris, R.5
-
20
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Li, N., Grosof, B.N., Feigenbaum, J.: Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security 6(1), 128-171 (2003)
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
21
-
-
0026188821
-
Notions of computation and monads
-
Moggi, E.: Notions of computation and monads. Information and Control 93(1), 55-92 (1991)
-
(1991)
Information and Control
, vol.93
, Issue.1
, pp. 55-92
-
-
Moggi, E.1
-
22
-
-
0016555241
-
The protection of information in computer system
-
Saltzer, J.H., Schroeder, M.D.: The protection of information in computer system. Proceedings of the IEEE 63(9), 1278-1308 (1975)
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
|