메뉴 건너뛰기




Volumn 5076 LNAI, Issue , 2008, Pages 96-109

Variations in access control logic

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; COMPUTER SCIENCE; COMPUTERS; INDUSTRIAL MANAGEMENT; MANAGEMENT; PROGRAMMING THEORY; SECURITY SYSTEMS; TECHNOLOGY;

EID: 48949085268     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70525-3_9     Document Type: Conference Paper
Times cited : (38)

References (23)
  • 2
    • 33847791903 scopus 로고    scopus 로고
    • Abadi, M.: Access control in a core calculus of dependency. Electronic Notes in Theoretical Computer Science 172, 5-31 (2007); Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin
    • Abadi, M.: Access control in a core calculus of dependency. Electronic Notes in Theoretical Computer Science 172, 5-31 (2007); Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin
  • 7
    • 0001472378 scopus 로고    scopus 로고
    • Type systems
    • Tucker, A.B, ed, ch.103, pp, CRC Press, Boca Raton
    • Cardelli, L.: Type systems. In: Tucker, A.B. (ed.) The Computer Science and Engineering Handbook, ch.103, pp. 2208-2236. CRC Press, Boca Raton (1997)
    • (1997) The Computer Science and Engineering Handbook , pp. 2208-2236
    • Cardelli, L.1
  • 8
    • 35048840249 scopus 로고    scopus 로고
    • Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do as I SaY! programmatic access control with explicit identities. In: 20th IEEE Computer Security Foundations Symposium, pp. 16-30 (July 2007)
    • Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do as I SaY! programmatic access control with explicit identities. In: 20th IEEE Computer Security Foundations Symposium, pp. 16-30 (July 2007)
  • 14
    • 48949100055 scopus 로고    scopus 로고
    • DKAL: Distributed-knowledge authorization language
    • Technical Report MSR-TR-2007-116, Microsoft Research August
    • Gurevich, Y., Neeman, I.: DKAL: Distributed-knowledge authorization language. Technical Report MSR-TR-2007-116, Microsoft Research (August 2007)
    • (2007)
    • Gurevich, Y.1    Neeman, I.2
  • 18
    • 17544394392 scopus 로고    scopus 로고
    • Computer security in the real world
    • Lampson, B.W.: Computer security in the real world. IEEE Computer 37(6), 37-46 (2004)
    • (2004) IEEE Computer , vol.37 , Issue.6 , pp. 37-46
    • Lampson, B.W.1
  • 21
    • 0026188821 scopus 로고
    • Notions of computation and monads
    • Moggi, E.: Notions of computation and monads. Information and Control 93(1), 55-92 (1991)
    • (1991) Information and Control , vol.93 , Issue.1 , pp. 55-92
    • Moggi, E.1
  • 22
    • 0016555241 scopus 로고
    • The protection of information in computer system
    • Saltzer, J.H., Schroeder, M.D.: The protection of information in computer system. Proceedings of the IEEE 63(9), 1278-1308 (1975)
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.