-
3
-
-
0032681509
-
A core calculus of dependency
-
San Antonio, TX, January
-
Martín Abadi, Anindya Banerjee, Nevin Heintze, and Jon Riecke. A core calculus of dependency. In Proc. 26th ACM Symp. on Principles of Programming Languages (POPL), pages 147-160, San Antonio, TX, January 1999.
-
(1999)
Proc. 26th ACM Symp. on Principles of Programming Languages (POPL)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
4
-
-
0027667638
-
A calculus for access control in distributed systems
-
September
-
Martín Abadi, Michael Burrows, Butler W. Lampson, and Gordon D. Plotkin. A calculus for access control in distributed systems. Transactions on Programming Languages and Systems, 15(4):706-734, September 1993.
-
(1993)
Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.W.3
Plotkin, G.D.4
-
5
-
-
0033281265
-
Proof-carrying authentication
-
New York, NY, USA, ACM
-
Andrew W. Appel and Edward W. Felten. Proof-carrying authentication. In CCS '99: Proceedings of the 6th ACM conference on Computer and communications security, pages 52-62, New York, NY, USA, 1999. ACM.
-
(1999)
CCS '99: Proceedings of the 6th ACM conference on Computer and communications security
, pp. 52-62
-
-
Appel, A.W.1
Felten, E.W.2
-
6
-
-
4444324359
-
An approach to UNIX security logging
-
S. Axelsson, U. Lindqvist, U. Gustafson, and E. Jonsson. An approach to UNIX security logging. In Proc. 21st NIST-NCSC National Information Systems Security Conference, pages 62-75, 1998.
-
(1998)
Proc. 21st NIST-NCSC National Information Systems Security Conference
, pp. 62-75
-
-
Axelsson, S.1
Lindqvist, U.2
Gustafson, U.3
Jonsson, E.4
-
8
-
-
33750236737
-
Consumable credentials in logic-based access control
-
Technical Report CMU-CYLAB-06-002, Carnegie Mellon University, February
-
Lujo Bauer, Kevin D. Bowers, Frank Pfenning, and Michael K. Reiter. Consumable credentials in logic-based access control. Technical Report CMU-CYLAB-06-002, Carnegie Mellon University, February 2006.
-
(2006)
-
-
Bauer, L.1
Bowers, K.D.2
Pfenning, F.3
Reiter, M.K.4
-
9
-
-
33645995393
-
Device-enabled authorization in the Grey system
-
Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, and Peter Rutenbar. Device-enabled authorization in the Grey system. In Information Security: 8th International Conference, ISC 2005, pages 431-445, 2005.
-
(2005)
Information Security: 8th International Conference, ISC
, pp. 431-445
-
-
Bauer, L.1
Garriss, S.2
McCune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
11
-
-
51749089241
-
-
Mihir Bellare and Bennet Yee. Forward integrity for secure audit logs. Technical report, Computer Science and Engineering Department, U. California at San Diego, 1997.
-
Mihir Bellare and Bennet Yee. Forward integrity for secure audit logs. Technical report, Computer Science and Engineering Department, U. California at San Diego, 1997.
-
-
-
-
12
-
-
0346236349
-
-
Art and Science. Addison-Wesley Professional
-
Matt Bishop. Computer Security: Art and Science. Addison-Wesley Professional, 2002.
-
(2002)
Computer Security
-
-
Bishop, M.1
-
13
-
-
84982899264
-
The role of trust management in distributed systems security
-
Springer-Verlag, London, UK
-
Matt Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis. The role of trust management in distributed systems security. In Secure Internet programming: security issues for mobile and distributed objects, pages 185-210. Springer-Verlag, London, UK, 1999.
-
(1999)
Secure Internet programming: Security issues for mobile and distributed objects
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
14
-
-
33745005053
-
An audit logic for accountability
-
J.G. Cederquist, R. Corin., M.A.C. Dekker, S. Etalle, and J.J. den Hartog. An audit logic for accountability. In The Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks, 2005.
-
(2005)
The Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks
-
-
Cederquist, J.G.1
Corin, R.2
Dekker, M.A.C.3
Etalle, S.4
den Hartog, J.J.5
-
15
-
-
0003180840
-
A formulation of the simple theory of types
-
June
-
Alonzo Church. A formulation of the simple theory of types. The Journal of Symbolic Logic, 5(2):56-68, June 1940.
-
(1940)
The Journal of Symbolic Logic
, vol.5
, Issue.2
, pp. 56-68
-
-
Church, A.1
-
16
-
-
51749100355
-
-
North-Holland, Amsterdam
-
Haskell B. Curry, Robert Feys, and William Craig. Combinatory Logic, volume 1. North-Holland, Amsterdam, 1958.
-
(1958)
Combinatory Logic
, vol.1
-
-
Curry, H.B.1
Feys, R.2
Craig, W.3
-
23
-
-
0016984825
-
Protection in operating systems
-
M. A. Harrison, W. L Ruzzo, and J. D. Ullman. Protection in operating systems. Comm. ACM, 19(8):461-471, 1976.
-
(1976)
Comm. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
25
-
-
51749091892
-
-
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, and Steve Zdancewic. Aura: A programming language for authorization and audit, preliminary technical results. Technical Report MS-CIS-08-10, U. Pennsylvania, 2008.
-
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, and Steve Zdancewic. Aura: A programming language for authorization and audit, preliminary technical results. Technical Report MS-CIS-08-10, U. Pennsylvania, 2008.
-
-
-
-
26
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
Washington, DC, USA, IEEE Computer Society
-
C. Ko, M. Ruschitzka, and K. Levitt. Execution monitoring of security-critical programs in distributed systems: a specification-based approach. In SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy, page 175, Washington, DC, USA, 1997. IEEE Computer Society.
-
(1997)
SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 175
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
27
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Ninghui Li, Benjamin N. Grosof, and Joan Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1), 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
28
-
-
49249101269
-
Efficient representation and validation of proofs
-
Washington, DC, USA, IEEE Computer Society
-
G. C. Necula and P. Lee. Efficient representation and validation of proofs. In LICS '98: Proceedings of the 13th Annual IEEE Symposium on Logic in Computer Science, page 93, Washington, DC, USA, 1998. IEEE Computer Society.
-
(1998)
LICS '98: Proceedings of the 13th Annual IEEE Symposium on Logic in Computer Science
, pp. 93
-
-
Necula, G.C.1
Lee, P.2
-
31
-
-
51749108341
-
-
Jeffrey C. Vaughan, Limin Jia, Karl Mazurak, and Steve Zdancewic. Evidence-based audit, technical appendix. Technical Report MS-CIS-08-09, U. Pennsylvania, 2008.
-
Jeffrey C. Vaughan, Limin Jia, Karl Mazurak, and Steve Zdancewic. Evidence-based audit, technical appendix. Technical Report MS-CIS-08-09, U. Pennsylvania, 2008.
-
-
-
-
33
-
-
27244446549
-
A logging and auditing file system
-
New Orleans, LA, USA, December
-
Christopher Wee. LAFS: A logging and auditing file system. In Annual Computer Security Applications Conference, pages 231-240, New Orleans, LA, USA, December 1995.
-
(1995)
Annual Computer Security Applications Conference
, pp. 231-240
-
-
Christopher Wee, L.A.F.S.1
|