메뉴 건너뛰기




Volumn , Issue , 2008, Pages 133-145

An authorization logic with explicit time

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX INTERACTIONS; COMPUTER SECURITY; CUT-ELIMINATION; HANDLING TIME;

EID: 51749123374     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2008.15     Document Type: Conference Paper
Times cited : (23)

References (39)
  • 5
    • 33645995393 scopus 로고    scopus 로고
    • Device-enabled authorization in the Grey system
    • Information Security: 8th International Conference ISC '05, September
    • L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the Grey system. In Information Security: 8th International Conference (ISC '05), Lecture Notes in Computer Science, pages 431-445, September 2005.
    • (2005) Lecture Notes in Computer Science , pp. 431-445
    • Bauer, L.1    Garriss, S.2    McCune, J.M.3    Reiter, M.K.4    Rouse, J.5    Rutenbar, P.6
  • 13
    • 26944457536 scopus 로고    scopus 로고
    • A judgmental analysis of linear logic
    • Technical Report CMU-CS-03-131R, Carnegie Mellon University
    • B.-Y. E. Chang, K. Chaudhuri, and R Pfenning. A judgmental analysis of linear logic. Technical Report CMU-CS-03-131R, Carnegie Mellon University, 2003.
    • (2003)
    • Chang, B.-Y.E.1    Chaudhuri, K.2    Pfenning, R.3
  • 14
    • 0036083264 scopus 로고    scopus 로고
    • Binder, a logic-based security language
    • M. Abadi and S. Bellovin, editors, Berkeley, California, May, IEEE Computer Society Press
    • J. DeTreville. Binder, a logic-based security language. In M. Abadi and S. Bellovin, editors, Proceedings of the 2002 Symposium on Security and Privacy (S&P'02), pages 105-113, Berkeley, California, May 2002. IEEE Computer Society Press.
    • (2002) Proceedings of the 2002 Symposium on Security and Privacy (S&P'02) , pp. 105-113
    • DeTreville, J.1
  • 15
    • 51749121161 scopus 로고    scopus 로고
    • An authorization logic with explicit time
    • Technical Report CMU-CS-07-166, Computer Science Department, Carnegie Mellon University, December
    • H. DeYoung, D. Garg, and E Pfenning. An authorization logic with explicit time. Technical Report CMU-CS-07-166, Computer Science Department, Carnegie Mellon University, December 2007.
    • (2007)
    • DeYoung, H.1    Garg, D.2    Pfenning, E.3
  • 16
    • 0001449325 scopus 로고
    • Temporal and modal logic
    • Computer Science. The MIT Press
    • E. A. Emerson. Temporal and modal logic. In Handbook of Theoretical Computer Science. The MIT Press, 1990.
    • (1990) Handbook of Theoretical
    • Emerson, E.A.1
  • 18
    • 0030295455 scopus 로고    scopus 로고
    • Temporal annotated constraint logic programming
    • T. Frühwirth. Temporal annotated constraint logic programming. Journal of Symbolic Computation, 22(5-6):555-583, 1996.
    • (1996) Journal of Symbolic Computation , vol.22 , Issue.5-6 , pp. 555-583
    • Frühwirth, T.1
  • 19
    • 33750280592 scopus 로고    scopus 로고
    • A linear logic of affirmation and knowledge
    • D. Gollman, J. Meier, and A. Sabelfeld, editors, Proceedings of the 11th European Symposium on Research in Computer Security ESORICS '06, Hamburg, Germany, September
    • D. Garg, L. Bauer, K. Bowers, R Pfenning, and M. Reiter. A linear logic of affirmation and knowledge. In D. Gollman, J. Meier, and A. Sabelfeld, editors, Proceedings of the 11th European Symposium on Research in Computer Security (ESORICS '06), pages 297-312, Hamburg, Germany, September 2006. Springer LNCS 4189.
    • (2006) Springer LNCS , vol.4189 , pp. 297-312
    • Garg, D.1    Bauer, L.2    Bowers, K.3    Pfenning, R.4    Reiter, M.5
  • 20
    • 33947650706 scopus 로고    scopus 로고
    • Non-interference in constructive authorization logic
    • J. Guttman, editor, Venice, Italy, July, IEEE Computer Society Press
    • D. Garg and R Pfenning. Non-interference in constructive authorization logic. In J. Guttman, editor, Proceedings of the 19th Computer Security Foundations Workshop (CSFW '06), pages 283-293, Venice, Italy, July 2006. IEEE Computer Society Press.
    • (2006) Proceedings of the 19th Computer Security Foundations Workshop (CSFW '06) , pp. 283-293
    • Garg, D.1    Pfenning, R.2
  • 21
    • 34250956978 scopus 로고
    • Untersuchungenüber das logische Schließen.
    • G. Gentzen. Untersuchungenüber das logische Schließen. Mathematische Zeitschrift, 39:176-210, 405-431, 1935.
    • (1935) Mathematische Zeitschrift , vol.39 , Issue.176-210 , pp. 405-431
    • Gentzen, G.1
  • 22
    • 51749106726 scopus 로고    scopus 로고
    • English translation in M. E. Szabo, editor, The Collected Papers of Gerhard Gentzen, pages 68-131, North-Holland, 1969.
    • English translation in M. E. Szabo, editor, The Collected Papers of Gerhard Gentzen, pages 68-131, North-Holland, 1969.
  • 24
    • 4243532938 scopus 로고
    • Constraint logic programming: A survey
    • J. Jaffar and M. J. Maher. Constraint logic programming: A survey. Journal of Logic Programming, 19/20:503-581, 1994.
    • (1994) Journal of Logic Programming , vol.19-20 , pp. 503-581
    • Jaffar, J.1    Maher, M.J.2
  • 25
    • 51749098451 scopus 로고    scopus 로고
    • Linear Logic and Imperative Programming. PhD thesis, Department of Computer Science, Princeton University, November
    • L. Jia. Linear Logic and Imperative Programming. PhD thesis, Department of Computer Science, Princeton University, November 2007.
    • (2007)
    • Jia, L.1
  • 27
    • 0038245727 scopus 로고    scopus 로고
    • Specifying realtime finite-state systems in linear logic
    • 2nd International Workshop on Constraint Programming for Time-Critical Applications and Multi-Agent Systems COTIC '98, of, Nice, France, September
    • M. I. Kanovich, M. Okada, and A. Scedrov. Specifying realtime finite-state systems in linear logic. In 2nd International Workshop on Constraint Programming for Time-Critical Applications and Multi-Agent Systems (COTIC '98), volume 16 of Electronic Notes in Theoretical Computer Science, pages 42-59, Nice, France, September 1998.
    • (1998) Electronic Notes in Theoretical Computer Science , vol.16 , pp. 42-59
    • Kanovich, M.I.1    Okada, M.2    Scedrov, A.3
  • 30
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur, 6(1):128-171, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 33
    • 0002140364 scopus 로고    scopus 로고
    • On the meanings of the logical constants and the justifications of the logical laws
    • P. Martin-Löf. On the meanings of the logical constants and the justifications of the logical laws. Nordic Journal of Philosophical Logic, 1(1):11-60, 1996.
    • (1996) Nordic Journal of Philosophical Logic , vol.1 , Issue.1 , pp. 11-60
    • Martin-Löf, P.1
  • 34
    • 85034570506 scopus 로고
    • Reasoning in interval temporal logic
    • E. Clarke and D. Kozen, editors, Proceedings of the Workshop on Logics of Programs, of, Springer Verlag, June
    • B. Moszkowski and Z. Manna. Reasoning in interval temporal logic. In E. Clarke and D. Kozen, editors, Proceedings of the Workshop on Logics of Programs, volume 164 of Lecture Notes in Computer Science, pages 371-382. Springer Verlag, June 1983.
    • (1983) Lecture Notes in Computer Science , vol.164 , pp. 371-382
    • Moszkowski, B.1    Manna, Z.2
  • 37
    • 51749108342 scopus 로고    scopus 로고
    • Hybridizing a logical framework
    • International Workshop on Hybrid Logic 2006 HyLo 2006, August
    • J. Reed. Hybridizing a logical framework. In International Workshop on Hybrid Logic 2006 (HyLo 2006), Electronic Notes in Computer Science, August 2006.
    • (2006) Electronic Notes in Computer Science
    • Reed, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.