-
1
-
-
34247276117
-
Access control in a core calculus of dependency
-
New York, NY, USA, ACM Press
-
M. Abadi. Access control in a core calculus of dependency. In ICFP '06: Proceedings of the eleventh ACM SIGPLAN international conference on Functional programming, pages 263-273, New York, NY, USA, 2006. ACM Press.
-
(2006)
ICFP '06: Proceedings of the eleventh ACM SIGPLAN international conference on Functional programming
, pp. 263-273
-
-
Abadi, M.1
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
3
-
-
0033281265
-
Proof-carrying authentication
-
G. Tsudik, editor, Singapore, November, ACM Press
-
A. W. Appel and E. W. Felten. Proof-carrying authentication. In G. Tsudik, editor, Proceedings of the 6th Conference on Computer and Communications Security, pages 52-62, Singapore, November 1999. ACM Press.
-
(1999)
Proceedings of the 6th Conference on Computer and Communications Security
, pp. 52-62
-
-
Appel, A.W.1
Felten, E.W.2
-
5
-
-
33645995393
-
Device-enabled authorization in the Grey system
-
Information Security: 8th International Conference ISC '05, September
-
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the Grey system. In Information Security: 8th International Conference (ISC '05), Lecture Notes in Computer Science, pages 431-445, September 2005.
-
(2005)
Lecture Notes in Computer Science
, pp. 431-445
-
-
Bauer, L.1
Garriss, S.2
McCune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
9
-
-
0041524664
-
A logical framework for reasoning about access control models
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. ACM Trans. Inf. Syst. Secur, 6(1):71-127, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
10
-
-
80052494019
-
Consumable credentials in logic-based access-control systems
-
San Diego, California, February
-
K. D. Bowers, L. Bauer, D. Garg, F. Pfenning, and M. K. Reiter. Consumable credentials in logic-based access-control systems. In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS '07), San Diego, California, February 2007.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS '07)
-
-
Bowers, K.D.1
Bauer, L.2
Garg, D.3
Pfenning, F.4
Reiter, M.K.5
-
12
-
-
33947670402
-
Audit-based compliance control
-
J. G. Cederquist, R. Corin, M. A. C. Dekker, S. Etalle, J. I. den Hartog, and G. Lenzini. Audit-based compliance control. Int. J. Inf. Secur., 6(2):133-151, 2007.
-
(2007)
Int. J. Inf. Secur
, vol.6
, Issue.2
, pp. 133-151
-
-
Cederquist, J.G.1
Corin, R.2
Dekker, M.A.C.3
Etalle, S.4
den Hartog, J.I.5
Lenzini, G.6
-
13
-
-
26944457536
-
A judgmental analysis of linear logic
-
Technical Report CMU-CS-03-131R, Carnegie Mellon University
-
B.-Y. E. Chang, K. Chaudhuri, and R Pfenning. A judgmental analysis of linear logic. Technical Report CMU-CS-03-131R, Carnegie Mellon University, 2003.
-
(2003)
-
-
Chang, B.-Y.E.1
Chaudhuri, K.2
Pfenning, R.3
-
14
-
-
0036083264
-
Binder, a logic-based security language
-
M. Abadi and S. Bellovin, editors, Berkeley, California, May, IEEE Computer Society Press
-
J. DeTreville. Binder, a logic-based security language. In M. Abadi and S. Bellovin, editors, Proceedings of the 2002 Symposium on Security and Privacy (S&P'02), pages 105-113, Berkeley, California, May 2002. IEEE Computer Society Press.
-
(2002)
Proceedings of the 2002 Symposium on Security and Privacy (S&P'02)
, pp. 105-113
-
-
DeTreville, J.1
-
15
-
-
51749121161
-
An authorization logic with explicit time
-
Technical Report CMU-CS-07-166, Computer Science Department, Carnegie Mellon University, December
-
H. DeYoung, D. Garg, and E Pfenning. An authorization logic with explicit time. Technical Report CMU-CS-07-166, Computer Science Department, Carnegie Mellon University, December 2007.
-
(2007)
-
-
DeYoung, H.1
Garg, D.2
Pfenning, E.3
-
16
-
-
0001449325
-
Temporal and modal logic
-
Computer Science. The MIT Press
-
E. A. Emerson. Temporal and modal logic. In Handbook of Theoretical Computer Science. The MIT Press, 1990.
-
(1990)
Handbook of Theoretical
-
-
Emerson, E.A.1
-
18
-
-
0030295455
-
Temporal annotated constraint logic programming
-
T. Frühwirth. Temporal annotated constraint logic programming. Journal of Symbolic Computation, 22(5-6):555-583, 1996.
-
(1996)
Journal of Symbolic Computation
, vol.22
, Issue.5-6
, pp. 555-583
-
-
Frühwirth, T.1
-
19
-
-
33750280592
-
A linear logic of affirmation and knowledge
-
D. Gollman, J. Meier, and A. Sabelfeld, editors, Proceedings of the 11th European Symposium on Research in Computer Security ESORICS '06, Hamburg, Germany, September
-
D. Garg, L. Bauer, K. Bowers, R Pfenning, and M. Reiter. A linear logic of affirmation and knowledge. In D. Gollman, J. Meier, and A. Sabelfeld, editors, Proceedings of the 11th European Symposium on Research in Computer Security (ESORICS '06), pages 297-312, Hamburg, Germany, September 2006. Springer LNCS 4189.
-
(2006)
Springer LNCS
, vol.4189
, pp. 297-312
-
-
Garg, D.1
Bauer, L.2
Bowers, K.3
Pfenning, R.4
Reiter, M.5
-
20
-
-
33947650706
-
Non-interference in constructive authorization logic
-
J. Guttman, editor, Venice, Italy, July, IEEE Computer Society Press
-
D. Garg and R Pfenning. Non-interference in constructive authorization logic. In J. Guttman, editor, Proceedings of the 19th Computer Security Foundations Workshop (CSFW '06), pages 283-293, Venice, Italy, July 2006. IEEE Computer Society Press.
-
(2006)
Proceedings of the 19th Computer Security Foundations Workshop (CSFW '06)
, pp. 283-293
-
-
Garg, D.1
Pfenning, R.2
-
21
-
-
34250956978
-
Untersuchungenüber das logische Schließen.
-
G. Gentzen. Untersuchungenüber das logische Schließen. Mathematische Zeitschrift, 39:176-210, 405-431, 1935.
-
(1935)
Mathematische Zeitschrift
, vol.39
, Issue.176-210
, pp. 405-431
-
-
Gentzen, G.1
-
22
-
-
51749106726
-
-
English translation in M. E. Szabo, editor, The Collected Papers of Gerhard Gentzen, pages 68-131, North-Holland, 1969.
-
English translation in M. E. Szabo, editor, The Collected Papers of Gerhard Gentzen, pages 68-131, North-Holland, 1969.
-
-
-
-
25
-
-
51749098451
-
-
Linear Logic and Imperative Programming. PhD thesis, Department of Computer Science, Princeton University, November
-
L. Jia. Linear Logic and Imperative Programming. PhD thesis, Department of Computer Science, Princeton University, November 2007.
-
(2007)
-
-
Jia, L.1
-
27
-
-
0038245727
-
Specifying realtime finite-state systems in linear logic
-
2nd International Workshop on Constraint Programming for Time-Critical Applications and Multi-Agent Systems COTIC '98, of, Nice, France, September
-
M. I. Kanovich, M. Okada, and A. Scedrov. Specifying realtime finite-state systems in linear logic. In 2nd International Workshop on Constraint Programming for Time-Critical Applications and Multi-Agent Systems (COTIC '98), volume 16 of Electronic Notes in Theoretical Computer Science, pages 42-59, Nice, France, September 1998.
-
(1998)
Electronic Notes in Theoretical Computer Science
, vol.16
, pp. 42-59
-
-
Kanovich, M.I.1
Okada, M.2
Scedrov, A.3
-
28
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
November
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
29
-
-
77952364800
-
Alpaca: Extensible authorization for distributed services
-
To appear
-
C. Lesniewski-Laas, B. Ford, J. Strauss, M. F. Kaashoek, and R. Morris. Alpaca: extensible authorization for distributed services. In 14th ACM Conference on Computer and Communications Security, 2007. To appear.
-
(2007)
14th ACM Conference on Computer and Communications Security
-
-
Lesniewski-Laas, C.1
Ford, B.2
Strauss, J.3
Kaashoek, M.F.4
Morris, R.5
-
30
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur, 6(1):128-171, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
33
-
-
0002140364
-
On the meanings of the logical constants and the justifications of the logical laws
-
P. Martin-Löf. On the meanings of the logical constants and the justifications of the logical laws. Nordic Journal of Philosophical Logic, 1(1):11-60, 1996.
-
(1996)
Nordic Journal of Philosophical Logic
, vol.1
, Issue.1
, pp. 11-60
-
-
Martin-Löf, P.1
-
34
-
-
85034570506
-
Reasoning in interval temporal logic
-
E. Clarke and D. Kozen, editors, Proceedings of the Workshop on Logics of Programs, of, Springer Verlag, June
-
B. Moszkowski and Z. Manna. Reasoning in interval temporal logic. In E. Clarke and D. Kozen, editors, Proceedings of the Workshop on Logics of Programs, volume 164 of Lecture Notes in Computer Science, pages 371-382. Springer Verlag, June 1983.
-
(1983)
Lecture Notes in Computer Science
, vol.164
, pp. 371-382
-
-
Moszkowski, B.1
Manna, Z.2
-
37
-
-
51749108342
-
Hybridizing a logical framework
-
International Workshop on Hybrid Logic 2006 HyLo 2006, August
-
J. Reed. Hybridizing a logical framework. In International Workshop on Hybrid Logic 2006 (HyLo 2006), Electronic Notes in Computer Science, August 2006.
-
(2006)
Electronic Notes in Computer Science
-
-
Reed, J.1
|