-
2
-
-
57549112765
-
Rewrite systems with abstraction and β-rule: Types, approximants and normalization
-
Proc. of ESOP'96, of
-
S. van Bakel, F. Barbanera, and M. Fernández. Rewrite systems with abstraction and β-rule: Types, approximants and normalization. In Proc. of ESOP'96, volume 1058 of Lecture Notes in Computer Science. Springer, 1996.
-
(1996)
Lecture Notes in Computer Science. Springer
, vol.1058
-
-
van Bakel, S.1
Barbanera, F.2
Fernández, M.3
-
3
-
-
0011111917
-
Normalization results for typeable rewrite systems
-
S. van Bakel and M. Fernández. Normalization results for typeable rewrite systems. Inf. and Comp., 133(2):73-116, 1997.
-
(1997)
Inf. and Comp
, vol.133
, Issue.2
, pp. 73-116
-
-
van Bakel, S.1
Fernández, M.2
-
4
-
-
19244381332
-
Logic programming and knowledge representation
-
C. Baral and M. Gelfond. Logic programming and knowledge representation. JLP, 19/20:73-148, 1994.
-
(1994)
JLP
, vol.19-20
, pp. 73-148
-
-
Baral, C.1
Gelfond, M.2
-
5
-
-
0030408303
-
Intersection type assignment systems with higher-order algebraic rewriting
-
F. Barbanera and M. Fernández. Intersection type assignment systems with higher-order algebraic rewriting. Theoretical Computer Science, 170:173-207, 1996.
-
(1996)
Theoretical Computer Science
, vol.170
, pp. 173-207
-
-
Barbanera, F.1
Fernández, M.2
-
7
-
-
33746684330
-
Term rewriting for access control
-
Proc. of IFIP WG 11.3, DBSec'2006, France, of
-
S. Barker and M. Fernández. Term rewriting for access control. In Proc. of IFIP WG 11.3, DBSec'2006, France, volume 4127 of Lecture Notes in Computer Science. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science. Springer-Verlag
, vol.4127
-
-
Barker, S.1
Fernández, M.2
-
8
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
S. Barker and P. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans, on Information and System Security, 6(4):501-546, 2003.
-
(2003)
ACM Trans, on Information and System Security
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.2
-
9
-
-
57549083452
-
Jakarta: A toolset to reason about the JavaCard platform
-
Proc. of e-SMART'01, of
-
G. Barthe, G. Dufay, M. Huisman, and S. Melo de Sousa. Jakarta: a toolset to reason about the JavaCard platform. In Proc. of e-SMART'01, volume 2140 of Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science. Springer-Verlag
, vol.2140
-
-
Barthe, G.1
Dufay, G.2
Huisman, M.3
Melo de Sousa, S.4
-
10
-
-
0035790640
-
A logical framework for reasoning about access control models
-
ACM
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. In Proc. of SACMAT '01, pages 41-52. ACM, 2001.
-
(2001)
Proc. of SACMAT '01
, pp. 41-52
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
11
-
-
37849037811
-
Dynamic event-based access control as term rewriting
-
Proc. of IF IP WG 11.3, DB-SEC'07, CA, USA, of
-
C. Bertolissi, M. Fernández, and S. Barker. Dynamic event-based access control as term rewriting. In Proc. of IF IP WG 11.3, DB-SEC'07, CA, USA, volume 4602 of Lecture Notes in Computer Science. Springer-Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science. Springer-Verlag
, vol.4602
-
-
Bertolissi, C.1
Fernández, M.2
Barker, S.3
-
13
-
-
85025424440
-
An algebra for composing access control policies
-
February
-
P. Bonatti, S. De Capitani di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Trans, on Information and System Security, 5(1): 1-35, February 2002.
-
(2002)
ACM Trans, on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
De Capitani di Vimercati, S.2
Samarati, P.3
-
14
-
-
0026173872
-
Polymorphic rewriting conserves algebraic strong normalization
-
V. Breazu-Tannen and J. Gallier. Polymorphic rewriting conserves algebraic strong normalization. Theoretical Computer Science, 83(1), 1991.
-
(1991)
Theoretical Computer Science
, vol.83
, Issue.1
-
-
Breazu-Tannen, V.1
Gallier, J.2
-
15
-
-
3042982103
-
Polymorphic rewriting conserves algebraic confluence
-
V. Breazu-Tannen and J. Gallier. Polymorphic rewriting conserves algebraic confluence. Inform, and Comput., 82:3-28, 1992.
-
(1992)
Inform, and Comput
, vol.82
, pp. 3-28
-
-
Breazu-Tannen, V.1
Gallier, J.2
-
16
-
-
84928563923
-
The Maude 2.0 system
-
Proc. of RTA '03, number in, Springer-Verlag
-
M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-Oliet, J. Meseguer, and C. Talcott. The Maude 2.0 system. In Proc. of RTA '03, number 2706 in Lecture Notes in Computer Science, pages 76-87. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2706
, pp. 76-87
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
Meseguer, J.6
Talcott, C.7
-
17
-
-
84972495850
-
An extension of the basic functionality theory for the λ-calculus
-
M. Coppo and M. Dezani-Ciancaglini. An extension of the basic functionality theory for the λ-calculus. Notre Dame Journal of Formal Logic, 21(4):685-693, 1980.
-
(1980)
Notre Dame Journal of Formal Logic
, vol.21
, Issue.4
, pp. 685-693
-
-
Coppo, M.1
Dezani-Ciancaglini, M.2
-
18
-
-
0038343548
-
Access control: Principles and solutions
-
S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Access control: principles and solutions. Softw., Pract. Exper., 33(5):397-421, 2003.
-
(2003)
Softw., Pract. Exper
, vol.33
, Issue.5
, pp. 397-421
-
-
De Capitani di Vimercati, S.1
Paraboschi, S.2
Samarati, P.3
-
19
-
-
0346024763
-
Adding algebraic rewriting to the untyped lambda calculus
-
Proc. of RTA'9l, of, Como, Italy
-
D. J. Dougherty. Adding algebraic rewriting to the untyped lambda calculus. In Proc. of RTA'9l, volume 488 of Lecture Notes in Computer Science, Como, Italy, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.488
-
-
Dougherty, D.J.1
-
20
-
-
33749558954
-
Specifying and reasoning about dynamic access-control policies
-
Proc. of IJCAR '06, of, Springer
-
D. J. Dougherty, Kathi Fisler, and Shriram Krishnamurthi. Specifying and reasoning about dynamic access-control policies. In Proc. of IJCAR '06, volume 4130 of Lecture Notes in Computer Science, pages 632-646. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4130
, pp. 632-646
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
21
-
-
38049036409
-
Modular access control via strategic rewriting
-
Proc. of ESORICS'07
-
D.J. Dougherty, C. Kirchner, H. Kirchner, and A. Santana de Oliveira. Modular access control via strategic rewriting. In Proc. of ESORICS'07, Lecture Notes in Computer Science, pages 578-593. 2007.
-
(2007)
Lecture Notes in Computer Science
, pp. 578-593
-
-
Dougherty, D.J.1
Kirchner, C.2
Kirchner, H.3
Santana de Oliveira, A.4
-
22
-
-
33746103319
-
Security policy in a declarative style
-
ACM Press
-
R. Echahed and F. Prost. Security policy in a declarative style. In Proc. of PPDP'05. ACM Press, 2005.
-
(2005)
Proc. of PPDP'05
-
-
Echahed, R.1
Prost, F.2
-
23
-
-
57549107161
-
-
P. Hudak, J. Peterson, and J. Fasel. A gentle introduction to Haskell 98. http://www.haskell.org/tutorial/, 1999.
-
P. Hudak, J. Peterson, and J. Fasel. A gentle introduction to Haskell 98. http://www.haskell.org/tutorial/, 1999.
-
-
-
-
24
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. Sapino, and VS. Subrahmaninan. Flexible support for multiple access control policies. ACM TODS, 26(2):214- 260, 2001.
-
(2001)
ACM TODS
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmaninan, V.S.4
-
25
-
-
0027910814
-
Combinatory reduction systems, introduction and survey
-
J.-W. Klop, V. van Oostrom, and F. van Raamsdonk, Combinatory reduction systems, introduction and survey. Theoretical Computer Science, 121:279-308, 1993.
-
(1993)
Theoretical Computer Science
, vol.121
, pp. 279-308
-
-
Klop, J.-W.1
van Oostrom, V.2
van Raamsdonk, F.3
-
27
-
-
0026852341
-
Confluence of the lambda calculus with left-linear algebraic rewriting
-
F. Müller. Confluence of the lambda calculus with left-linear algebraic rewriting. Inform. Processing Letters, 41 (6):293-299, 1992.
-
(1992)
Inform. Processing Letters
, vol.41
, Issue.6
, pp. 293-299
-
-
Müller, F.1
-
34
-
-
3142523600
-
A prepositional policy algebra for access control
-
D. Wijesekera and S. Jajodia. A prepositional policy algebra for access control. ACM Trans. Inf. Syst. Secur., 6(2):286-325, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.2
, pp. 286-325
-
-
Wijesekera, D.1
Jajodia, S.2
|