-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson and G. Plotkin. A calculus for access control in distributed systems. ACM TOPLAS, 15(4):706-734, 1993.
-
(1993)
ACM TOPLAS
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
3042601656
-
Protocol analysis in intrusion detection using decision tree
-
T. Abbes, A. Bouhoula, and M. Rusinowitch. Protocol analysis in intrusion detection using decision tree. In Proc. ITCC'04, pages 404- 408, 2004.
-
(2004)
Proc. ITCC'04
, pp. 404-408
-
-
Abbes, T.1
Bouhoula, A.2
Rusinowitch, M.3
-
3
-
-
0037999031
-
A unified security mechanism for networked applications
-
J. Abendroth and C. Jensen. A unified security mechanism for networked applications. In SAC'03, pages 351-357, 2003.
-
(2003)
SAC'03
, pp. 351-357
-
-
Abendroth, J.1
Jensen, C.2
-
5
-
-
84865788031
-
A model of OASIS RBAC and its support for active security
-
J. Bacon, K. Moody, and W. Yao. A model of OASIS RBAC and its support for active security. TISSEC, 5(4):492-540, 2002.
-
(2002)
TISSEC
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
6
-
-
0011111917
-
Normalization results for typeable rewrite systems
-
S. van Bakel and M. Fernández. Normalization results for typeable rewrite systems. Inf. and Comp., 133(2):73-116, 1997.
-
(1997)
Inf. and Comp
, vol.133
, Issue.2
, pp. 73-116
-
-
van Bakel, S.1
Fernández, M.2
-
7
-
-
19244381332
-
Logic programming and knowledge representation
-
C. Baral and M. Gelfond. Logic programming and knowledge representation. JLP, 19/20:73-148, 1994.
-
(1994)
JLP
, vol.19-20
, pp. 73-148
-
-
Baral, C.1
Gelfond, M.2
-
8
-
-
0030408303
-
Intersection type assignment systems with higher-order algebraic rewriting
-
F. Barbanera and M. Fernández. Intersection type assignment systems with higher-order algebraic rewriting. TCS, 170:173-207, 1996.
-
(1996)
TCS
, vol.170
, pp. 173-207
-
-
Barbanera, F.1
Fernández, M.2
-
10
-
-
33746684330
-
Term rewriting for access control
-
Proc. of DBSec'06, of, Springer
-
S. Barker and M. Fernández. Term rewriting for access control. In Proc. of DBSec'06, volume 4127 of LNCS, pages 179-193. Springer, 2006.
-
(2006)
LNCS
, vol.4127
, pp. 179-193
-
-
Barker, S.1
Fernández, M.2
-
11
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
S. Barker and P. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur., 6(4):501-546, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.2
-
12
-
-
34548031162
-
Action-status access control
-
ACM
-
S. Barker. Action-status access control. In Proceedings of SACMAT'07, pages 195-204. ACM, 2007.
-
(2007)
Proceedings of SACMAT'07
, pp. 195-204
-
-
Barker, S.1
-
13
-
-
33746720635
-
Jakarta: A toolset to reason about the JavaCard platform
-
Proc. of e-SMART'01, of, Springer-Verlag
-
G. Barthe, G. Dufay, M. Huisman, and S. Melo de Sousa. Jakarta: a toolset to reason about the JavaCard platform. In Proc. of e-SMART'01, volume 2140 of LNCS. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2140
-
-
Barthe, G.1
Dufay, G.2
Huisman, M.3
Melo de Sousa, S.4
-
14
-
-
35048879241
-
Design and semantics of a decentralized authorization language
-
IEEE Comp. Society
-
M. Y. Becker C. Fournet and A. D. Gordon. Design and semantics of a decentralized authorization language. In Proc. of CSF'07, pages 3-15, IEEE Comp. Society, 2007.
-
(2007)
Proc. of CSF'07
, pp. 3-15
-
-
Becker, M.Y.1
Fournet, C.2
Gordon, A.D.3
-
15
-
-
11244331795
-
Cassandra: Distributed access control policies with tunable expressiveness
-
M. Becker and P. Sewell. Cassandra: Distributed access control policies with tunable expressiveness. In POLICY 2004, pages 159-168, 2004.
-
(2004)
POLICY 2004
, pp. 159-168
-
-
Becker, M.1
Sewell, P.2
-
17
-
-
57549084474
-
A Rewriting Framework for the Composition of Access Control Policies
-
ACM Press
-
C. Bertolissi and M. Fernández. A Rewriting Framework for the Composition of Access Control Policies. In Proc. of PPDP 2008, ACM Press.
-
Proc. of PPDP 2008
-
-
Bertolissi, C.1
Fernández, M.2
-
18
-
-
37849037811
-
Dynamic event-based access control as term rewriting
-
Proc. of DBSEC'07, of, Springer-Verlag
-
C. Bertolissi, M. Fernández, and S. Barker. Dynamic event-based access control as term rewriting. In Proc. of DBSEC'07), volume 4602 of LNCS. Springer-Verlag, 2007.
-
(2007)
LNCS
, vol.4602
-
-
Bertolissi, C.1
Fernández, M.2
Barker, S.3
-
20
-
-
84928563923
-
The Maude 2.0 system
-
Proc. of RTA'03, number in, Springer-Verlag
-
M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-Oliet, J. Meseguer, and C. Talcott. The Maude 2.0 system. In Proc. of RTA'03, number 2706 in LNCS, pages 76-87. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2706
, pp. 76-87
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
Meseguer, J.6
Talcott, C.7
-
21
-
-
84867167943
-
-
J. DeTreville. Binder, a logic-based security language. In Proc. IEEE Symposium on Security and Privacy, pages 105-113, 2002.
-
J. DeTreville. Binder, a logic-based security language. In Proc. IEEE Symposium on Security and Privacy, pages 105-113, 2002.
-
-
-
-
22
-
-
33749558954
-
Specifying and reasoning about dynamic access-control policies
-
Proc. of IJCAR'06, of, Springer
-
D. J. Dougherty, K. Fisler and S. Krishnamurthi. Specifying and reasoning about dynamic access-control policies. In Proc. of IJCAR'06, volume 4130 of LNCS, pages 632-646. Springer, 2006.
-
(2006)
LNCS
, vol.4130
, pp. 632-646
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
23
-
-
38049036409
-
Modular Access Control via Strategic Rewriting
-
Proc. of ES- ORICS'07
-
D. J. Dougherty, C. Kirchner, H. Kirchner, and A. Santana de Oliveira. Modular Access Control via Strategic Rewriting. In Proc. of ES- ORICS'07, LNCS, pages 578-593, 2007.
-
(2007)
LNCS
, pp. 578-593
-
-
Dougherty, D.J.1
Kirchner, C.2
Kirchner, H.3
Santana de Oliveira, A.4
-
24
-
-
0346024763
-
Adding algebraic rewriting to the untyped lambda calculus
-
Proc. of RTA'91
-
D. J. Dougherty. Adding algebraic rewriting to the untyped lambda calculus. In Proc. of RTA'91, LNCS 488, 1991.
-
(1991)
LNCS
, vol.488
-
-
Dougherty, D.J.1
-
25
-
-
33746103319
-
Security policy in a declarative style
-
ACM Press
-
R. Echahed and F. Prost. Security policy in a declarative style. In Proc. of PPDP'05. ACM Press, 2005.
-
(2005)
Proc. of PPDP'05
-
-
Echahed, R.1
Prost, F.2
-
26
-
-
84947939145
-
Modular termination of term rewriting systems revisited
-
Proc. of ADT'94, number in
-
M. Fernández and J.-P. Jouannaud. Modular termination of term rewriting systems revisited. In Proc. of ADT'94, number 906 in LNCS, 1995.
-
(1995)
LNCS
, vol.906
-
-
Fernández, M.1
Jouannaud, J.-P.2
-
27
-
-
63249121003
-
-
P. Hudak, J. Peterson, and J. Fasel. A gentle introduction to Haskell 98. http://www.haskell.org/tutorial, 1999.
-
P. Hudak, J. Peterson, and J. Fasel. A gentle introduction to Haskell 98. http://www.haskell.org/tutorial, 1999.
-
-
-
-
28
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. Sapino, and V.S. Subrahmaninan. Flexible support for multiple access control policies. ACM TODS, 26(2):214-260, 2001.
-
(2001)
ACM TODS
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmaninan, V.S.4
-
29
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
T. Jim. SD3: A trust management system with certified evaluation. In IEEE Symp. Security and Privacy, pages 106-115, 2001.
-
(2001)
IEEE Symp. Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
30
-
-
0026190438
-
Executable higher-order algebraic specification languages
-
IEEE Computer Society Press
-
J.-P. Jouannaud and M. Okada. Executable higher-order algebraic specification languages. In Proc, of LICS'91, pages 350-361. IEEE Computer Society Press, 1991.
-
(1991)
Proc, of LICS'91
, pp. 350-361
-
-
Jouannaud, J.-P.1
Okada, M.2
-
31
-
-
84893084758
-
A policy language for pervasive computing environment
-
L. Kagal, T. Finin, and A. Johshi. A policy language for pervasive computing environment. In POLICY'03, pages 63-78, 2003.
-
(2003)
POLICY'03
, pp. 63-78
-
-
Kagal, L.1
Finin, T.2
Johshi, A.3
-
32
-
-
0027910814
-
Combinatory reduction systems, introduction and survey
-
J.-W. Klop, V. van Oostrom, and F. van Raamsdonk. Combinatory reduction systems, introduction and survey. TCS, 121:279-308, 1993.
-
(1993)
TCS
, vol.121
, pp. 279-308
-
-
Klop, J.-W.1
van Oostrom, V.2
van Raamsdonk, F.3
-
34
-
-
0031071781
-
The definition of Extended ML: A gentle introduction
-
D. Sannella S. Kahrs and A. Tarlecki. The definition of Extended ML: A gentle introduction. TCS, 173(2):445-484, 1997.
-
(1997)
TCS
, vol.173
, Issue.2
, pp. 445-484
-
-
Sannella, D.1
Kahrs, S.2
Tarlecki, A.3
-
35
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer Society, 29(2):38-47, 1996.
-
(1996)
IEEE Computer Society
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
36
-
-
34250823438
-
Rewriting-based access control policies
-
ENTCS, Elsevier
-
A. Santana de Oliveira. Rewriting-based access control policies. In Proc. of SECRET'06, ENTCS, Elsevier, 2007.
-
(2007)
Proc. of SECRET'06
-
-
Santana de Oliveira, A.1
-
39
-
-
35048902599
-
KAoS semantic policy and domain services
-
A. Uszok, M. Bradshaw, and R. Jeffers. KAoS semantic policy and domain services. In iTrust'04, pages 16-26, 2004.
-
(2004)
iTrust'04
, pp. 16-26
-
-
Uszok, A.1
Bradshaw, M.2
Jeffers, R.3
-
40
-
-
0037673317
-
Policy algebras for access control the predicate case
-
ACM Press, IEEE
-
D. Wijesekera and S. Jajodia. Policy algebras for access control the predicate case. In Proc, of CCS'02, ACM Press, pages 171-180, 2002. IEEE.
-
(2002)
Proc, of CCS'02
, pp. 171-180
-
-
Wijesekera, D.1
Jajodia, S.2
-
41
-
-
63249089558
-
-
The XSB System, Version 3.1. A Logic Programming and Deductive Database system
-
The XSB System, Version 3.1. A Logic Programming and Deductive Database system. http://xsb.sourceforge.net/
-
-
-
|