메뉴 건너뛰기




Volumn 43, Issue 9, 2008, Pages 27-38

AURA: A programming language for authorization and audit

Author keywords

Access control; Audit; Authorization logic; Type systems

Indexed keywords

ACCESS CONTROL POLICIES; ASSERTION LEVEL; AUDIT; AUTHORIZATION LOGIC; DEPENDENT TYPES; LOGIC CONSTRUCTS; PROGRAMMING LANGUAGE; TYPE SYSTEMS;

EID: 67650021824     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (17)

References (47)
  • 7
    • 34548773746 scopus 로고    scopus 로고
    • Cryptographically masked information flows
    • Proceedings of the International Static Analysis Symposium, Seoul, Korea, August
    • Aslan Askarov, Daniel Hedin, and Andrei Sabelfeld. Cryptographically masked information flows. In Proceedings of the International Static Analysis Symposium, LNCS, Seoul, Korea, August 2006.
    • (2006) LNCS
    • Askarov, A.1    Hedin, D.2    Sabelfeld, A.3
  • 9
    • 84865652525 scopus 로고    scopus 로고
    • Brian E. Aydemir, Arthur Charguéraud, Benjamin C. Pierce, Randy Pollack, and Stephanie Weirich. Engineering formal metatheory. In Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, pages 3-15. ACM, 2008. 37
    • Brian E. Aydemir, Arthur Charguéraud, Benjamin C. Pierce, Randy Pollack, and Stephanie Weirich. Engineering formal metatheory. In Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, pages 3-15. ACM, 2008. 37
  • 10
    • 0001439401 scopus 로고
    • Lambda calculi with types
    • Samson Abramsky, Dov M. Gabbay, and Thomas S. E. Maibaum, editors, Clarendon Press, Oxford
    • Henk P. Barendregt. Lambda calculi with types. In Samson Abramsky, Dov M. Gabbay, and Thomas S. E. Maibaum, editors, Handbook of Logic in Computer Science, volume 2, pages 117-309. Clarendon Press, Oxford, 1992.
    • (1992) Handbook of Logic in Computer Science , vol.2 , pp. 117-309
    • Barendregt, H.P.1
  • 12
    • 0346236349 scopus 로고    scopus 로고
    • Art and Science. Addison-Wesley Professional
    • Matt Bishop. Computer Security: Art and Science. Addison-Wesley Professional, 2002.
    • (2002) Computer Security
    • Bishop, M.1
  • 13
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures (position paper)
    • Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. KeyNote: Trust management for public-key infrastructures (position paper). Lecture Notes in Computer Science, 1550:59-63, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1550 , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 21
    • 24644447402 scopus 로고    scopus 로고
    • A type discipline for authorization policies
    • Proc. of the 14th European Symposium on Programming, of, Edinburgh, Scotland, April, Springer-Verlag
    • Cédric Fournet, Andrew D. Gordon, and Sergio Maffeis. A type discipline for authorization policies. In Proc. of the 14th European Symposium on Programming, volume 3444 of LNCS, pages 141-156, Edinburgh, Scotland, April 2005. Springer-Verlag.
    • (2005) LNCS , vol.3444 , pp. 141-156
    • Fournet, C.1    Gordon, A.D.2    Maffeis, S.3
  • 24
    • 0002386430 scopus 로고
    • The formulae-as-types notion of construction
    • J. P. Seldin and J. R. Hindly, editors, Academic Press, New York
    • W. A. Howard. The formulae-as-types notion of construction. In J. P. Seldin and J. R. Hindly, editors, To H. B. Curry: Essays on Combinatory Logic, Lambda-Calculus, and Formalism, pages 479-490. Academic Press, New York, 1980.
    • (1980) To H. B. Curry: Essays on Combinatory Logic, Lambda-Calculus, and Formalism , pp. 479-490
    • Howard, W.A.1
  • 25
    • 67650068459 scopus 로고    scopus 로고
    • Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, and Steve Zdancewic. Aura: A programming language for authorization and audit, preliminary technical results. Technical Report MS-CIS-08-10, U. Pennsylvania, 2008.
    • Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, and Steve Zdancewic. Aura: A programming language for authorization and audit, preliminary technical results. Technical Report MS-CIS-08-10, U. Pennsylvania, 2008.
  • 27
    • 84865660260 scopus 로고    scopus 로고
    • On the computational soundness of cryptographically masked flows
    • Peeter Laud. On the computational soundness of cryptographically masked flows. SIGPLAN Not., 43(1):337-348, 2008.
    • (2008) SIGPLAN Not , vol.43 , Issue.1 , pp. 337-348
    • Laud, P.1
  • 33
    • 84869374928 scopus 로고    scopus 로고
    • Ulf Norell. Towards a practical programming language based on dependent type theory. PhD thesis, Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden, September 2007.
    • Ulf Norell. Towards a practical programming language based on dependent type theory. PhD thesis, Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden, September 2007.
  • 35
    • 0348017041 scopus 로고    scopus 로고
    • Information flow inference for ML
    • François Pottier and Vincent Simonet. Information flow inference for ML. ACM Trans. Program. Lang. Syst., 25(1):117-158, 2003.
    • (2003) ACM Trans. Program. Lang. Syst , vol.25 , Issue.1 , pp. 117-158
    • Pottier, F.1    Simonet, V.2
  • 40
    • 51749116017 scopus 로고    scopus 로고
    • Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, and Steve Zdancewic. Evidence-based audit. In Proc. of the IEEE Computer Security Foundations Symposium, 2008. Extended version available as U. Pennsylvania Technical Report MS-CIS-08-09.
    • Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, and Steve Zdancewic. Evidence-based audit. In Proc. of the IEEE Computer Security Foundations Symposium, 2008. Extended version available as U. Pennsylvania Technical Report MS-CIS-08-09.
  • 41
    • 34548790762 scopus 로고    scopus 로고
    • A cryptographic decentralized label model
    • Berkeley, California
    • Jeffrey A. Vaughan and Steve Zdancewic. A cryptographic decentralized label model. In IEEE Symposium on Security and Privacy, pages 192-206, Berkeley, California, 2007.
    • (2007) IEEE Symposium on Security and Privacy , pp. 192-206
    • Vaughan, J.A.1    Zdancewic, S.2
  • 42
    • 67650068457 scopus 로고    scopus 로고
    • Philip Wadler. Monads for functional programming. In J. Jeuring and E. Meijer, editors, Advanced Functional Programming, 925 of LNCS. Springer Verlag, 1995. Some errata fixed August 2001.
    • Philip Wadler. Monads for functional programming. In J. Jeuring and E. Meijer, editors, Advanced Functional Programming, volume 925 of LNCS. Springer Verlag, 1995. Some errata fixed August 2001.
  • 46
    • 35048858250 scopus 로고    scopus 로고
    • Applied Type System (extended abstract)
    • postworkshop Proceedings of TYPES, Springer-Verlag
    • Hongwei Xi. Applied Type System (extended abstract). In postworkshop Proceedings of TYPES 2003, pages 394-408. Springer-Verlag LNCS 3085, 2004.
    • (2003) LNCS , vol.3085 , pp. 394-408
    • Xi, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.