-
1
-
-
33847791903
-
-
Abadi, M.: Access control in a core calculus of dependency. Electronic Notes in Theoretical Computer Science 172, 5-31 (2007); Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin
-
Abadi, M.: Access control in a core calculus of dependency. Electronic Notes in Theoretical Computer Science 172, 5-31 (2007); Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin
-
-
-
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems 15(4), 706-734 (1993)
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
4
-
-
70350356189
-
-
PCML5: A language for ensuring compliance with access control policies 2009, Draft, personal communication
-
Avijit, K., Datta, A., Harper, R.: PCML5: A language for ensuring compliance with access control policies (2009); Draft, personal communication
-
-
-
Avijit, K.1
Datta, A.2
Harper, R.3
-
6
-
-
33645995393
-
-
Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J., Rutenbar, P.: Deviceenabled authorization in the grey system. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, 3650, pp. 431-445. Springer, Heidelberg (2005)
-
Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J., Rutenbar, P.: Deviceenabled authorization in the grey system. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 431-445. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
35048879241
-
Design and semantics of a decentralized authorization language
-
IEEE Computer Society Press, Los Alamitos
-
Becker, M.Y., Fournet, C., Gordon, A.D.: Design and semantics of a decentralized authorization language. In: IEEE Computer Security Foundations Symposium (CSF 2007), pp. 3-15. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
IEEE Computer Security Foundations Symposium (CSF
, pp. 3-15
-
-
Becker, M.Y.1
Fournet, C.2
Gordon, A.D.3
-
8
-
-
51749098783
-
Refinement types for secure implementations
-
IEEE, Los Alamitos
-
Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A., Maffeis, S.: Refinement types for secure implementations. In: IEEE Computer Security Foundations Symposium (CSF 2008), pp. 17-32. IEEE, Los Alamitos (2008)
-
(2008)
IEEE Computer Security Foundations Symposium (CSF
, pp. 17-32
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.4
Maffeis, S.5
-
10
-
-
70350417762
-
PCAL: Language support for proof-carrying authorization systems
-
Technical Report CMU-CS-09-141, Carnegie Mellon University
-
Chaudhuri, A., Garg, D.: PCAL: Language support for proof-carrying authorization systems. Technical Report CMU-CS-09-141, Carnegie Mellon University (2009)
-
(2009)
-
-
Chaudhuri, A.1
Garg, D.2
-
11
-
-
57349156632
-
A type system for data-flow integrity on Windows Vista
-
ACM, New York
-
Chaudhuri, A., Naldurg, P., Rajamani, S.: A type system for data-flow integrity on Windows Vista. In: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2008), pp. 89-100. ACM, New York (2008)
-
(2008)
ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS
, pp. 89-100
-
-
Chaudhuri, A.1
Naldurg, P.2
Rajamani, S.3
-
12
-
-
0036083264
-
Binder, a logic-based security language
-
IEEE, Los Alamitos
-
DeTreville, J.: Binder, a logic-based security language. In: IEEE Symposium on Security and Privacy (S&P 2002), pp. 105-113. IEEE, Los Alamitos (2002)
-
(2002)
IEEE Symposium on Security and Privacy (S&P
, pp. 105-113
-
-
DeTreville, J.1
-
14
-
-
35048817499
-
A type discipline for authorization in distributed systems
-
IEEE, Los Alamitos
-
Fournet, C., Gordon, A., Maffeis, S.: A type discipline for authorization in distributed systems. In: IEEE Computer Security Foundations Symposium (CSF 2007), pp. 31-48. IEEE, Los Alamitos (2007)
-
(2007)
IEEE Computer Security Foundations Symposium (CSF
, pp. 31-48
-
-
Fournet, C.1
Gordon, A.2
Maffeis, S.3
-
15
-
-
70349335264
-
Proof search in an authorization logic
-
Technical Report CMU-CS-09-121, Carnegie Mellon University
-
Garg, D.: Proof search in an authorization logic. Technical Report CMU-CS-09-121, Carnegie Mellon University (2009)
-
(2009)
-
-
Garg, D.1
-
16
-
-
33947650706
-
Non-interference in constructive authorization logic
-
IEEE, Los Alamitos
-
Garg, D., Pfenning, F.: Non-interference in constructive authorization logic. In: IEEE Computer Security Foundations Workshop (CSFW 2006), pp. 283-293. IEEE, Los Alamitos (2006)
-
(2006)
IEEE Computer Security Foundations Workshop (CSFW
, pp. 283-293
-
-
Garg, D.1
Pfenning, F.2
-
17
-
-
70350401071
-
A proof-carrying file system
-
Technical Report CMU-CS-09-123, Carnegie Mellon University
-
Garg, D., Pfenning, F.: A proof-carrying file system. Technical Report CMU-CS-09-123, Carnegie Mellon University (2009)
-
(2009)
-
-
Garg, D.1
Pfenning, F.2
-
18
-
-
59249096370
-
Aura: A programming language for authorization and audit
-
ACM, New York
-
Jia, L., Vaughan, J.A., Mazurak, K., Zhao, J., Zarko, L., Schorr, J., Zdancewic, S.: Aura: A programming language for authorization and audit. In: ACM International Conference on Functional Programming (ICFP 2008). ACM, New York (2008)
-
(2008)
ACM International Conference on Functional Programming (ICFP
-
-
Jia, L.1
Vaughan, J.A.2
Mazurak, K.3
Zhao, J.4
Zarko, L.5
Schorr, J.6
Zdancewic, S.7
|