-
2
-
-
0042908709
-
Alternating time temporal logic
-
Alur, R., Henzinger, T., Kupferman, O.: Alternating time temporal logic. Journal of ACM 49, 672-713 (2002)
-
(2002)
Journal of ACM
, vol.49
, pp. 672-713
-
-
Alur, R.1
Henzinger, T.2
Kupferman, O.3
-
3
-
-
21044449695
-
-
Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, 2200, pp. 379-393. Springer, Heidelberg (2001)
-
Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 379-393. Springer, Heidelberg (2001)
-
-
-
-
4
-
-
65249188655
-
-
Andersen, D.G., Balakrishnan, H., Feamster, N., Koponen, T., Moon, D., Shenker, S.: Accountable Internet Protocol (AIP). In: SIGCOMM, pp. 339-350. ACM Press, New York (2008)
-
Andersen, D.G., Balakrishnan, H., Feamster, N., Koponen, T., Moon, D., Shenker, S.: Accountable Internet Protocol (AIP). In: SIGCOMM, pp. 339-350. ACM Press, New York (2008)
-
-
-
-
5
-
-
84956679859
-
An accountability interface for the Internet
-
Argyraki, K., Maniatis, P., Irzak, O., Shenker, S.: An accountability interface for the Internet. In: Proceedings of the 14th IEEE International Conference on Network Protocols (2007)
-
(2007)
Proceedings of the 14th IEEE International Conference on Network Protocols
-
-
Argyraki, K.1
Maniatis, P.2
Irzak, O.3
Shenker, S.4
-
6
-
-
35048898814
-
Privacy and utility in business processes. In: CSF
-
Los Alamitos
-
Barth, A., Mitchell, J.C., Datta, A., Sundaram, S.: Privacy and utility in business processes. In: CSF, pp. 279-294. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
IEEE Computer Society
, pp. 279-294
-
-
Barth, A.1
Mitchell, J.C.2
Datta, A.3
Sundaram, S.4
-
7
-
-
0021465083
-
A theory of communicating sequential processes
-
Brookes, S.D., Hoare, C.A.R., Roscoe, A.W.: A theory of communicating sequential processes. J. ACM 31(3), 560-599 (1984)
-
(1984)
J. ACM
, vol.31
, Issue.3
, pp. 560-599
-
-
Brookes, S.D.1
Hoare, C.A.R.2
Roscoe, A.W.3
-
8
-
-
0034449541
-
Accountable certificate management using undeniable attestations
-
Buldas, A., Laud, P., Lipmaa, H.: Accountable certificate management using undeniable attestations. In: ACM Conference on Computer and Communications Security, pp. 9-17 (2000)
-
(2000)
ACM Conference on Computer and Communications Security
, pp. 9-17
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
-
9
-
-
84910671706
-
Machine-assisted election auditing
-
USENIX Association
-
Calandrino, J.A., Halderman, J.A., Felten, E.W.: Machine-assisted election auditing. In: EVT 2007: Proceedings of the USENIXWorkshop on Accurate Electronic Voting Technology, p. 9. USENIX Association (2007)
-
(2007)
EVT 2007: Proceedings of the USENIXWorkshop on Accurate Electronic Voting Technology
, pp. 9
-
-
Calandrino, J.A.1
Halderman, J.A.2
Felten, E.W.3
-
10
-
-
33745005053
-
An audit logic for accountability. In: POLICY
-
Los Alamitos
-
Cederquist, J.G., Corin, R., Dekker, M.A.C., Etalle, S., den Hartog, J.I.: An audit logic for accountability. In: POLICY, pp. 34-43. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
IEEE Computer Society Press
, pp. 34-43
-
-
Cederquist, J.G.1
Corin, R.2
Dekker, M.A.C.3
Etalle, S.4
den Hartog, J.I.5
-
11
-
-
33947670402
-
Audit-based compliance control
-
Cederquist, J.G., Corin, R., Dekker, M.A.C., Etalle, S., den Hartog, J.I., Lenzini, G.: Audit-based compliance control. Int. J. Inf. Sec. 6(2-3), 133-151 (2007)
-
(2007)
Int. J. Inf. Sec
, vol.6
, Issue.2-3
, pp. 133-151
-
-
Cederquist, J.G.1
Corin, R.2
Dekker, M.A.C.3
Etalle, S.4
den Hartog, J.I.5
Lenzini, G.6
-
12
-
-
47249132159
-
-
Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: TAPIDO: Trust and authorization via provenance and integrity in distributed objects (extended abstract). In: Drossopoulou, S. (ed.) ESOP 2008. LNCS, 4960, pp. 208-223. Springer, Heidelberg (2008)
-
Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: TAPIDO: Trust and authorization via provenance and integrity in distributed objects (extended abstract). In: Drossopoulou, S. (ed.) ESOP 2008. LNCS, vol. 4960, pp. 208-223. Springer, Heidelberg (2008)
-
-
-
-
14
-
-
34548026791
-
-
Etalle, S.,Winsborough, W.H.: A posteriori compliance control. In: SACMAT, pp. 11-20. ACM, New York (2007)
-
Etalle, S.,Winsborough, W.H.: A posteriori compliance control. In: SACMAT, pp. 11-20. ACM, New York (2007)
-
-
-
-
16
-
-
24644447402
-
-
Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 141-156. Springer, Heidelberg (2005)
-
Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 141-156. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
47249106078
-
-
Fournet, C., Guts, N., Nardelli, F.Z.: A formal implementation of value commitment. In: Drossopoulou, S. (ed.) ESOP 2008. LNCS, 4960, pp. 383-397. Springer, Heidelberg (2008)
-
Fournet, C., Guts, N., Nardelli, F.Z.: A formal implementation of value commitment. In: Drossopoulou, S. (ed.) ESOP 2008. LNCS, vol. 4960, pp. 383-397. Springer, Heidelberg (2008)
-
-
-
-
19
-
-
58049120018
-
PeerReview: Practical accountability for distributed systems
-
ACM, New York
-
Haeberlen, A., Kouznetsov, P., Druschel, P.: PeerReview: practical accountability for distributed systems. In: Proceedings of 21st ACM SIGOPS symposium on Operating systems principles, pp. 175-188. ACM, New York (2007)
-
(2007)
Proceedings of 21st ACM SIGOPS symposium on Operating systems principles
, pp. 175-188
-
-
Haeberlen, A.1
Kouznetsov, P.2
Druschel, P.3
-
20
-
-
84942243858
-
-
Halpern, J.Y.,Weissman, V.: Using first-order logic to reason about policies. In: CSFW, pp. 118-130 (2003)
-
Halpern, J.Y.,Weissman, V.: Using first-order logic to reason about policies. In: CSFW, pp. 118-130 (2003)
-
-
-
-
21
-
-
4944243609
-
A process algebra for timed systems
-
Hennessy, M., Regan, T.: A process algebra for timed systems. Inf. Comput. 117(2), 221-239 (1995)
-
(1995)
Inf. Comput
, vol.117
, Issue.2
, pp. 221-239
-
-
Hennessy, M.1
Regan, T.2
-
22
-
-
17544394392
-
Computer security in the real world
-
Lampson, B.W.: Computer security in the real world. IEEE Computer 37(6), 37-46 (2004)
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B.W.1
-
23
-
-
62349090353
-
A role-based trust-management framework. In: DISCEX
-
Los Alamitos
-
Li, N., Mitchell, J.C.: A role-based trust-management framework. In: DISCEX (1), p. 201. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
IEEE Computer Society Press
, pp. 201
-
-
Li, N.1
Mitchell, J.C.2
-
24
-
-
84957016205
-
Input/output automata: Basic, timed, hybrid, probabilistic, dynamic,
-
Amadio, R.M, Lugiez, D, eds, CONCUR 2003, Springer, Heidelberg
-
Lynch, N.A.: Input/output automata: Basic, timed, hybrid, probabilistic, dynamic,.. In: Amadio, R.M., Lugiez, D. (eds.) CONCUR 2003. LNCS, vol. 2761, pp. 187-188. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2761
, pp. 187-188
-
-
Lynch, N.A.1
-
25
-
-
85084161556
-
Secure history preservation through timeline entanglement
-
USENIX
-
Maniatis, P., Baker, M.: Secure history preservation through timeline entanglement. In: USENIX Security Symposium, pp. 297-312. USENIX (2002)
-
(2002)
USENIX Security Symposium
, pp. 297-312
-
-
Maniatis, P.1
Baker, M.2
-
26
-
-
84881225236
-
-
Information and System Security
-
Schneider, F.B.: Enforceable security policies. Information and System Security 3(1), 30-50 (2000)
-
(2000)
Enforceable security policies
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
27
-
-
51749116017
-
Evidence-based audit. In: CSF
-
Los Alamitos
-
Vaughan, J.A., Jia, L., Mazurak, K., Zdancewic, S.: Evidence-based audit. In: CSF, pp. 177-191. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
IEEE Computer Society
, pp. 177-191
-
-
Vaughan, J.A.1
Jia, L.2
Mazurak, K.3
Zdancewic, S.4
-
28
-
-
70350398475
-
-
Weitzner, D.J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., Sussman, G.J.: Information accountability. Technical Report MIT-CSAIL-TR-2007-034, MIT (June 2007), http://hdl.handle.net/1721.1/37600
-
Weitzner, D.J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., Sussman, G.J.: Information accountability. Technical Report MIT-CSAIL-TR-2007-034, MIT (June 2007), http://hdl.handle.net/1721.1/37600
-
-
-
-
30
-
-
36048935605
-
Strong accountability for network storage
-
Yumerefendi, A.R., Chase, J.S.: Strong accountability for network storage. Trans. Storage 3(3), 11 (2007)
-
(2007)
Trans. Storage
, vol.3
, Issue.3
, pp. 11
-
-
Yumerefendi, A.R.1
Chase, J.S.2
|