-
1
-
-
34247276117
-
Access control in a core calculus of dependency
-
DOI 10.1145/1160074.1159839
-
Martín Abadi. Access control in a core calculus of dependency. In ICFP, pages 263-273, 2006. (Pubitemid 44642873)
-
(2006)
ACM SIGPLAN Notices
, vol.41
, Issue.9
, pp. 263-273
-
-
Abadi, M.1
-
2
-
-
0032681509
-
A core calculus of dependency
-
Martín Abadi, Anindya Banerjee, Nevin Heintze, and Jon G. Riecke. A core calculus of dependency. In Proceedings 26th ACM Symp. on Principles of Programming Languages (POPL), pages 147-160, 1999.
-
(1999)
Proceedings 26th ACM Symp. on Principles of Programming Languages (POPL)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
6
-
-
33645995393
-
Device-enabled authorization in the grey system
-
Lujo Bauer, Scott Garriss, Jonathan M. Mccune, Michael K. Reiter, Jason Rouse, and Peter Rutenbar. Device-enabled authorization in the grey system. In Proceedings of the 8th Information Security Conference (ISC05, pages 431-445, 2005.
-
(2005)
Proceedings of the 8th Information Security Conference (ISC05
, pp. 431-445
-
-
Bauer, L.1
Garriss, S.2
Mccune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
7
-
-
51749098783
-
Refinement types for secure implementations
-
Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, and Sergio Maffeis. Refinement types for secure implementations. In Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium, pages 17-32, 2008.
-
(2008)
Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
, pp. 17-32
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.D.4
Maffeis, S.5
-
10
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Dwaine E. Clarke, Jean-Emile Elien, Carl M. Ellison, Matt Fredette, Alexander Morcos, and Ronald L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.E.1
Elien, J.-E.2
Ellison, C.M.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
14
-
-
34547812627
-
Licata. Mechanizing metatheory in a logical framework
-
July
-
Robert Harper and Daniel R. Licata. Mechanizing metatheory in a logical framework. Journal of Functional Programming, 17(4-5): 613-673, July 2007.
-
(2007)
Journal of Functional Programming
, vol.17
, Issue.4-5
, pp. 613-673
-
-
Harper, R.1
Daniel, R.2
-
16
-
-
0027353175
-
A framework for defining logics
-
Robert Harper, Furio Honsell, and Gordon Plotkin. A framework for defining logics. Journal of the ACM, 40(1):143-184, 1993.
-
(1993)
Journal of the ACM
, vol.40
, Issue.1
, pp. 143-184
-
-
Harper, R.1
Honsell, F.2
Plotkin, G.3
-
17
-
-
59249096370
-
Aura: A programming language for authorization and audit
-
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, and Steve Zdancewic. Aura: a programming language for authorization and audit. In ICFP '08: Proceeding of the 13th ACM SIGPLAN International Conference on Functional programming, pages 27-38, 2008.
-
(2008)
ICFP '08: Proceeding of the 13th ACM SIGPLAN International Conference on Functional Programming
, pp. 27-38
-
-
Jia, L.1
Jeffrey, A.2
Vaughan, K.M.3
Zhao, J.4
Zarko, L.5
Schorr, J.6
Zdancewic, S.7
-
18
-
-
31844435876
-
Permission-based ownership: Encapsulating state in higher-order typed languages
-
DOI 10.1145/1064978.1065023
-
Neel Krishnaswami and Jonathan Aldrich. Permission-based ownership: encapsulating state in higher-order typed languages. SIGPLAN Notices, 40(6):96-106, 2005. (Pubitemid 43924026)
-
(2005)
ACM SIGPLAN Notices
, vol.40
, Issue.6
, pp. 96-106
-
-
Krishnaswami, N.1
Aldrich, J.2
-
19
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Butler W. Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.W.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
20
-
-
0036085965
-
Design of a role-based trust-management framework
-
Ninghui Li, John C. Mitchell, and William H. Winsborough. Design of a role-based trust-management framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 114-130, 2002.
-
(2002)
Proceedings of the
, vol.2002
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
21
-
-
67650405745
-
-
PhD thesis, Carnegie Mellon, January Available as technical report CMUCS- 08-126
-
Tom Murphy, VII. Modal Types for Mobile Code. PhD thesis, Carnegie Mellon, January 2008. Available as technical report CMUCS- 08-126.
-
(2008)
Modal Types for Mobile Code
-
-
Murphy VII, T.1
-
22
-
-
4544313887
-
A symmetric modal lambda calculus for distributed computing
-
Tom Murphy, VII, Karl Crary, Robert Harper, and Frank Pfenning. A symmetric modal lambda calculus for distributed computing. In Proceedings of the 19th IEEE Symposium on Logic in Computer Science (LICS 2004), pages 286-295,, 2004.
-
(2004)
Proceedings of the 19th IEEE Symposium on Logic in Computer Science (LICS 2004)
, pp. 286-295
-
-
Murphy, T.1
Vii, K.C.2
Harper, R.3
Pfenning, F.4
-
24
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
IEEE
-
B. C. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. Communications Magazine, IEEE, 32(9):33-38, 1994.
-
(1994)
Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'O, T.2
-
26
-
-
51749116017
-
Evidence-based audit
-
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, and Steve Zdancewic. Evidence-based audit. In CSF '08: Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium, pages 177-191, 2008.
-
(2008)
CSF '08: Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
, pp. 177-191
-
-
Vaughan, J.A.1
Jia, L.2
Mazurak, K.3
Zdancewic, S.4
-
27
-
-
12344320856
-
A concurrent logical framework I: Judgments and properties
-
Carnegie Mellon University, School of Computer Science
-
Kevin Watkins, Iliano Cervesato, Frank Pfenning, and David Walker. A concurrent logical framework I: Judgments and properties. Technical Report CMU-CS-02-101, Carnegie Mellon University, School of Computer Science, 2002.
-
(2002)
Technical Report CMU-CS-02-101
-
-
Watkins, K.1
Cervesato, I.2
Pfenning, F.3
Walker, D.4
-
28
-
-
0028380781
-
Authentication in the taos operating system
-
Edward Wobber, Martín Abadi, Michael Burrows, and Butler Lampson. Authentication in the taos operating system. ACM Transactions on Computer Systems, 12:256-269, 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, pp. 256-269
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|