-
1
-
-
0042467968
-
Logic in access control
-
[Aba03]
-
[Aba03] Abadi M (2003) Logic in access control. In: Proceedings of LICS'03, pp 228-233
-
(2003)
Proceedings of LICS'03
, pp. 228-233
-
-
Abadi, M.1
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
[ABL93]
-
[ABL93] Abadi M, Burrows M, Lampson B, Plotkin G (1993) A calculus for access control in distributed systems. ACM Trans Progrogram Lang Syst 4(15):706-734
-
(1993)
ACM Trans Progrogram Lang Syst
, vol.4
, Issue.15
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
4
-
-
77954086151
-
Identity analytics: Using modeling and simulation to improve data security decision making
-
[BBC08], HP Labs, 2008
-
[BBC08] Baldwin A, Beres Y, Casassa Mont M, Griffin J, Shiu S (2008) Identity analytics: using modeling and simulation to improve data security decision making. Technical Report HPL-2008-2188, HP Labs, 2008. http://www.hpl.hp.com/techreports/2008/ HPL-2008-188.html
-
(2008)
Technical Report HPL-2008-2188
-
-
Baldwin, A.1
Beres, Y.2
Casassa Mont, M.3
Griffin, J.4
Shiu, S.5
-
5
-
-
77957909604
-
Modelling the human and technological costs and benefits of USB memory stick security
-
[BCG08], In: Johnson ME, (ed), Springer, Heidelberg
-
[BCG08] Beautement A, Coles R, Griffin J, Ioannidis C, Monahan B, Pym D, Sasse MA, Wonham M (2008) Modelling the human and technological costs and benefits of USB memory stick security. In: Johnson ME, (ed)Managing information risk and the economics of security. Springer, Heidelberg
-
(2008)
Managing Information Risk and the Economics of Security
-
-
Beautement, A.1
Coles, R.2
Griffin, J.3
Ioannidis, C.4
Monahan, B.5
Pym, D.6
Sasse, M.A.7
Wonham, M.8
-
6
-
-
60649088249
-
Analysing the performance of security solutions to reduce vulnerability exposure window
-
[BGS08]. IEEE
-
[BGS08] Beres Y, Griffin J, Shiu S, Heitman M, Markle D, Ventura P (2008) Analysing the performance of security solutions to reduce vulnerability exposure window. In: Proceedings of 2008 annual computer security applications conference (ACSAC). IEEE
-
(2008)
Proceedings of 2008 Annual Computer Security Applications Conference (ACSAC)
-
-
Beres, Y.1
Griffin, J.2
Shiu, S.3
Heitman, M.4
Markle, D.5
Ventura, P.6
-
9
-
-
0002045898
-
Role-based access control models
-
[CFS96]
-
[CFS96] Coyne EJ, Feinstein HL, Sandhu R, Youman CE (1996) Role-based access control models. IEEE Comput 29(2):38-47
-
(1996)
IEEE Comput
, vol.29
, Issue.2
, pp. 38-47
-
-
Coyne, E.J.1
Feinstein, H.L.2
Sandhu, R.3
Youman, C.E.4
-
10
-
-
77954088372
-
Located Demos2k-towards a tool for modelling processes and distributed resources
-
[CMP08a], HP Labs, 2008
-
[CMP08a] Collinson M, Monahan B, Pym D (2008a) Located Demos2k-towards a tool for modelling processes and distributed resources. Technical Report HPL-2008-2076, HP Labs, 2008. http://library.hp.com/techpubs/2008/HPL-2008-76. html
-
(2008)
Technical Report HPL-2008-2076
-
-
Collinson, M.1
Monahan, B.2
Pym, D.3
-
11
-
-
72649087041
-
A logical and computational theory of located resource
-
[CMP08b], HP Labs, 2008 (Submitted)
-
[CMP08b] Collinson M, Monahan B, Pym D (2008b) A logical and computational theory of located resource. Technical Report HPL-2008-74R1, HP Labs, 2008 (Submitted). http://library.hp.com/techpubs/2008/HPL-2008-74R1.html
-
(2008)
Technical Report HPL-2008-74R1
-
-
Collinson, M.1
Monahan, B.2
Pym, D.3
-
13
-
-
72649092598
-
Algebra and logic for resource-based systems modelling
-
[CP09], HP Labs, 2009 (Submitted)
-
[CP09] Collinson M, Pym D (2009) Algebra and logic for resource-based systems modelling. Technical Report HPL-2009-2021, HP Labs, 2009 (Submitted). http://library.hp.com/techpubs/2009/HPL-2009-10.html.
-
(2009)
Technical Report HPL-2009-2021
-
-
Collinson, M.1
Pym, D.2
-
14
-
-
35349000116
-
Errata for formal aspects of computing (2006) 18:495-517 and their consequences
-
[CPT07]
-
[CPT07] CollinsonM, PymD, ToftsC(2007) Errata for formal aspects of computing (2006) 18:495-517 and their consequences. Formal Aspects Comput 19(4):551-554
-
(2007)
Formal Aspects Comput
, vol.19
, Issue.4
, pp. 551-554
-
-
Collinson, M.1
Pym, D.2
Tofts, C.3
-
15
-
-
77954085920
-
-
[Dem], Demos2k
-
[Dem] Demos2k. http://www.demos2k.org
-
-
-
-
17
-
-
35048849152
-
Model-checking access control policies
-
[GRS04], Springer, Heidelberg
-
[GRS04] Guelev DP, Ryan MD, Schobbens P-Y (2004) Model-checking access control policies. In: Seventh information security conference (ISC'04), Lecture Notes in Computer Science, vol 3225. Springer, Heidelberg
-
(2004)
Seventh Information Security Conference (ISC'04), Lecture Notes in Computer Science
, vol.3225
-
-
Guelev, D.P.1
Ryan, M.D.2
Schobbens, P.-Y.3
-
18
-
-
0021974161
-
Algebraic laws for nondeterminism and concurrency
-
[HM85]
-
[HM85] Hennessy M, Milner R (1985) Algebraic laws for nondeterminism and concurrency. J ACM 32(1):137-161
-
(1985)
J ACM
, vol.32
, Issue.1
, pp. 137-161
-
-
Hennessy, M.1
Milner, R.2
-
20
-
-
0035035498
-
BI as an assertion language for mutable data structures
-
[IO01], ACM, London
-
[IO01] Ishtiaq S, O'Hearn PW(2001) BI as an assertion language for mutable data structures. In: Proceedings of POPL 2001. ACM, London, pp 14-26
-
(2001)
Proceedings of POPL 2001
, pp. 14-26
-
-
Ishtiaq, S.1
O'Hearn, P.W.2
-
21
-
-
70449084506
-
Access control policy analysis using free variable tableaux
-
[KYM06]
-
[KYM06] Kamoda H, Yamaoka M, Matsuda S, Broda K, SlomanM(2006) Access control policy analysis using free variable tableaux. Information Processing Society of Japan (IPSJ) Digital Courier, vol 2
-
(2006)
Information Processing Society of Japan (IPSJ) Digital Courier
, vol.2
-
-
Kamoda, H.1
Yamaoka, M.2
Matsuda, S.3
Broda, K.4
Sloman, M.5
-
22
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
[LAB92]
-
[LAB92] Lampson B, Abadi M, BurrowsM,Wobber E (1992) Authentication in distributed systems: theory and practice. ACM Trans Comput Syst 4(10):265-310
-
(1992)
ACM Trans Comput Syst
, vol.4
, Issue.10
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
24
-
-
49449083108
-
Beyond separation of duty: An algebra for specifying high-level security policies
-
[LW08]
-
[LW08] Li N, Wang Q (2008) Beyond separation of duty: An algebra for specifying high-level security policies. J ACM 55(3)
-
(2008)
J ACM
, vol.55
, Issue.3
-
-
Li, N.1
Wang, Q.2
-
25
-
-
0003276135
-
A calculus of communicating systems
-
[Mil80]. Springer, Heidelberg
-
[Mil80] Milner R (1980) A calculus of communicating systems, Lecture Notes in Computer Science, vol 92. Springer, Heidelberg
-
(1980)
Lecture Notes in Computer Science
, vol.92
-
-
Milner, R.1
-
26
-
-
0001530725
-
Calculi for synchrony and asynchrony
-
[Mil83]
-
[Mil83] Milner R (1983) Calculi for synchrony and asynchrony. Theor Comput Sci 25:267-310
-
(1983)
Theor Comput Sci
, vol.25
, pp. 267-310
-
-
Milner, R.1
-
28
-
-
34047114898
-
Resources, concurrency and local reasoning
-
[OHe07]
-
[OHe07] O'Hearn PW (2007) Resources, concurrency and local reasoning. Theor Comput Sci 375(1-3):271-307
-
(2007)
Theor Comput Sci
, vol.375
, Issue.1-3
, pp. 271-307
-
-
O'Hearn, P.W.1
-
29
-
-
0033420437
-
The logic of bunched implications
-
[OP99]
-
[OP99] O'Hearn P, Pym D (1999) The logic of bunched implications. Bull Symb Logic 5(2):215-244
-
(1999)
Bull Symb Logic
, vol.5
, Issue.2
, pp. 215-244
-
-
O'Hearn, P.1
Pym, D.2
-
30
-
-
2942572885
-
Structural operational semantics
-
[Plo04], (Original manuscript 1981)
-
[Plo04] Plotkin GD (2004) Structural operational semantics. J Logic Algebraic Program 60:17-139 (Original manuscript 1981)
-
(2004)
J Logic Algebraic Program
, vol.60
, pp. 17-139
-
-
Plotkin, G.D.1
-
31
-
-
2042469457
-
Possible worlds and resources: The semantics of BI
-
[POY04]
-
[POY04] Pym D, O'Hearn P, Yang H (2004) Possible worlds and resources: the semantics of BI. Theor Comput Sci 315(1):257-305
-
(2004)
Theor Comput Sci
, vol.315
, Issue.1
, pp. 257-305
-
-
Pym, D.1
O'Hearn, P.2
Yang, H.3
-
32
-
-
33750914676
-
A calculus and logic of resources and processes
-
[PT06]. Errata in [CPT07]
-
[PT06] Pym D, Tofts C (2006) A calculus and logic of resources and processes. Formal Aspects Comput 18(4):495-517. Errata in [CPT07]
-
(2006)
Formal Aspects Comput
, vol.18
, Issue.4
, pp. 495-517
-
-
Pym, D.1
Tofts, C.2
-
33
-
-
33847687323
-
Systems modelling via resources and processes: Philosphy, calculus, semantics, and logic
-
[PT07], In: Cardelli L, FioreM,Winskel G (eds), Elsevier, Amsterdam, Errata in [CPT07]
-
[PT07] PymD, Tofts C (2007) Systems modelling via resources and processes: philosphy, calculus, semantics, and logic. In: Cardelli L, FioreM,Winskel G (eds) Computation, meaning and logic: articles dedicated to Gordon Plotkin, Electronic Notes in Theoretical Computer Science, vol 107. Elsevier, Amsterdam, pp 545-587. Errata in [CPT07]
-
(2007)
Computation, Meaning and Logic: Articles Dedicated to Gordon Plotkin, Electronic Notes in Theoretical Computer Science
, vol.107
, pp. 545-587
-
-
Pym D.Tofts, C.1
-
34
-
-
0032597525
-
On bunched predicate logic
-
[Pym99], IEEE, New York
-
[Pym99] Pym D (1999) On bunched predicate logic. In: Proceedings of LICS'99, pp 183-192. IEEE, New York
-
(1999)
Proceedings of LICS'99
, pp. 183-192
-
-
Pym, D.1
-
35
-
-
0344994313
-
The semantics and proof theory of the logic of bunched implications
-
[Pym02], Kluwer, Dordrecht. Errata at
-
[Pym02] Pym DJ (2002) The semantics and proof theory of the logic of bunched implications, Applied Logic Series, vol 26. Kluwer, Dordrecht. Errata at: http://www.cs.bath.ac.uk/~pym/BI-monograph-errata.pdf
-
(2002)
Applied Logic Series
, vol.26
-
-
Pym, D.J.1
-
36
-
-
0036051192
-
Separation logic: A logic for sharedmutable data structures
-
[Rey02], IEEE New York
-
[Rey02] Reynolds JC (2002) Separation logic: a logic for sharedmutable data structures. In: Proceedings of LICS'02. IEEE, NewYork, pp 55-74
-
(2002)
Proceedings of LICS'02
, pp. 55-74
-
-
Reynolds, J.C.1
-
37
-
-
0003777431
-
-
[RSG01], Addison-Wesley, Reading
-
[RSG01] Ryan P, Schneider S, Goldsmith M, Lowe G, Roscoe B (2001) The modelling and analysis of security protocols. Addison-Wesley, Reading
-
(2001)
The modelling and analysis of security protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
39
-
-
33244491452
-
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
-
[SMR06]
-
[SMR06] Scedrov A, Mitchell JC, Ramanathan A, Teague V (2006) A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theor Comput Scie 353:118-164
-
(2006)
Theor Comput Scie
, vol.353
, pp. 118-164
-
-
Scedrov, A.1
Mitchell, J.C.2
Ramanathan, A.3
Teague, V.4
-
40
-
-
0016555241
-
The protection of information in computer systems
-
[SS75]
-
[SS75] Saltzer JH, Shroeder MD (1975) The protection of information in computer systems. Proc IEEE 63(9):1278-1308
-
(1975)
Proc IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Shroeder, M.D.2
|