-
3
-
-
0027667638
-
A calculus for access control in distributed systems
-
September
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, September 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
4
-
-
0032681509
-
A core calculus of dependency
-
ACM Press
-
M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke. A core calculus of dependency. In ACM Symposium on Principles of Programming Languages, pages 147-160. ACM Press, 1999.
-
(1999)
ACM Symposium on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
6
-
-
0000421604
-
Logic programming with focusing proofs in linear logic
-
J.-M. Andreoli. Logic programming with focusing proofs in linear logic. Journal of Logic and Computation, 2(3):297-347, 1992.
-
(1992)
Journal of Logic and Computation
, vol.2
, Issue.3
, pp. 297-347
-
-
Andreoli, J.-M.1
-
8
-
-
78249286658
-
-
Technical Report CMU-CS-07-140, Carnegie Mellon University, Computer Science Department
-
K. Avijit and R. Harper. A language for access control. Technical Report CMU-CS-07-140, Carnegie Mellon University, Computer Science Department, 2007.
-
(2007)
A Language for Access Control
-
-
Avijit, K.1
Harper, R.2
-
10
-
-
33645995393
-
Device-enabled authorization in the Grey System
-
Proceedings of the 8th Information Security Conference, Springer Verlag
-
L. Bauer, S. Garriss, J. M. Mccune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the Grey System. In Proceedings of the 8th Information Security Conference, pages 431-445. Springer Verlag LNCS, 2005.
-
(2005)
LNCS
, pp. 431-445
-
-
Bauer, L.1
Garriss, S.2
Mccune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
11
-
-
51749098783
-
Refinement types for secure implementations
-
J. Bengtson, K. Bhargavan, C. Fournet, A. Gordon, and S. Maffeis. Refinement types for secure implementations. In Computer Science Logic, 2008.
-
(2008)
Computer Science Logic
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.4
Maffeis, S.5
-
12
-
-
77951292079
-
-
Technical Report MSR-TR-2009-97, Microsoft Research
-
J. Borgström, A. D. Gordon, and R. Pucella. Roles, Stacks, Histories: A Triple for Hoare. Technical Report MSR-TR-2009-97, Microsoft Research, 2009.
-
(2009)
Roles, Stacks, Histories: A Triple for Hoare
-
-
Borgström, J.1
Gordon, A.D.2
Pucella, R.3
-
21
-
-
70349335264
-
-
Technical Report CMU-CS-09-121, Computer Science Department, Carnegie Mellon University, April
-
D. Garg. Proof search in an authorization logic. Technical Report CMU-CS-09-121, Computer Science Department, Carnegie Mellon University, April 2009.
-
(2009)
Proof Search in An Authorization Logic
-
-
Garg, D.1
-
24
-
-
59249096370
-
Aura: A programming language for authorization and audit
-
L. Jia, J. A. Vaughan, K. Mazurak, J. Zhao, L. Zarko, J. Schorr, and S. Zdancewic. Aura: A programming language for authorization and audit. In ACM SIGPLAN International Conference on Functional Programming, 2008.
-
ACM SIGPLAN International Conference on Functional Programming, 2008
-
-
Jia, L.1
Vaughan, J.A.2
Mazurak, K.3
Zhao, J.4
Zarko, L.5
Schorr, J.6
Zdancewic, S.7
-
29
-
-
67650405745
-
-
PhD thesis, Carnegie Mellon, January Available as technical report CMU-CS-08-126
-
T. Murphy, VII. Modal Types for Mobile Code. PhD thesis, Carnegie Mellon, January 2008. Available as technical report CMU-CS-08-126.
-
(2008)
Modal Types for Mobile Code
-
-
Murphy VII, T.1
-
30
-
-
34247236249
-
Polymorphism and separation in Hoare Type Theory
-
Portland, Oregon
-
A. Nanevski, G. Morrisett, and L. Birkedal. Polymorphism and separation in Hoare Type Theory. In ACM SIGPLAN International Conference on Functional Programming, pages 62-73, Portland, Oregon, 2006.
-
(2006)
ACM SIGPLAN International Conference on Functional Programming
, pp. 62-73
-
-
Nanevski, A.1
Morrisett, G.2
Birkedal, L.3
-
31
-
-
67650092311
-
Ynot: Reasoning with the awkward squad
-
A. Nanevski, G. Morrisett, A. Shinnar, P. Govereau, and L. Birkedal. Ynot: Reasoning with the awkward squad. In ACM SIGPLAN International Conference on Functional Programming, 2008.
-
ACM SIGPLAN International Conference on Functional Programming, 2008
-
-
Nanevski, A.1
Morrisett, G.2
Shinnar, A.3
Govereau, P.4
Birkedal, L.5
-
34
-
-
70350602732
-
Substructural operational semantics as ordered logic programming
-
Los Alamitos, CA, USA, September IEEE Computer Society
-
F. Pfenning and R. J. Simmons. Substructural operational semantics as ordered logic programming. In IEEE Symposium on Logic In Computer Science, pages 101-110, Los Alamitos, CA, USA, September 2009. IEEE Computer Society.
-
(2009)
IEEE Symposium on Logic in Computer Science
, pp. 101-110
-
-
Pfenning, F.1
Simmons, R.J.2
-
36
-
-
63149101516
-
A library for light-weight information-flow security in Haskell
-
ACM
-
A. Russo, K. Claessen, and J. Hughes. A library for light-weight information-flow security in Haskell. In ACM SIGPLAN Symposium on Haskell, pages 13-24. ACM, 2008.
-
(2008)
ACM SIGPLAN Symposium on Haskell
, pp. 13-24
-
-
Russo, A.1
Claessen, K.2
Hughes, J.3
-
37
-
-
50249112702
-
Fable: A language for enforcing user-defined security policies
-
IEEE Computer Society
-
N. Swamy, B. J. Corcoran, and M. Hicks. Fable: A language for enforcing user-defined security policies. In IEEE Symposium on Security and Privacy, pages 369-383. IEEE Computer Society, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 369-383
-
-
Swamy, N.1
Corcoran, B.J.2
Hicks, M.3
-
40
-
-
0028380781
-
Authentication in the Taos operating system
-
E.Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Transactions On Computer Systems, 12(1):3-32, 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|