메뉴 건너뛰기




Volumn , Issue , 2010, Pages 169-180

Security-typed programming within dependently typed programming

Author keywords

agda; dependent types; security typed programming

Indexed keywords

AGDA; DECENTRALIZED ACCESS CONTROL; DEPENDENT TYPES; DYNAMIC POLICY; INFORMATION FLOW POLICIES; INFORMATION FLOWS; PROGRAMMING LANGUAGE; PROOF SEARCH; SECURITY TYPED PROGRAMMING; SEQUENT CALCULUS; SPATIAL DISTRIBUTION;

EID: 78249262079     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1863543.1863569     Document Type: Conference Paper
Times cited : (15)

References (40)
  • 6
    • 0000421604 scopus 로고
    • Logic programming with focusing proofs in linear logic
    • J.-M. Andreoli. Logic programming with focusing proofs in linear logic. Journal of Logic and Computation, 2(3):297-347, 1992.
    • (1992) Journal of Logic and Computation , vol.2 , Issue.3 , pp. 297-347
    • Andreoli, J.-M.1
  • 8
    • 78249286658 scopus 로고    scopus 로고
    • Technical Report CMU-CS-07-140, Carnegie Mellon University, Computer Science Department
    • K. Avijit and R. Harper. A language for access control. Technical Report CMU-CS-07-140, Carnegie Mellon University, Computer Science Department, 2007.
    • (2007) A Language for Access Control
    • Avijit, K.1    Harper, R.2
  • 10
    • 33645995393 scopus 로고    scopus 로고
    • Device-enabled authorization in the Grey System
    • Proceedings of the 8th Information Security Conference, Springer Verlag
    • L. Bauer, S. Garriss, J. M. Mccune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the Grey System. In Proceedings of the 8th Information Security Conference, pages 431-445. Springer Verlag LNCS, 2005.
    • (2005) LNCS , pp. 431-445
    • Bauer, L.1    Garriss, S.2    Mccune, J.M.3    Reiter, M.K.4    Rouse, J.5    Rutenbar, P.6
  • 21
    • 70349335264 scopus 로고    scopus 로고
    • Technical Report CMU-CS-09-121, Computer Science Department, Carnegie Mellon University, April
    • D. Garg. Proof search in an authorization logic. Technical Report CMU-CS-09-121, Computer Science Department, Carnegie Mellon University, April 2009.
    • (2009) Proof Search in An Authorization Logic
    • Garg, D.1
  • 29
    • 67650405745 scopus 로고    scopus 로고
    • PhD thesis, Carnegie Mellon, January Available as technical report CMU-CS-08-126
    • T. Murphy, VII. Modal Types for Mobile Code. PhD thesis, Carnegie Mellon, January 2008. Available as technical report CMU-CS-08-126.
    • (2008) Modal Types for Mobile Code
    • Murphy VII, T.1
  • 34
    • 70350602732 scopus 로고    scopus 로고
    • Substructural operational semantics as ordered logic programming
    • Los Alamitos, CA, USA, September IEEE Computer Society
    • F. Pfenning and R. J. Simmons. Substructural operational semantics as ordered logic programming. In IEEE Symposium on Logic In Computer Science, pages 101-110, Los Alamitos, CA, USA, September 2009. IEEE Computer Society.
    • (2009) IEEE Symposium on Logic in Computer Science , pp. 101-110
    • Pfenning, F.1    Simmons, R.J.2
  • 36
    • 63149101516 scopus 로고    scopus 로고
    • A library for light-weight information-flow security in Haskell
    • ACM
    • A. Russo, K. Claessen, and J. Hughes. A library for light-weight information-flow security in Haskell. In ACM SIGPLAN Symposium on Haskell, pages 13-24. ACM, 2008.
    • (2008) ACM SIGPLAN Symposium on Haskell , pp. 13-24
    • Russo, A.1    Claessen, K.2    Hughes, J.3
  • 37
    • 50249112702 scopus 로고    scopus 로고
    • Fable: A language for enforcing user-defined security policies
    • IEEE Computer Society
    • N. Swamy, B. J. Corcoran, and M. Hicks. Fable: A language for enforcing user-defined security policies. In IEEE Symposium on Security and Privacy, pages 369-383. IEEE Computer Society, 2008.
    • (2008) IEEE Symposium on Security and Privacy , pp. 369-383
    • Swamy, N.1    Corcoran, B.J.2    Hicks, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.