-
2
-
-
78449287511
-
SENSORIA process calculi for service-oriented computing
-
M. Wirsing et al., "SENSORIA process calculi for service-oriented computing," in Proc. TGC, 2006.
-
Proc. TGC, 2006
-
-
Wirsing, M.1
-
4
-
-
85031146080
-
The fusion calculus: Expressiveness and symmetry in mobile processes
-
J. Parrow and B. Victor, "The fusion calculus: Expressiveness and symmetry in mobile processes," in Proc. LICS, 1998.
-
Proc. LICS, 1998
-
-
Parrow, J.1
Victor, B.2
-
5
-
-
78449311336
-
-
web site
-
The PCL web site, http://www.disi.unitn.it/~zunino/PCL.
-
The PCL
-
-
-
8
-
-
0034711981
-
Structural cut elimination - Intuitionistic and classical logic
-
F. Pfenning, "Structural cut elimination - intuitionistic and classical logic," Information and Computation, vol. 157, 2000.
-
(2000)
Information and Computation
, vol.157
-
-
Pfenning, F.1
-
9
-
-
0001830019
-
Propositional lax logic
-
M. Fairtlough and M. Mendler, "Propositional lax logic," Information and Computation, vol. 137, no. 1, pp. 1-33, 1997.
-
(1997)
Information and Computation
, vol.137
, Issue.1
, pp. 1-33
-
-
Fairtlough, M.1
Mendler, M.2
-
10
-
-
49249140528
-
Intuitionistic propositional logic is polynomial-space complete
-
R. Statman, "Intuitionistic propositional logic is polynomial-space complete," Theoretical Computer Science, vol. 9, 1979.
-
(1979)
Theoretical Computer Science
, vol.9
-
-
Statman, R.1
-
11
-
-
78449268376
-
A modal deconstruction of access control logics
-
D. Garg and M. Abadi, "A modal deconstruction of access control logics," in Proc. FoSSaCS, 2008.
-
Proc. FoSSaCS, 2008
-
-
Garg, D.1
Abadi, M.2
-
12
-
-
84976826320
-
Generative communication in Linda
-
D. Gelernter, "Generative communication in Linda," ACM TOPLAS, vol. 7, no. 1, 1985.
-
(1985)
ACM TOPLAS
, vol.7
, Issue.1
-
-
Gelernter, D.1
-
16
-
-
16244380253
-
Normative autonomy and normative co-ordination: Declarative power, representation, and mandate
-
J. Gelati, A. Rotolo, G. Sartor, and G. Governatori, "Normative autonomy and normative co-ordination: Declarative power, representation, and mandate," Artificial Intelligence and Law, vol. 12, no. 1-2, pp. 53-81, 2004.
-
(2004)
Artificial Intelligence and Law
, vol.12
, Issue.1-2
, pp. 53-81
-
-
Gelati, J.1
Rotolo, A.2
Sartor, G.3
Governatori, G.4
-
19
-
-
0027609859
-
A logical view of composition
-
M. Abadi and G. D. Plotkin, "A logical view of composition," Theoretical Computer Science, vol. 114, no. 1, pp. 3-30, 1993.
-
(1993)
Theoretical Computer Science
, vol.114
, Issue.1
, pp. 3-30
-
-
Abadi, M.1
Plotkin, G.D.2
-
20
-
-
0027342022
-
Composing specifications
-
M. Abadi and L. Lamport, "Composing specifications," ACM TOPLAS, vol. 15, no. 1, pp. 73-132, 1993.
-
(1993)
ACM TOPLAS
, vol.15
, Issue.1
, pp. 73-132
-
-
Abadi, M.1
Lamport, L.2
-
21
-
-
84912117056
-
Compositional circular assume-guarantee rules cannot be sound and complete
-
P. Maier, "Compositional circular assume-guarantee rules cannot be sound and complete," in Proc. FoSSaCS, 2003.
-
Proc. FoSSaCS, 2003
-
-
Maier, P.1
-
22
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin, "A calculus for access control in distributed systems," ACM TOPLAS, vol. 4, no. 15, pp. 706-734, 1993.
-
(1993)
ACM TOPLAS
, vol.4
, Issue.15
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
23
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
N. Li, B. N. Grosof, and J. Feigenbaum, "Delegation logic: A logic-based approach to distributed authorization," ACM TISSEC, vol. 6, no. 1, pp. 128-171, 2003.
-
(2003)
ACM TISSEC
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
24
-
-
0025460546
-
Knowledge and common knowledge in a distributed environment
-
J. Y. Halpern and Y. Moses, "Knowledge and common knowledge in a distributed environment," J. ACM, vol. 37, no. 3, 1990.
-
(1990)
J. ACM
, vol.37
, Issue.3
-
-
Halpern, J.Y.1
Moses, Y.2
-
25
-
-
0036836682
-
An intensive survey of fair non-repudiation protocols
-
S. Kremer, O. Markowitch, and J. Zhou, "An intensive survey of fair non-repudiation protocols," Computer Communications, vol. 25, 2002.
-
(2002)
Computer Communications
, vol.25
-
-
Kremer, S.1
Markowitch, O.2
Zhou, J.3
-
27
-
-
0000416796
-
Optimistic fair exchange of digital signatures
-
N. Asokan, V. Shoup, and M. Waidner, "Optimistic fair exchange of digital signatures," in EUROCRYPT, 1998.
-
(1998)
Eurocrypt
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
28
-
-
78449291678
-
A cryptographic model for branching time security properties - The case of contract signing protocols
-
V. Cortier, R. Küsters, and B. Warinschi, "A cryptographic model for branching time security properties - the case of contract signing protocols," in Proc. ESORICS, 2007.
-
Proc. ESORICS, 2007
-
-
Cortier, V.1
Küsters, R.2
Warinschi, B.3
-
29
-
-
78449272394
-
Constraint solving for contract-signing protocols
-
D. Kähler and R. Küsters, "Constraint solving for contract-signing protocols," in Proc. CONCUR, 2005.
-
Proc. CONCUR, 2005
-
-
Kähler, D.1
Küsters, R.2
-
30
-
-
68549111018
-
A theory of contracts for web services
-
G. Castagna, N. Gesbert, and L. Padovani, "A theory of contracts for web services," ACM TOPLAS, vol. 31, no. 5, 2009.
-
(2009)
ACM TOPLAS
, vol.31
, Issue.5
-
-
Castagna, G.1
Gesbert, N.2
Padovani, L.3
-
32
-
-
70350590149
-
CC-Pi: A constraint-based language for specifying service level agreements
-
M. G. Buscemi and U. Montanari, "CC-Pi: A constraint-based language for specifying service level agreements," in Proc. ESOP, 2007.
-
Proc. ESOP, 2007
-
-
Buscemi, M.G.1
Montanari, U.2
-
34
-
-
78449288724
-
Theoretical foundations for compensations in flow composition languages
-
R. Bruni, H. C. Melgratti, and U. Montanari, "Theoretical foundations for compensations in flow composition languages," in Proc. POPL, 2005.
-
Proc. POPL, 2005
-
-
Bruni, R.1
Melgratti, H.C.2
Montanari, U.3
-
38
-
-
37249031542
-
A logical framework for history-based access control and reputation systems
-
K. Krukow, M. Nielsen, and V. Sassone, "A logical framework for history-based access control and reputation systems," J. of Computer Security, vol. 16, no. 1, pp. 63-101, 2008.
-
(2008)
J. of Computer Security
, vol.16
, Issue.1
, pp. 63-101
-
-
Krukow, K.1
Nielsen, M.2
Sassone, V.3
|