메뉴 건너뛰기




Volumn 45, Issue 9, 2010, Pages 169-180

Security-typed programming within dependently typed programming

Author keywords

[No Author keywords available]

Indexed keywords

DECENTRALIZED ACCESS CONTROL; DEPENDENT TYPES; DYNAMIC POLICY; INFORMATION FLOW POLICIES; INFORMATION FLOWS; PROGRAMMING LANGUAGE; PROOF SEARCH; SEQUENT CALCULUS;

EID: 79551659109     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/1932681.1863569     Document Type: Conference Paper
Times cited : (11)

References (40)
  • 6
    • 0000421604 scopus 로고
    • Logic programming with focusing proofs in linear logic
    • J.-M. Andreoli. Logic programming with focusing proofs in linear logic. Journal of Logic and Computation, 2(3):297-347, 1992.
    • (1992) Journal of Logic and Computation , vol.2 , Issue.3 , pp. 297-347
    • Andreoli, J.-M.1
  • 8
    • 78249286658 scopus 로고    scopus 로고
    • Technical Report CMU-CS-07-140, Carnegie Mellon University, Computer Science Department
    • K. Avijit and R. Harper. A language for access control. Technical Report CMU-CS-07-140, Carnegie Mellon University, Computer Science Department, 2007.
    • (2007) A Language for Access Control
    • Avijit, K.1    Harper, R.2
  • 16
    • 79551656602 scopus 로고    scopus 로고
    • Reasoning about the consequences of authorization policies in a linear epistemic logic
    • H. DeYoung and F. Pfenning. Reasoning about the consequences of authorization policies in a linear epistemic logic. In Workshop on Foundations of Computer Security, 2009.
    • (2009) Workshop on Foundations of Computer Security
    • DeYoung, H.1    Pfenning, F.2
  • 21
    • 70349335264 scopus 로고    scopus 로고
    • Technical Report CMU-CS-09-121, Computer Science Department, Carnegie Mellon University, April
    • D. Garg. Proof search in an authorization logic. Technical Report CMU-CS-09-121, Computer Science Department, Carnegie Mellon University, April 2009.
    • (2009) Proof Search in an Authorization Logic
    • Garg, D.1
  • 29
    • 67650405745 scopus 로고    scopus 로고
    • PhD thesis, Carnegie Mellon, January, Available as technical report CMU-CS-08-126
    • T. Murphy, VII. Modal Types for Mobile Code. PhD thesis, Carnegie Mellon, January 2008. Available as technical report CMU-CS-08-126.
    • (2008) Modal Types for Mobile Code
    • Murphy, T.V.1
  • 34
    • 70350602732 scopus 로고    scopus 로고
    • Substructural operational semantics as ordered logic programming
    • Los Alamitos, CA, USA, September, IEEE Computer Society
    • F. Pfenning and R. J. Simmons. Substructural operational semantics as ordered logic programming. In IEEE Symposium on Logic In Computer Science, pages 101-110, Los Alamitos, CA, USA, September 2009. IEEE Computer Society.
    • (2009) IEEE Symposium on Logic in Computer Science , pp. 101-110
    • Pfenning, F.1    Simmons, R.J.2
  • 36
    • 63149101516 scopus 로고    scopus 로고
    • A library for light-weight information-flow security in Haskell
    • ACM
    • A. Russo, K. Claessen, and J. Hughes. A library for light-weight information-flow security in Haskell. In ACM SIGPLAN Symposium on Haskell, pages 13-24. ACM, 2008.
    • (2008) ACM SIGPLAN Symposium on Haskell , pp. 13-24
    • Russo, A.1    Claessen, K.2    Hughes, J.3
  • 37
    • 50249112702 scopus 로고    scopus 로고
    • Fable: A language for enforcing user-defined security policies
    • IEEE Computer Society
    • N. Swamy, B. J. Corcoran, and M. Hicks. Fable: A language for enforcing user-defined security policies. In IEEE Symposium on Security and Privacy, pages 369-383. IEEE Computer Society, 2008.
    • (2008) IEEE Symposium on Security and Privacy , pp. 369-383
    • Swamy, N.1    Corcoran, B.J.2    Hicks, M.3
  • 38
    • 85040949627 scopus 로고    scopus 로고
    • Enforcing stateful authorization and information flow policies in Fine
    • N. Swamy, J. Chen, and R. Chugh. Enforcing stateful authorization and information flow policies in Fine. In European Symposium on Programming, 2010.
    • (2010) European Symposium on Programming
    • Swamy, N.1    Chen, J.2    Chugh, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.