메뉴 건너뛰기




Volumn , Issue , 2011, Pages 45-58

AuraConf: A unified approach to authorization and confidentiality

Author keywords

Cryptography; Dependent types; Information flow

Indexed keywords

ACCESS CONTROL MECHANISM; DEPENDENT TYPES; FORMAL SECURITY; INFORMATION FLOW; PRIVATE KEY; PROGRAMMING LANGUAGE; TYPE SYSTEMS; UNIFIED APPROACH;

EID: 79952136840     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1929553.1929563     Document Type: Conference Paper
Times cited : (6)

References (40)
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi, P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In Journal of Cryp-tology, 15(2):103-127, 2002.
    • (2002) Journal of Cryp-tology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 57049111067 scopus 로고    scopus 로고
    • Termination-insensitive noninterference leaks more than just a bit
    • A. Askarov, S. Hunt, A. Sabelfeld, D. Sands. Termination-insensitive noninterference leaks more than just a bit. In ESORICS '08, pp. 333-348. 2008.
    • (2008) ESORICS '08 , pp. 333-348
    • Askarov, A.1    Hunt, S.2    Sabelfeld, A.3    Sands, D.4
  • 5
    • 34548715313 scopus 로고    scopus 로고
    • Gradual release: Unifying declassification, encryption and key release policies
    • DOI 10.1109/SP.2007.22, 4223226, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • A. Askarov, A. Sabelfeld. Gradual release: Unifying declassification, encryption and key release policies. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 207-221. IEEE Computer Society, Washington, DC, USA, 2007. (Pubitemid 47432528)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 207-221
    • Askarov, A.1    Sabelfeld, A.2
  • 7
    • 1442292329 scopus 로고    scopus 로고
    • A composable cryptographic library with nested operations
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • M. Backes, B. Pfitzmann, M. Waidner. A composable cryptographic library with nested operations. In CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications security, pp. 220-230. ACM Press, Washington D.C., USA, 2003. (Pubitemid 40673804)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 220-230
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 9
    • 27544508109 scopus 로고    scopus 로고
    • Distributed proving in access-control systems
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • L. Bauer, S. Garriss, M. K. Reiter. Distributed proving in access-control systems. In Proceedings of the 2005 IEEE Symposium on Security & Privacy, pp. 81-95. 2005. (Pubitemid 41543648)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 81-95
    • Bauer, L.1    Garriss, S.2    Reiter, M.K.3
  • 15
    • 84865659111 scopus 로고    scopus 로고
    • Cryptographically sound implementations for typed information-flow security
    • C. Fournet, T. Rezk. Cryptographically sound implementations for typed information-flow security. In POPL '08, pp. 323-335. 2008.
    • (2008) POPL '08 , pp. 323-335
    • Fournet, C.1    Rezk, T.2
  • 16
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC '09. 2009.
    • (2009) STOC '09
    • Gentry, C.1
  • 17
    • 2942697713 scopus 로고    scopus 로고
    • Mathematical modal logic: A view of its evolution
    • DOI 10.1016/S1570-8683(03)00008-9
    • R. Goldblatt. Mathematical modal logic: a view of its evolution. In J. of Applied Logic, 1(5-6):309-392, 2003. (Pubitemid 41155185)
    • (2003) Journal of Applied Logic , vol.1 , Issue.5-6 , pp. 309-392
    • Goldblatt, R.1
  • 18
    • 0031701347 scopus 로고    scopus 로고
    • The SLam calculus: Programming with secrecy and integrity
    • ACM Press, New York, NY
    • N. Heintze, J. G. Riecke. The SLam calculus: programming with secrecy and integrity. In POPL '98, pp. 365-377. ACM Press, New York, NY, 1998.
    • (1998) POPL '98 , pp. 365-377
    • Heintze, N.1    Riecke, J.G.2
  • 19
    • 0002386430 scopus 로고
    • The formulae-as-types notion of construction
    • J. P. Seldin, J. R. Hindly, eds. Academic Press, New York
    • W. A. Howard. The formulae-as-types notion of construction. In J. P. Seldin, J. R. Hindly, eds., To H. B. Curry: Essays on Combinatory Logic, Lambda-Calculus, and Formalism, pp. 479-490. Academic Press, New York, 1980.
    • (1980) To H. B. Curry: Essays on Combinatory Logic, Lambda-calculus, and Formalism , pp. 479-490
    • Howard, W.A.1
  • 20
    • 59249096370 scopus 로고    scopus 로고
    • Aura: A programming language for authorization and audit
    • Extended version U. Penn. Tech. Rep. MS-CIS-08-10
    • L. Jia, J. A. Vaughan, K. Mazurak, J. Zhao, L. Zarko, J. Schorr, S. Zdancewic. Aura: A programming language for authorization and audit. In ICFP '08, pp. 27-38. 2008. Extended version U. Penn. Tech. Rep. MS-CIS-08-10.
    • (2008) ICFP '08 , pp. 27-38
    • Jia, L.1    Vaughan, J.A.2    Mazurak, K.3    Zhao, J.4    Zarko, L.5    Schorr, J.6    Zdancewic, S.7
  • 21
    • 79952153947 scopus 로고    scopus 로고
    • Modal proofs as distributed programs (extended abstract)
    • Full version Princeton Tech. Rep. TR-671-03
    • L. Jia, D. Walker. Modal proofs as distributed programs (extended abstract). In ESOP '04. 2004. Full version Princeton Tech. Rep. TR-671-03.
    • (2004) ESOP '04
    • Jia, L.1    Walker, D.2
  • 22
    • 70450285315 scopus 로고    scopus 로고
    • Encoding information flow in aura
    • L. Jia, S. Zdancewic. Encoding information flow in aura. In PLAS '09. 2009.
    • (2009) PLAS '09
    • Jia, L.1    Zdancewic, S.2
  • 23
    • 26844509701 scopus 로고    scopus 로고
    • A type system for computationally secure information flow
    • Fundamentals of Computation Theory: 15th International Symposium, FCT 2005. Proceedings
    • P. Laud, V. Vene. A type system for computationally secure information flow. In FCT '05, pp. 365-377. Lübeck, Germany, 2005. (Pubitemid 41449464)
    • (2005) Lecture Notes in Computer Science , vol.3623 , pp. 365-377
    • Laud, P.1    Vene, V.2
  • 24
    • 33947630856 scopus 로고    scopus 로고
    • Encoding information flow in haskell
    • P. Li, S. Zdancewic. Encoding information flow in haskell. In CSFW '06. 2006.
    • (2006) CSFW '06
    • Li, P.1    Zdancewic, S.2
  • 28
    • 4544313887 scopus 로고    scopus 로고
    • A symmetric modal lambda calculus for distributed computing
    • IEEE Press
    • T. Murphy, VII, K. Crary, R. Harper, F. Pfenning. A symmetric modal lambda calculus for distributed computing. In LICS '04. IEEE Press, 2004.
    • (2004) LICS '04
    • Murphy VII, T.1    Crary, K.2    Harper, R.3    Pfenning, F.4
  • 30
    • 84945246255 scopus 로고    scopus 로고
    • A judgmental reconstruction of modal logic
    • DOI 10.1017/S0960129501003322
    • F. Pfenning, R. Davies. A judgmental reconstruction of modal logic. In Mathematical. Structures in Comp. Sci., 11(4):511-540, 2001. (Pubitemid 33303507)
    • (2001) MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE , vol.11 , Issue.4 , pp. 511-540
    • Pfenning, F.1    Davies, R.2
  • 33
    • 34547244658 scopus 로고    scopus 로고
    • Secure information flow with random assignment and encryption
    • Alexandria, Virgina, USA
    • G. Smith, R. Alpízar. Secure information flow with random assignment and encryption. In FSME'06, pp. 33-43. Alexandria, Virgina, USA, 2006.
    • (2006) FSME'06 , pp. 33-43
    • Smith, G.1    Alpízar, R.2
  • 34
    • 2442514278 scopus 로고    scopus 로고
    • A bisimulation for dynamic sealing
    • E. Sumii, B. C. Pierce. A bisimulation for dynamic sealing. In POPL '04. 2004.
    • (2004) POPL '04
    • Sumii, E.1    Pierce, B.C.2
  • 35
    • 77954739827 scopus 로고    scopus 로고
    • Enforcing stateful authorization and information flow policies in fine
    • N. Swamy, J. Chen, R. Chugh. Enforcing stateful authorization and information flow policies in Fine. In ESOP '10. 2010.
    • (2010) ESOP '10
    • Swamy, N.1    Chen, J.2    Chugh, R.3
  • 38
    • 51749116017 scopus 로고    scopus 로고
    • Evidence-based audit
    • Extended version U. Penn. Tech. Rep. MS-CIS-08-09
    • J. A. Vaughan, L. Jia, K. Mazurak, S. Zdancewic. Evidence-based audit. In CSF '08, pp. 177-191. 2008. Extended version U. Penn. Tech. Rep. MS-CIS-08-09.
    • (2008) CSF '08 , pp. 177-191
    • Vaughan, J.A.1    Jia, L.2    Mazurak, K.3    Zdancewic, S.4
  • 39
    • 34548790762 scopus 로고    scopus 로고
    • A cryptographic decentralized label model
    • DOI 10.1109/SP.2007.5, 4223225, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • J. A. Vaughan, S. Zdancewic. A cryptographic decentralized label model. In IEEE Security and Privacy, pp. 192-206. Berkeley, California, 2007. (Pubitemid 47432527)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 192-206
    • Vaughan, J.A.1    Zdancewic, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.