-
2
-
-
67649663096
-
On access control, data integration and their languages
-
Springer-Verlag
-
M. Abadi. On Access Control, Data Integration and Their Languages. Computer Systems: Theory, Technology and Applications, A Tribute to Roger Needham, Springer-Verlag:9-14, 2004.
-
(2004)
Computer Systems: Theory, Technology and Applications, A Tribute to Roger Needham
, pp. 9-14
-
-
Abadi, M.1
-
3
-
-
0036040302
-
Analyzing security protocols with secrecy types and logic programs
-
M. Abadi and B. Blanchet. Analyzing security protocols with secrecy types and logic programs. In POPL, 2002.
-
(2002)
POPL
-
-
Abadi, M.1
Blanchet, B.2
-
4
-
-
51949088463
-
Towards a declarative language and system for secure networking
-
M. Abadi and B. T. Loo. Towards a Declarative Language and System for Secure Networking. In NetDB, 2007.
-
(2007)
NetDB
-
-
Abadi, M.1
Loo, B.T.2
-
6
-
-
85027186168
-
Magic sets and other strange ways to implement logic programs
-
F. Bancilhon, D. Maier, Y. Sagiv, and J. Ullman. Magic Sets and Other Strange Ways to Implement Logic Programs. In SIGMOD, 1986.
-
(1986)
SIGMOD
-
-
Bancilhon, F.1
Maier, D.2
Sagiv, Y.3
Ullman, J.4
-
8
-
-
0029700344
-
Decentralized trust management
-
IEEE Computer Society Press, Los Alamitos
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proc. of the 17th Symposium on Security and Privacy, pages 164-173. IEEE Computer Society Press, Los Alamitos, 1996.
-
(1996)
Proc. of the 17th Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
9
-
-
34250652156
-
Declarative networking: Language, execution and optimization
-
June
-
Boon Thau Loo et. al. Declarative Networking: Language, Execution and Optimization. In SIGMOD, June 2006.
-
(2006)
SIGMOD
-
-
Al, B.T.L.Et.1
-
10
-
-
0003048717
-
The TSIMMIS project: Integration of heterogeneous information sources
-
Tokyo, Japan
-
S. Chawathe, H. Garcia-Molina, J. Hammer, K. Ireland, Y. Papakonstantinou, J. D. Ullman, and J. Widom. The TSIMMIS Project: Integration of heterogeneous information sources. In 16th Meeting of the Information Processing Society of Japan, Tokyo, Japan, 1994.
-
(1994)
16th Meeting of the Information Processing Society of Japan
-
-
Chawathe, S.1
Garcia-Molina, H.2
Hammer, J.3
Ireland, K.4
Papakonstantinou, Y.5
Ullman, J.D.6
Widom, J.7
-
13
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
May
-
T. Jim. SD3: A Trust Management System With Certified Evaluation. In IEEE Symposium on Security and Privacy, May 2001.
-
(2001)
IEEE Symposium on Security and Privacy
-
-
Jim, T.1
-
15
-
-
22244485369
-
Delegation Logic: A logic-based approach to distributed authorization
-
Feb.
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation Logic: A logic-based approach to distributed authorization. ACM TISSEC, Feb. 2003.
-
(2003)
ACM TISSEC
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
17
-
-
33646580035
-
Secure context-sensitive authorization
-
K. Minami and D. Kotz. Secure context-sensitive authorization. In PERCOM, 2005.
-
(2005)
PERCOM
-
-
Minami, K.1
Kotz, D.2
-
18
-
-
58149319645
-
A survey of research on deductive database systems
-
R. Ramakrishnan and J. D. Ullman. A Survey of Research on Deductive Database Systems. Journal of Logic Programming, 23(2):125-149, 1993.
-
(1993)
Journal of Logic Programming
, vol.23
, Issue.2
, pp. 125-149
-
-
Ramakrishnan, R.1
Ullman, J.D.2
-
19
-
-
67649635248
-
Unified declarative platform for secure networked information systems
-
W. Zhou, Y. Mao, B. T. Loo, and M. Abadi. Unified Declarative Platform for Secure Networked Information Systems. In ICDE, 2009.
-
(2009)
ICDE
-
-
Zhou, W.1
Mao, Y.2
Loo, B.T.3
Abadi, M.4
|