-
2
-
-
35048879241
-
Design and semantics of a decentralized authorization language
-
M. Y. Becker, C. Fournet, and A. D. Gordon, "Design and semantics of a decentralized authorization language," in CSF. IEEE Computer Society, 2007, pp. 3-15.
-
(2007)
CSF. IEEE Computer Society
, pp. 3-15
-
-
Becker, M. Y.1
Fournet, C.2
Gordon, A. D.3
-
3
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
N. Li, B. N. Grosof, and J. Feigenbaum, "Delegation logic: A logic-based approach to distributed authorization," ACM Trans. Inf. Syst. Secur., vol. 6, no. 1, pp. 128-171, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B. N.2
Feigenbaum, J.3
-
4
-
-
37849037811
-
Dynamic event-based access control as term rewriting
-
S. Barker and G.-J. Ahn, Eds., Springer
-
C. Bertolissi, M. Fernández, and S. Barker, "Dynamic event-based access control as term rewriting," in DBSec, ser. Lecture Notes in Computer Science, S. Barker and G.-J. Ahn, Eds., vol. 4602. Springer, 2007, pp. 195-210.
-
(2007)
DBSec, ser. Lecture Notes in Computer Science
, vol.4602
, pp. 195-210
-
-
Bertolissi, C.1
Fernández, M.2
Barker, S.3
-
5
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. W. Lampson, M. Abadi, M. Burrows, and E. Wobber, "Authentication in distributed systems: Theory and practice," ACM Trans. Comput. Syst., vol. 10, no. 4, pp. 265-310, 1992.
-
(1992)
ACM Trans. Comput. Syst
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B. W.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
6
-
-
34548730877
-
A calculus for access control in distributed systems
-
J. Feigenbaum, Ed., Springer
-
M. Abadi, M. Burrows, B. W. Lampson, and G. D. Plotkin, "A calculus for access control in distributed systems," in CRYPTO, ser. Lecture Notes in Computer Science, J. Feigenbaum, Ed., vol. 576. Springer, 1991, pp. 1-23.
-
(1991)
CRYPTO, ser. Lecture Notes in Computer Science
, vol.576
, pp. 1-23
-
-
Abadi, M.1
Burrows, M.2
Lampson, B. W.3
Plotkin, G. D.4
-
8
-
-
33847791903
-
Access control in a core calculus of dependency
-
M. Abadi, "Access control in a core calculus of dependency," Electr. Notes Theor. Comput. Sci., vol. 172, pp. 5-31, 2007.
-
(2007)
Electr. Notes Theor. Comput. Sci
, vol.172
, pp. 5-31
-
-
Abadi, M.1
-
9
-
-
48949085268
-
Variations in access control logic
-
R. van der Meyden and L. van der Torre, Eds., Springer
-
M. Abadi, "Variations in access control logic," in DEON, ser. Lecture Notes in Computer Science, R. van der Meyden and L. van der Torre, Eds., vol. 5076. Springer, 2008, pp. 96-109.
-
(2008)
DEON, ser. Lecture Notes in Computer Science
, vol.5076
, pp. 96-109
-
-
Abadi, M.1
-
10
-
-
17544394392
-
Computer security in the real world
-
B. W. Lampson, "Computer security in the real world," IEEE Computer, vol. 37, no. 6, pp. 37-46, 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B. W.1
-
11
-
-
0016555241
-
The protection of information in computer systems
-
M. D. Schroeder and J. H. Saltzer, "The protection of information in computer systems," Procs. IEEE 63, vol. 9, pp. 1278-1308, 1975.
-
(1975)
Procs. IEEE 63
, vol.9
, pp. 1278-1308
-
-
Schroeder, M. D.1
Saltzer, J. H.2
-
12
-
-
85174632576
-
Spki certificate theory
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, "Spki certificate theory," IETF RFC 2693, 2009.
-
(2009)
IETF RFC 2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
14
-
-
0031382488
-
Reconciling role based management and role based access control
-
E. Lupu and M. Sloman, "Reconciling role based management and role based access control," in ACM Workshop on Role-Based Access Control, 1997, pp. 135-141.
-
(1997)
ACM Workshop on Role-Based Access Control
, pp. 135-141
-
-
Lupu, E.1
Sloman, M.2
-
15
-
-
33646123997
-
A modal logic for role-based access control
-
Gorodetsky, I. Kotenko, and A. Skormin, Eds., Springer
-
T. Kosiyatrakul, S. Older, and S.-K. Chin, "A modal logic for role-based access control," in MMM-ACNS, ser. Lecture Notes in Computer Science, V. Gorodetsky, I. V. Kotenko, and V. A. Skormin, Eds., vol. 3685. Springer, 2005, pp. 179-193.
-
(2005)
MMM-ACNS, ser. Lecture Notes in Computer Science
, vol.3685
, pp. 179-193
-
-
Kosiyatrakul, T.1
Older, S.2
Chin, S.-K.3
|