메뉴 건너뛰기




Volumn 9121, Issue , 2009, Pages

FSL - Fibred Security Language

Author keywords

[No Author keywords available]

Indexed keywords

FREE VARIABLE; PROGRAM COMMITTEE;

EID: 84928602048     PISSN: 18624405     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (15)
  • 3
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • N. Li, B. N. Grosof, and J. Feigenbaum, "Delegation logic: A logic-based approach to distributed authorization," ACM Trans. Inf. Syst. Secur., vol. 6, no. 1, pp. 128-171, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B. N.2    Feigenbaum, J.3
  • 4
    • 37849037811 scopus 로고    scopus 로고
    • Dynamic event-based access control as term rewriting
    • S. Barker and G.-J. Ahn, Eds., Springer
    • C. Bertolissi, M. Fernández, and S. Barker, "Dynamic event-based access control as term rewriting," in DBSec, ser. Lecture Notes in Computer Science, S. Barker and G.-J. Ahn, Eds., vol. 4602. Springer, 2007, pp. 195-210.
    • (2007) DBSec, ser. Lecture Notes in Computer Science , vol.4602 , pp. 195-210
    • Bertolissi, C.1    Fernández, M.2    Barker, S.3
  • 5
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • B. W. Lampson, M. Abadi, M. Burrows, and E. Wobber, "Authentication in distributed systems: Theory and practice," ACM Trans. Comput. Syst., vol. 10, no. 4, pp. 265-310, 1992.
    • (1992) ACM Trans. Comput. Syst , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B. W.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 8
    • 33847791903 scopus 로고    scopus 로고
    • Access control in a core calculus of dependency
    • M. Abadi, "Access control in a core calculus of dependency," Electr. Notes Theor. Comput. Sci., vol. 172, pp. 5-31, 2007.
    • (2007) Electr. Notes Theor. Comput. Sci , vol.172 , pp. 5-31
    • Abadi, M.1
  • 9
    • 48949085268 scopus 로고    scopus 로고
    • Variations in access control logic
    • R. van der Meyden and L. van der Torre, Eds., Springer
    • M. Abadi, "Variations in access control logic," in DEON, ser. Lecture Notes in Computer Science, R. van der Meyden and L. van der Torre, Eds., vol. 5076. Springer, 2008, pp. 96-109.
    • (2008) DEON, ser. Lecture Notes in Computer Science , vol.5076 , pp. 96-109
    • Abadi, M.1
  • 10
    • 17544394392 scopus 로고    scopus 로고
    • Computer security in the real world
    • B. W. Lampson, "Computer security in the real world," IEEE Computer, vol. 37, no. 6, pp. 37-46, 2004.
    • (2004) IEEE Computer , vol.37 , Issue.6 , pp. 37-46
    • Lampson, B. W.1
  • 11
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • M. D. Schroeder and J. H. Saltzer, "The protection of information in computer systems," Procs. IEEE 63, vol. 9, pp. 1278-1308, 1975.
    • (1975) Procs. IEEE 63 , vol.9 , pp. 1278-1308
    • Schroeder, M. D.1    Saltzer, J. H.2
  • 14
    • 0031382488 scopus 로고    scopus 로고
    • Reconciling role based management and role based access control
    • E. Lupu and M. Sloman, "Reconciling role based management and role based access control," in ACM Workshop on Role-Based Access Control, 1997, pp. 135-141.
    • (1997) ACM Workshop on Role-Based Access Control , pp. 135-141
    • Lupu, E.1    Sloman, M.2
  • 15
    • 33646123997 scopus 로고    scopus 로고
    • A modal logic for role-based access control
    • Gorodetsky, I. Kotenko, and A. Skormin, Eds., Springer
    • T. Kosiyatrakul, S. Older, and S.-K. Chin, "A modal logic for role-based access control," in MMM-ACNS, ser. Lecture Notes in Computer Science, V. Gorodetsky, I. V. Kotenko, and V. A. Skormin, Eds., vol. 3685. Springer, 2005, pp. 179-193.
    • (2005) MMM-ACNS, ser. Lecture Notes in Computer Science , vol.3685 , pp. 179-193
    • Kosiyatrakul, T.1    Older, S.2    Chin, S.-K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.