메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 170-184

Type-based distributed access control

Author keywords

Access control; Communication system control; Communication system security; Computer networks; Computer science; Cryptography; Data security; Distributed control; Dynamic programming; Middleware

Indexed keywords

COMPUTER CONTROL SYSTEMS; COMPUTER NETWORKS; COMPUTER PROGRAMMING; COMPUTER SCIENCE; COMPUTER SYSTEMS PROGRAMMING; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; DISTRIBUTED PARAMETER CONTROL SYSTEMS; DYNAMIC PROGRAMMING; MIDDLEWARE; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84942244044     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2003.1212712     Document Type: Conference Paper
Times cited : (29)

References (37)
  • 6
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • January
    • M. Abadi and A. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, January 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 7
    • 0026684778 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • Also appeared as SRC Research Report
    • M. Abadi, B. Lampson, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst., 10(4):265-310, 1992. Also appeared as SRC Research Report 83.
    • (1992) ACM Trans. Comput. Syst. , vol.10 , Issue.4 , pp. 265-310
    • Abadi, M.1    Lampson, B.2    Burrows, M.3    Wobber, E.4
  • 8
    • 0028380781 scopus 로고
    • Authentication in the Taos operating system
    • Also appeared as SRC Research Report
    • M. Abadi, E. Wobber, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3-32, 1994. Also appeared as SRC Research Report 117.
    • (1994) ACM Transactions on Computer Systems , vol.12 , Issue.1 , pp. 3-32
    • Abadi, M.1    Wobber, E.2    Burrows, M.3    Lampson, B.4
  • 10
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems security
    • J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Springer-Verlag
    • M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The role of trust management in distributed systems security. In J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Distributed and Mobile Objects, volume 1603 of Lecture Notes in Computer Science. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1603
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 13
    • 16244416053 scopus 로고    scopus 로고
    • A calculus of secure mobile computations
    • Internet Programming Languages, Springer-Verlag
    • G. Castagna and J. Vitek. A calculus of secure mobile computations. In Internet Programming Languages, Lecture Notes in Computer Science. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science
    • Castagna, G.1    Vitek, J.2
  • 20
    • 84983001862 scopus 로고    scopus 로고
    • Type-safe execution of mobile agents in anonymous networks
    • Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Springer-Verlag
    • M. Hennessy and J. Riely. Type-safe execution of mobile agents in anonymous networks. In Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Lecture Notes in Computer Science. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science
    • Hennessy, M.1    Riely, J.2
  • 21
    • 35248840989 scopus 로고    scopus 로고
    • Handling encryption in an analysis for secure information flow
    • P. Laud. Handling encryption in an analysis for secure information flow. In European Symposium on Programming, pages 159-173, 2003.
    • (2003) European Symposium on Programming , pp. 159-173
    • Laud, P.1
  • 23
    • 0001425265 scopus 로고    scopus 로고
    • From System F to typed assembly language
    • G. Morrisett, D. Walker, K. Crary, and N. Glew. From System F to typed assembly language. ACM TOPLAS, 21(3):528-569, 1999.
    • (1999) ACM TOPLAS , vol.21 , Issue.3 , pp. 528-569
    • Morrisett, G.1    Walker, D.2    Crary, K.3    Glew, N.4
  • 33
    • 0019658399 scopus 로고
    • Access flow: A protection model which integrates access control and information flow
    • A. Stoughton. Access flow: A protection model which integrates access control and information flow. IEEE Symposium on Security and Privacy, pages 9-18, 1981.
    • (1981) IEEE Symposium on Security and Privacy , pp. 9-18
    • Stoughton, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.