-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Trans, on Programming Languages and Systems, 15(4):706-734, 1993.
-
(1993)
ACM Trans, on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
0029697680
-
A security policy model for clinical information systems
-
IEEE Press
-
R. Anderson. A security policy model for clinical information systems. In Proc. of the Symp. on Security and Privacy. IEEE Press, 1996.
-
(1996)
Proc. of the Symp. on Security and Privacy
-
-
Anderson, R.1
-
3
-
-
0343543130
-
Free variable tableaux for propositional modal logics
-
LNAI. Springer-Verlag, To appear
-
B. Beckert and R. Gore. Free variable tableaux for propositional modal logics. In Proc. of TABLEAUX-97, LNAI. Springer-Verlag, 1997. To appear.
-
(1997)
Proc. of TABLEAUX-97
-
-
Beckert, B.1
Gore, R.2
-
6
-
-
0025386404
-
A logic for authentication
-
Also as research report SRC-39, DEC - System Research Center, 1989
-
M. Burrows, M. Abadi, and R. Needham. A logic for authentication. ACM Trans, on Comp. Sys., 8(1):18-36, 1990. Also as research report SRC-39, DEC - System Research Center, 1989.
-
(1990)
ACM Trans, on Comp. Sys.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
IEEE Press
-
D. Clark and D. Wilson. A comparison of commercial and military computer security policies. In Proc. of the Symp. on Security and Privacy, pp. 184-194. IEEE Press, 1987.
-
(1987)
Proc. of the Symp. on Security and Privacy
, pp. 184-194
-
-
Clark, D.1
Wilson, D.2
-
9
-
-
84856002183
-
Tableaux and algorithms for propositional dynamic logic with converse
-
, LNAI 1104, pp. , . Springer-Verlag
-
G. De Giacomo and F. Massacci. Tableaux and algorithms for propositional dynamic logic with converse. In Proc. of the 13th Int. Conf. on Automated Deduction (CADE-96), LNAI 1104, pp. 613-628. Springer-Verlag, 1996.
-
(1996)
Proc. of the 13Th Int. Conf. on Automated Deduction (CADE-96)
, pp. 613-628
-
-
De Giacomo, G.1
Massacci, F.2
-
17
-
-
0026853865
-
A guide to completeness and complexity for modal logics of knowledge and belief
-
J. Halpern and Y. Moses. A guide to completeness and complexity for modal logics of knowledge and belief. Artificial Intelligence, 54:319-379, 1992.
-
(1992)
Artificial Intelligence
, vol.54
, pp. 319-379
-
-
Halpern, J.1
Moses, Y.2
-
18
-
-
0016984825
-
Protection in operating systems
-
M. Harrison, W. Ruzzo, and J. Ullman. Protection in operating systems. Comm, of the ACM, 19(8):461-471, 1976.
-
(1976)
Comm, of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
19
-
-
84979103541
-
Law and logic
-
S. Kanger. Law and logic. Theoria, 38(3):105-132, 1972.
-
(1972)
Theoria
, vol.38
, Issue.3
, pp. 105-132
-
-
Kanger, S.1
-
22
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Trans, on Computer Systems, 10(4):265-310, 1992.
-
(1992)
ACM Trans, on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
23
-
-
85026906242
-
Strongly analytic tableaux for normal modal logics
-
LNAI 814, Springer Verlag
-
F. Massacci. Strongly analytic tableaux for normal modal logics. In Proc. of the Int. Conf. on Automated Deduction (CADE-94), LNAI 814, pp. 723-737. Springer Verlag, 1994.
-
(1994)
Proc. of the Int. Conf. on Automated Deduction (CADE-94)
, pp. 723-737
-
-
Massacci, F.1
-
24
-
-
84947814376
-
Tableaux methods for access control in distributed systems
-
LNAI. Springer-Verlag, To appear
-
F. Massacci. Tableaux methods for access control in distributed systems. In Proc. of TABLEAUX-97, LNAI. Springer-Verlag, 1997. To appear.
-
(1997)
Proc. of TABLEAUX-97
-
-
Massacci, F.1
-
26
-
-
0030086382
-
Role-based access controls models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access controls models. IEEE Computer, 29(2), February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
29
-
-
0026153654
-
The use of logic in the analysis of cryptographic protocols
-
IEEE Press
-
P. Syverson. The use of logic in the analysis of cryptographic protocols. In Proc. of the Symp. on Security and Privacy, pp. 156-170. IEEE Press, 1991.
-
(1991)
Proc. of the Symp. on Security and Privacy
, pp. 156-170
-
-
Syverson, P.1
|