Type-based distributed access control
暂无分享,去创建一个
[1] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[2] Benjamin C. Pierce,et al. Logical relations for encryption , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[3] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[4] Andrew C. Myers,et al. Robust declassification , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[5] Martín Abadi,et al. A calculus for access control in distributed systems , 1991, TOPL.
[6] Martín Abadi,et al. Secure communications processing for distributed languages , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[7] Martín Abadi,et al. Secrecy by Typing inSecurity Protocols , 1997, TACS.
[8] Butler W. Lampson,et al. Simple Public Key Certificate , 1998 .
[9] Martín Abadi,et al. Authentication in the Taos operating system , 1993, SOSP '93.
[10] Martín Abadi,et al. Authentication in distributed systems: theory and practice , 1991, SOSP '91.
[11] Jan Vitek,et al. Secure composition of untrusted code: box π, wrappers, and causality types , 2003 .
[12] Peeter Laud,et al. Handling Encryption in an Analysis for Secure Information Flow , 2003, ESOP.
[13] Martín Abadi,et al. Secrecy by typing in security protocols , 1999, JACM.
[14] Martín Abadi,et al. Access Control Based on Execution History , 2003, NDSS.
[15] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[16] Andrew C. Myers,et al. Complete, safe information flow with decentralized labels , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[17] Dominic Duggan. Cryptographic types , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[18] Andrew C. Myers,et al. Untrusted hosts and confidentiality: secure program partitioning , 2001, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[19] John C. Mitchell,et al. Abstract types have existential types , 1985, POPL.
[20] Geoffrey Smith,et al. A Type-Based Approach to Program Security , 1997, TAPSOFT.
[21] Andrew D. Gordon,et al. Authenticity by typing for security protocols , 2003 .
[22] Alley Stoughton. Access Flow: A Protection Model which Integrates Access Control and Information Flow , 1981, 1981 IEEE Symposium on Security and Privacy.
[23] Martín Abadi,et al. Authentication in the Taos operating system , 1994, TOCS.
[24] Luca Cardelli,et al. Secrecy and group creation , 2005, Inf. Comput..
[25] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[26] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.
[27] Martín Abadi,et al. Authentication primitives and their compilation , 2000, POPL '00.
[28] John C. Mitchell,et al. Abstract types have existential type , 1988, TOPL.
[29] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[30] Jan Vitek,et al. A Calculus of Secure Mobile Computations ( Preliminary Report ) , 1998 .
[31] George C. Necula,et al. Safe kernel extensions without run-time checking , 1996, OSDI '96.
[32] Martín Abadi,et al. A Top-Down Look at a Secure Message , 1999, FSTTCS.
[33] James Riely,et al. Trust and partial typing in open systems of mobile agents , 1999, POPL '99.
[34] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[35] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[36] Jan Vitek,et al. Secure composition of untrusted code: wrappers and causality types , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[37] James Riely,et al. Type-Safe Execution of Mobile Agents in Anonymous Networks , 1998, ECOOP Workshops.
[38] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[39] Andrew D. Gordon,et al. Types and effects for asymmetric cryptographic protocols , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[40] Bruno Blanchet,et al. From Secrecy to Authenticity in Security Protocols , 2002, SAS.
[41] Sylvain Conchon,et al. Information flow inference for free , 2000, ICFP '00.
[42] François Pottier. A simple view of type-secure information flow in the /spl pi/-calculus , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.