Author:
van Doorn Leendert,Abadi Martín,Burrows Mike,Wobber Edward
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Jean Bacon, Richard Hayton, Sai Lai Lo, and Ken Moody. Extensible access control for a hierarchy of servers. ACM Operating Systems Review, 28(3):4–15, July 1994.
2. Andrew Birrell, Greg Nelson, Susan Owicki, and Edward Wobber. Network objects. Software Practice and Experience, S4(25):87–130, December 1995.
3. Luca Cardelli. A language with distributed scope. Computing Systems, 8(1):27–59, January 1995.
4. W.R. Cheswick. An evening with Berferd, in which a hacker is lured, endured, and studied. In Proceedings of the Usenix Winter’ 92 Conference, 1992.
5. R.H. Deng, S.K. Bhonsle, W. Wang, and A.A. Lazar. Integrating security in CORBA based object architectures. In Proceedings of the 1995 IEEE Symposium on Security and Privacy, pages 50–61, May 1995.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. AnBx - Security Protocols Design and Verification;Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security;2010