Author:
Jeannin Jean-Baptiste,de Caso Guido,Chen Juan,Gurevich Yuri,Naldurg Prasad,Swamy Nikhil
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Abadi, M.: Access control in a core calculus of dependency. SIGPLAN Not. 41(9), 263–273 (2006)
2. Appel, A., Felten, E.: Proof-carrying authentication. In: CCS 1999, pp. 52–62. ACM (1999)
3. Becker, M., Fournet, C., Gordon, A.: SecPAL: Design and semantics of a decentralized authorization language. Journal of Computer Security 18(4), 619–665 (2010)
4. Beklemishev, L., Blass, A., Gurevich, Y.: What is the logic of information? (in preparation, 2012)
5. Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A.D., Maffeis, S.: Refinement types for secure implementations. In: CSF (2008)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Calculus for Flow-Limited Authorization;2016 IEEE 29th Computer Security Foundations Symposium (CSF);2016-06
2. Demo;Proceedings of the 2015 Workshop on Wireless of the Students, by the Students, & for the Students - S3 '15;2015
3. Secure distributed programming with value-dependent types;Journal of Functional Programming;2013-07
4. dkal ⋆ : Constructing Executable Specifications of Authorization Protocols;Lecture Notes in Computer Science;2013