Author:
Sans Thierry,Cervesato Iliano,Hussein Soha
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Abadi, M., Fournet, C.: Access control based on execution history. In: The Internet Society, editor, Network and Distributed System Security Symposium, NDSS, San Diego, CA (2003)
2. Lecture Notes in Computer Science;M. Bartoletti,2009
3. Lecture Notes in Computer Science;M. Bartoletti,2005
4. Collinson, M., Pym, D.J.: Algebra and logic for resource-based systems modelling. Mathematical Structures in Computer Science 19(5) (2009)
5. Collinson, M., Pym, D.J.: Algebra and logic for access control. Formal Aspects of Computing 22(2) (2010)