Soutei, a Logic-Based Trust-Management System System Description

by Andrew Pimlott , Oleg Kiselyov
Citations:3 - 0 self

Documents Related by Co-Citation

352 A Calculus for Access Control in Distributed Systems – M. Abadi, M. Burrows, B. Lampson, G. Plotkin, J. Kohl, C. Neuman, J. Steiner - 1991
55 Non-Interference in Constructive Authorization Logic – Deepak Garg, Frank Pfenning - 2006
64 Device-Enabled Authorization in the Grey System – Lujo Bauer, Scott Garriss, Jonathan M. Mccune, Michael K. Reiter, Jason Rouse, Peter Rutenbar - 2005
47 Access Control for the Web via Proof-Carrying Authorization – Ljudevit Bauer - 2003
19 K.: Nexus authorization logic (nal): Design rationale and applications – E G Sire, F Schneider, Walsh
3 Trusted Computer Security Evaluation Criteria – DEPARTMENT OF DEFENSE - 1985
37 End-to-End Authorization – Jon Howell, David Kotz
15 Nexus: A new operating system for trustworthy computing – Alan Shieh, Dan Williams, Emin Gün, Sirer Fred, B. Schneider - 2005
12 Naming and Sharing Resources across Administrative Boundaries – Jonathan R. Howell, Robert Gray, Doug Mcilroy, Margo Seltzer, Roger Sloboda, For Andy - 2000
57 Design and Implementation of a Distributed Virtual Machine for Networked Computers – Emin Gün Sirer, Robert Grimm, Arthur J. Gregory, Brian N. Bershad - 1999
72 Distributed proving in access-control systems – Lujo Bauer, Scott Garriss, Michael K. Reiter - 2005
35 Certified in-lined reference monitoring on .net – K W Hamlen, G Morrisett, F B Schneider - 2006
8 System description: Twelf—a meta-logical framework for deductive systems – Frank Pfenning, Carsten Schürmann - 1999
25 K.: A user study of policy creation in a flexible access-control system – Lujo Bauer, Lorrie Faith, Cranor Robert, W. Reeder, Michael K. Reiter, Kami Vaniea
182 KeyNote: Trust Management for Public-Key Infrastructures – Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis - 1998
7 Policy-based Access Control for Weakly Consistent Replication – Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry - 2009
1097 Proof-Carrying Code – George C. Necula - 1997
553 A Lattice Model of Secure Information Flow – Dorothy E. Denning - 1976
1080 Lattice-Based Access Control Models – Ravi S. Sandhu - 1993