Proof-Carrying Authentication (1999)

Cached

Download Links

by Andrew W. Appel , Edward W. Felten
Venue:In Proceedings of the 6th ACM Conference on Computer and Communications Security
Citations:179 - 6 self

Active Bibliography

Cooperative Policy Control for Peer-to-Peer Data Distribution – Eric Anderson - 2005
20 Alpaca: extensible authorization for distributed services – Chris Lesniewski-laas, Bryan Ford, Jacob Strauss, Robert Morris, M. Frans Kaashoek - 2007
47 Access Control for the Web via Proof-Carrying Authorization – Ljudevit Bauer - 2003
198 Delegation Logic: A Logic-based Approach to Distributed Authorization – Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum - 2000
20 Distributed programming with distributed authorization ∗ – Kumar Avijit, Anupam Datta, Robert Harper
90 Logic in Access Control – Martίn Abadi - 2003
Typed Intermediate Languages – Stephen Tse, Stephen Tse
28 Language-Based Security – Dexter Kozen - 1999
55 Semantics of Types for Mutable State – Amal Jamil Ahmed - 2004
Project Description – We Propose To
5 A Metalogical Approach to Foundational Certified Code – Karl Crary, Susmit Sarkar - 2003
2 Automated Techniques for Provably Safe Mobile Code – Karl Crary , Robert Harper, Peter Lee, Frank Pfenning - 2000
Lightweight Lemmas in λProlog (Extended Version) – Andrew W. Appel, Amy P. Felty - 1999
229 Foundational Proof-Carrying Code – Andrew W. Appel - 2001
2 Lightweight Lemmas in λ Prolog – Andrew W. Appel, Amy P. Felty - 1999
64 Device-Enabled Authorization in the Grey System – Lujo Bauer, Scott Garriss, Jonathan M. Mccune, Michael K. Reiter, Jason Rouse, Peter Rutenbar - 2005
5 Constraining Credential Usage in Logic-Based Access Control – Lujo Bauer, Limin Jia, Divya Sharma
Southwestern Bell – Carl M. Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, Tatu Ylonen - 1997
8 Reasoning about public-key certification - on bindings between entities and public keys – Reto Kohlas, Ueli Maurer - 2000