Proof-Carrying Authentication (1999)

Cached

Download Links

by Andrew W. Appel , Edward W. Felten
Venue:In Proceedings of the 6th ACM Conference on Computer and Communications Security
Citations:173 - 6 self

Active Bibliography

Cooperative Policy Control for Peer-to-Peer Data Distribution – Eric Anderson - 2005
20 Alpaca: extensible authorization for distributed services – Chris Lesniewski-laas, Bryan Ford, Jacob Strauss, Robert Morris, M. Frans Kaashoek - 2007
44 Access Control for the Web via Proof-Carrying Authorization – Ljudevit Bauer - 2003
200 Delegation Logic: A Logic-based Approach to Distributed Authorization – Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum - 2000
86 Logic in Access Control – Martίn Abadi - 2003
28 Language-Based Security – Dexter Kozen - 1999
Typed Intermediate Languages – Stephen Tse, Stephen Tse
55 Semantics of Types for Mutable State – Amal Jamil Ahmed - 2004
Project Description – We Propose To
5 A Metalogical Approach to Foundational Certified Code – Karl Crary, Susmit Sarkar - 2003
2 Automated Techniques for Provably Safe Mobile Code – Karl Crary , Robert Harper, Peter Lee, Frank Pfenning - 2000
Lightweight Lemmas in λProlog (Extended Version) – Andrew W. Appel, Amy P. Felty - 1999
2 Lightweight Lemmas in λ Prolog – Andrew W. Appel, Amy P. Felty - 1999
228 Foundational Proof-Carrying Code – Andrew W. Appel - 2001
5 Constraining Credential Usage in Logic-Based Access Control – Lujo Bauer, Limin Jia, Divya Sharma
60 Device-Enabled Authorization in the Grey System – Lujo Bauer, Scott Garriss, Jonathan M. Mccune, Michael K. Reiter, Jason Rouse, Peter Rutenbar - 2005
25 Access Control to Information in Pervasive Computing Environments – Urs Hengartner, Peter Steenkiste - 2003
Southwestern Bell – Carl M. Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, Tatu Ylonen - 1997
1 A SURVEY ON TRUST MANAGEMENT LANGUAGES – Nicola Zannone - 2004