## A linear logic of authorization and knowledge (2006)

### Cached

### Download Links

- [www.cs.cmu.edu]
- [www.cs.cmu.edu]
- [www.mpi-sws.org]
- [www.cs.cmu.edu]
- [www.cs.cmu.edu]
- [www.ece.cmu.edu]
- [www.mpi-sws.org]
- [www.cs.cmu.edu]
- [www.ece.cmu.edu]
- [www-2.cs.cmu.edu]
- [www.lb.cs.cmu.edu]
- [www-cgi.cs.cmu.edu]
- [www-cgi.cs.cmu.edu.]
- [www-cgi.cs.cmu.edu]
- [www.cs.cmu.edu]
- [www.cs.cmu.edu]
- [www-cgi.cs.cmu.edu]
- [www.cs.cmu.edu]
- [www.cs.cmu.edu]
- [www.cs.cmu.edu]
- [www-2.cs.cmu.edu]
- [www-cgi.cs.cmu.edu]
- [www-cgi.cs.cmu.edu]
- [www-cgi.cs.cmu.edu]
- [www.ece.cmu.edu]
- [www.ece.cmu.edu]
- [www.rsasecurity.com]
- [users.ece.cmu.edu]
- [www.cs.unc.edu]
- DBLP

### Other Repositories/Bibliography

by
Deepak Garg
,
Lujo Bauer
,
Kevin D. Bowers
,
Frank Pfenning
,
Michael K. Reiter

Venue: | In Proceedings of the 11th European Symposium on Research in Computer Security |

Citations: | 21 - 2 self |