llsec.bib

Lampson1992Authentication-
Authentication in Distributed Systems: Theory and Practice
Lampson, B. W. and Abadi, M. and Burrows, M. and Wobber, E.
  ACM Trans. Comput. Syst.  10  265-310  (1992)
http://doi.acm.org/10.1145/138873.138874
Abadi1993A-Calculus-for-
A Calculus for Access Control in Distributed Systems
Abadi, M. and Burrows, M. and Lampson, B. W. and Plotkin, G. D.
  ACM Trans. Program. Lang. Syst.  15  706-734  (1993)
http://doi.acm.org/10.1145/155183.155225
Jajodia1997A-Logical-Langu
A Logical Language for Expressing Authorizations
Jajodia, S. and Samarati, P. and Subrahmanian, V. S.
SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy      31  (1997)

Abadi1999A-Core-Calculus
A Core Calculus Of Dependency
Abadi, M. and Banerjee, A. and Heintze, N. and Riecke, J. G.
Conference Record of the 26th Sympoisum on Principles Of Programming Languages (POPL'99)      147--160  (1999)
http://dx.doi.org/10.1016/j.entcs.2007.02.002
Appel1999Proof-Carrying-
Proof-Carrying Authentication
Appel, A. W. and Felten, E. W.
Proceedings of the 6th Conference on Computer and Communications Security      52--62  (1999)
http://doi.acm.org/10.1145/319709.319718
Crampton2001A-Logic-of-Acce
A Logic of Access Control
Crampton, J. and Loizou, G. and Shea, G. O.
  The Computer Journal  44  137--149  (2001)
http://comjnl.oxfordjournals.org/cgi/reprint/44/1/54
Bauer2002A-General-and-F
A General and Flexible Access-Control System for the Web
Bauer, L. and Schneider, M. A. and Felten, E. W.
Proceedings of the 11th {USENIX} Security Symposium        (2002)
http://www.usenix.org/publications/library/proceedings/sec02/bauer.html
Bertino2003A-logical-frame
A logical framework for reasoning about access control models
Bertino, E. and Catania, B. and Ferrari, E. and Perlasca, P.
  ACM Trans. Inf. Syst. Secur.  6  71-127  (2003)
http://doi.acm.org/10.1145/605434.605437
Bertino2003A-logical-frame
A logical framework for reasoning about access control models
Bertino, E. and Catania, B. and Ferrari, E. and Perlasca, P.
  ACM Trans. Inf. Syst. Secur.  6  71--127  (2003)

Halpern2003Using-First-Ord
Using First-Order Logic to Reason about Policies
Halpern, J. Y. and Weissman, V.
CSFW      187-201  (2003)
http://www.cs.cornell.edu/home/halpern/papers/vicky.pdf
Li2003Delegation-logi
Delegation logic: A logic-based approach to distributed authorization
Li, N. and Grosof, B. N. and Feigenbaum, J.
  ACM Trans. Inf. Syst. Secur.  6  128--171  (2003)
http://doi.acm.org/10.1145/605434.605438
Bauer2003Access-Control-
Access Control for the Web via Proof-Carrying Authorization
Bauer, L.
        (2003)
http://www.ece.cmu.edu/~lbauer/papers/thesis.pdf
Whitehead2004By-Reason-and-A
By Reason and Authority: A System for Authorization of Proof-Carrying Code
Whitehead, N. and Abadi, M. and Necula, G. C.
CSFW      236-250  (2004)
http://doi.ieeecomputersociety.org/10.1109/CSFW.2004.6
Fournet2005A-Type-Discipli
A Type Discipline for Authorization Policies
Fournet, C. and Gordon, A. D. and Maffeis, S.
ESOP      141-156  (2005)
http://research.microsoft.com/~adg/Publications/MSR-TR-2005-01.pdf
Bauer2005Distributed-Pro
Distributed Proving in Access-Control Systems
Bauer, L. and Garriss, S. and Reiter, M. K.
Proceedings of the 2005 Symposium on Security and Privacy (S\&P'05)      81--95  (2005)
http://www.ece.cmu.edu/~lbauer/papers/2005/sp2005-distributed-proving.pdf
Bauer2005Device-Enabled-
Device-Enabled Authorization in the {G}rey System
Bauer, L. and Garriss, S. and McCune, J. M. and Reiter, M. K. and Rouse, J. and Rutenbar, P.
Proceedings of the 8th Information Security Conference (ISC'05)      431--445  (2005)
http://www.ece.cmu.edu/~lbauer/papers/2005/isc2005-grey.pdf
Chaudhuri2006Secrecy-by-Typi
Secrecy by Typing and File-Access Control
Chaudhuri, A. and Abadi, M.
CSFW      112-123  (2006)
http://www.soe.ucsc.edu/~abadi/Papers/sectypfs.pdf
Garg2006A-Linear-Logic-
A Linear Logic of Authorization and Knowledge
Garg, D. and Pfenning, F.
Proceedings of the 11th European Symposium on Computer Security ({ESORICS})        (2006)
http://dx.doi.org/10.1007/11863908_19
Garg2006Non-interferenc
Non-interference in Constructive Authorization Logic
Garg, D. and Pfenning, F.
Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW 19)        (2006)
http://www.cs.cmu.edu/~dg/papers/csfw06.pdf
Abadi2007Access-Control-
Access Control in a Core Calculus of Dependency
Abadi, M.
  Electr. Notes Theor. Comput. Sci.  172  5-31  (2007)
http://www.sciencedirect.com/science?_ob=MImg&_imagekey=B75H1-4N7RX2N-2-1&_cdi=13109&_user=10&_orig=search&_coverDate=04%2F01%2F2007&_sk=998279999&view=c&wchp=dGLbVtb-zSkWW&md5=a41c83f58f901e8d6f49ff6be46ff237&ie=/sdarticle.pdf
Bauer2007Consumable-Cred
Consumable Credentials in Logic-Based Access Control
Bauer, L. and Bowers, K. D. and Pfenning, F. and Reiter, M. K.
Proceedings of the 14th Annual Network & Distributed System Security Symposium (NDSS 2007)        (2007)
http://www.ece.cmu.edu/~lbauer/papers/2007/ndss2007-consumable.pdf
Wobber2007Authorizing-app
Authorizing applications in singularity
Wobber, T. and Yumerefendi, A. and Abadi, M. and Birrell, A. and Simon, D. R.
EuroSys '07: Proceedings of the 2007 conference on EuroSys      355--368  (2007)
http://doi.acm.org/10.1145/1272996.1273033