llsec.bib

Abadi1998On-SDSIs-Linked
On {SDSI}'s Linked Local Name Spaces
Abadi, M.
  Journal of Computer Security  6  3--21  (1998)
http://www.soe.ucsc.edu/~abadi/Papers/naming-jcs.ps
Ellison1999SPKI-certificat
SPKI certificate theory
Ellison, C. M. and Frantz, B. and Lampson, B. and Rivest, R. and Thomas, B. and Ylonen, T.
        (1999)

Chander2001A-State-Transit
A State-Transition Model of Trust Management and Access Control
Chander, A. and Mitchell, J. C. and Dean, D.
CSFW      27-43  (2001)

Halpern2001A-Logic-for-SDS
A Logic for {SDSI}'s Linked Local Name Spaces
Halpern and van der Meyden
  Journal of Computer Security  9:1  47--74  (2001)

Jim2001SD3:-A-Trust-Ma
{SD3}: A Trust Management System with Certified Evaluation
Jim, T.
  sp  00  0106  (2001)

Li2002Design-of-a-Rol
Design of a Role-Based Trust-Management Framework
Li, N. and Mitchell, J. C. and Winsborough, W. H.
IEEE Symposium on Security and Privacy      114-130  (2002)

DeTreville2002Binder-a-Logic-
Binder, a Logic-Based Security Language
DeTreville, J.
Proceedings of the 2002 Symposium on Security and Privacy (S\&P'02)      105--113  (2002)

Halpern2003A-logical-recon
A logical reconstruction of {SPKI}
Halpern and van der Meyden
  Journal of Computer Security  11:4  581-614  (2003)

Li2003DATALOG-with-Co
DATALOG with Constraints: A Foundation for Trust Management Languages
Li, N. and Mitchell, J. C.
PADL '03: Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages      58--73  (2003)

Becker2004Cassandra:-Flex
Cassandra: Flexible trust management applied to health records
Becker, M. Y. and Sewell, P.
Proceedings of IEEE Computer Security Foundations Workshop      139 -- 154  (2004)

Li2005Beyond-proof-of
Beyond proof-of-compliance: security analysis in trust management
Li, N. and Mitchell, J. C. and Winsborough, W. H.
  J. ACM  52  474--514  (2005)

Li2006Understanding-S
Understanding SPKI/SDSI using first-order logic
Li, N. and Mitchell, J. C.
  Int. J. Inf. Sec.  5  48-64  (2006)
http://dx.doi.org/10.1007/s10207-005-0073-0
Pimlott2006Soutei-a-Logic-
Soutei, a Logic Based Trust-Management System
Pimlott, A. and Kiselyov, O.
Proceedings of the Eighth International Symposium on Functional and Logic Programming        (2006)

Becker07SecPAL
Design and Semantics of a Decentralized Authorization Language
Becker, M. Y. and Fournet, C. and Gordon, A. D.
Proceeding of the 20th IEEE Computer Security Foundations Symposium (CSF 2007)        (2007)
http://research.microsoft.com/~moritzb/docs/BeckerFournetGordon_AuthorizationLanguage.pdf