Adding algebraic rewriting to the untyped lambda calculus (extended abstract)
RTA-91 Proceedings of the 4th international conference on Rewriting techniques and applications
A gentle introduction to Haskell
ACM SIGPLAN Notices - Haskell special issue
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Role-Based Access Control Models
Computer
Intersection type assignment systems with higher-order algebraic rewriting
Theoretical Computer Science
The definition of extended ML: a gentle introduction
Theoretical Computer Science - Special issue: algebraic development techniques
Term rewriting and all that
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Intelligent Database Systems
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Policy algebras for access control the predicate case
Proceedings of the 9th ACM conference on Computer and communications security
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
Combining First and Higher Order Rewrite Systems with Type Assignment Systems
TLCA '93 Proceedings of the International Conference on Typed Lambda Calculi and Applications
Jakarta: A Toolset for Reasoning about JavaCard
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
Protocol Analysis in Intrusion Detection Using Decision Tree
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Security policy in a declarative style
PPDP '05 Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming
Proceedings of the 12th ACM symposium on Access control models and technologies
Rewriting-Based Access Control Policies
Electronic Notes in Theoretical Computer Science (ENTCS)
A rewriting framework for the composition of access control policies
Proceedings of the 10th international ACM SIGPLAN conference on Principles and practice of declarative programming
RTA'03 Proceedings of the 14th international conference on Rewriting techniques and applications
Dynamic event-based access control as term rewriting
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Term rewriting for access control
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Specifying and reasoning about dynamic access-control policies
IJCAR'06 Proceedings of the Third international joint conference on Automated Reasoning
Rewrite specifications of access control policies in distributed environments
STM'10 Proceedings of the 6th international conference on Security and trust management
Automated analysis of rule-based access control policies
PLPV '13 Proceedings of the 7th workshop on Programming languages meets program verification
Hi-index | 0.00 |
We propose an event-based access control model, called Distributed-DEBAC, that takes into account the behaviour of distributed systems. Distributed-DEBAC policies are specified using an algebraic-functional framework. The declarative nature of the model facilitates the analysis of policies, and direct implementations for access control checking even when resources and information are widely dispersed. We give examples of application.