A Theory of Communicating Sequential Processes
Journal of the ACM (JACM)
A process algebra for timed systems
Information and Computation
Trust and accountability: preserving human values in interactional experience
CHI 98 Cconference Summary on Human Factors in Computing Systems
Accountable certificate management using undeniable attestations
Proceedings of the 7th ACM conference on Computer and communications security
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the second Nordic conference on Human-computer interaction
Alternating-time temporal logic
Journal of the ACM (JACM)
Secure History Preservation Through Timeline Entanglement
Proceedings of the 11th USENIX Security Symposium
Persistent Authenticated Dictionaries and Their Applications
ISC '01 Proceedings of the 4th International Conference on Information Security
Role-Based Access Control
Computer Security in the Real World
Computer
An Audit Logic for Accountability
POLICY '05 Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
Trust but verify: accountability for network services
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Audit-based compliance control
International Journal of Information Security
Access control in a world of software diversity
HOTOS'05 Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10
A posteriori compliance control
Proceedings of the 12th ACM symposium on Access control models and technologies
Privacy and Utility in Business Processes
CSF '07 Proceedings of the 20th IEEE Computer Security Foundations Symposium
Strong accountability for network storage
ACM Transactions on Storage (TOS)
PeerReview: practical accountability for distributed systems
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Machine-assisted election auditing
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
CSF '08 Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
Accountable internet protocol (aip)
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
TAPIDO: trust and authorization via provenance and integrity in distributed objects
ESOP'08/ETAPS'08 Proceedings of the Theory and practice of software, 17th European conference on Programming languages and systems
A formal implementation of value commitment
ESOP'08/ETAPS'08 Proceedings of the Theory and practice of software, 17th European conference on Programming languages and systems
A type discipline for authorization policies
ESOP'05 Proceedings of the 14th European conference on Programming Languages and Systems
Accountability: definition and relationship to verifiability
Proceedings of the 17th ACM conference on Computer and communications security
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies
Towards a formal model of accountability
Proceedings of the 2011 workshop on New security paradigms workshop
Understanding and protecting privacy: formal semantics and principled audit mechanisms
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Agent-based accountable grid computing systems
The Journal of Supercomputing
Accountability and deterrence in online life
Proceedings of the 3rd International Web Science Conference
Hi-index | 0.00 |
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means to enforce authorization policies. In this paper, we describe an operational model of accountability-based distributed systems. We describe analyses which support both the design of accountability systems and the validation of auditors for finitary accountability systems. Our study provides formal foundations to explore the tradeoffs underlying the design of accountability systems including: the power of the auditor, the efficiency of the audit protocol, the requirements placed on the agents, and the requirements placed on the communication infrastructure.