Theoretical Computer Science
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Efficient resource management for linear logic proof search
Theoretical Computer Science - Special issue on proof-search in type-theoretic languages
Information and Computation
LICS '03 Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science
A judgmental reconstruction of modal logic
Mathematical Structures in Computer Science
Access control for the web via proof-carrying authorization
Access control for the web via proof-carrying authorization
Non-Interference in Constructive Authorization Logic
CSFW '06 Proceedings of the 19th IEEE workshop on Computer Security Foundations
Managing Digital Rights using Linear Logic
LICS '06 Proceedings of the 21st Annual IEEE Symposium on Logic in Computer Science
Audit-based compliance control
International Journal of Information Security
Logic in Access Control (Tutorial Notes)
Foundations of Security Analysis and Design V
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Device-enabled authorization in the grey system
ISC'05 Proceedings of the 8th international conference on Information Security
A linear logic of authorization and knowledge
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Hi-index | 0.00 |
We present the design and implementation of a file system which allows authorizations dependent on revocable and use-once policy certificates. Authorizations require explicit proof objects, combining ideas from previous authorization logics and Girard's linear logic. Use-once certificates and revocations lists are maintained in a database that is consulted during file access. Experimental results demonstrate that the overhead of using the database is not significant in practice.