{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:28:43Z","timestamp":1725542923630},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540373766"},{"type":"electronic","value":"9783540373773"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11817949_18","type":"book-chapter","created":{"date-parts":[[2006,8,2]],"date-time":"2006-08-02T19:59:29Z","timestamp":1154548769000},"page":"263-278","source":"Crossref","is-referenced-by-count":3,"title":["Dynamic Access Control in a Concurrent Object Calculus"],"prefix":"10.1007","author":[{"given":"Avik","family":"Chaudhuri","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"18_CR1","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/S0304-3975(02)00863-0","volume":"298","author":"M. Abadi","year":"2003","unstructured":"Abadi, M., Blanchet, B.: Secrecy types for asymmetric communication. Theoretical Computer Science\u00a0298(3), 387\u2013415 (2003)","journal-title":"Theoretical Computer Science"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","first-page":"471","volume-title":"TAPSOFT \u201995: Theory and Practice of Software Development","author":"M. Abadi","year":"1995","unstructured":"Abadi, M., Cardelli, L.: An imperative object calculus. In: Mosses, P.D., Schwartzbach, M.I., Nielsen, M. (eds.) CAAP 1995, FASE 1995, and TAPSOFT 1995. LNCS, vol.\u00a0915, pp. 471\u2013485. Springer, Heidelberg (1995)"},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1109\/CSFW.2003.1212711","volume-title":"CSFW 2003: Computer Security Foundations Workshop","author":"A. Banerjee","year":"2003","unstructured":"Banerjee, A., Naumann, D.: Using access control for secure information flow in a Java-like language. In: CSFW 2003: Computer Security Foundations Workshop, pp. 155\u2013169. IEEE, Los Alamitos (2003)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1007\/3-540-61604-7_82","volume-title":"CONCUR \u201996: Concurrency Theory","author":"P.D. Blasio","year":"1996","unstructured":"Blasio, P.D., Fisher, K.: A calculus for concurrent objects. In: Sassone, V., Montanari, U. (eds.) CONCUR 1996. LNCS, vol.\u00a01119, pp. 655\u2013670. Springer, Heidelberg (1996)"},{"issue":"7","key":"18_CR5","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1109\/32.859531","volume":"26","author":"P. Blasio Di","year":"2000","unstructured":"Di Blasio, P., Fisher, K., Talcott, C.: A control-flow analysis for a calculus of concurrent objects. IEEE Transactions on Software Engineering\u00a026(7), 617\u2013634 (2000)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"18_CR6","first-page":"48","volume-title":"CSFW 2004: Computer Security Foundations Workshop","author":"C. Braghin","year":"2004","unstructured":"Braghin, C., Gorla, D., Sassone, V.: A distributed calculus for role-based access control. In: CSFW 2004: Computer Security Foundations Workshop, pp. 48\u201360. IEEE, Los Alamitos (2004)"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/963778.963781","volume":"26","author":"M. Bugliesi","year":"2004","unstructured":"Bugliesi, M., Castagna, G., Crafa, S.: Access control for mobile agents: The calculus of boxed ambients. ACM Transactions on Programming Languages and Systems\u00a026(1), 57\u2013124 (2004)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-540-28644-8_15","volume-title":"CONCUR 2004 - Concurrency Theory","author":"M. Bugliesi","year":"2004","unstructured":"Bugliesi, M., Colazzo, D., Crafa, S.: Type based discretionary access control. In: Gardner, P., Yoshida, N. (eds.) CONCUR 2004. LNCS, vol.\u00a03170, pp. 225\u2013239. Springer, Heidelberg (2004)"},{"issue":"2","key":"18_CR9","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.ic.2004.08.003","volume":"196","author":"L. Cardelli","year":"2005","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Secrecy and group creation. Information and Computation\u00a0196(2), 127\u2013155 (2005)","journal-title":"Information and Computation"},{"key":"18_CR10","volume-title":"CSFW 2006: Computer Security Foundations Workshop","author":"A. Chaudhuri","year":"2006","unstructured":"Chaudhuri, A., Abadi, M.: Secrecy by typing and file-access control. In: CSFW 2006: Computer Security Foundations Workshop. IEEE, Los Alamitos (to appear, 2006)"},{"unstructured":"Coquand, T.: Pattern matching with dependent types. In: Workshop on Types for Proofs and Programs, Electronic proceedings (1992)","key":"18_CR11"},{"key":"18_CR12","first-page":"245","volume-title":"POPL 2006: Principles of programming languages","author":"C. Flanagan","year":"2006","unstructured":"Flanagan, C.: Hybrid type checking. In: POPL 2006: Principles of programming languages, pp. 245\u2013256. ACM, New York (2006)"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/3-540-48320-9_21","volume-title":"CONCUR\u201999. Concurrency Theory","author":"C. Flanagan","year":"1999","unstructured":"Flanagan, C., Abadi, M.: Object Types against Races. In: Baeten, J.C.M., Mauw, S. (eds.) CONCUR 1999. LNCS, vol.\u00a01664, pp. 288\u2013303. Springer, Heidelberg (1999)"},{"key":"18_CR14","first-page":"248","volume-title":"HLCL 1998: High-Level Concurrent Languages","author":"A.D. Gordon","year":"1998","unstructured":"Gordon, A.D., Hankin, P.D.: A concurrent object calculus: Reduction and typing. In: HLCL 1998: High-Level Concurrent Languages, pp. 248\u2013264. Elsevier, Amsterdam (1998)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11539452_17","volume-title":"CONCUR 2005 \u2013 Concurrency Theory","author":"A.D. Gordon","year":"2005","unstructured":"Gordon, A.D., Jeffrey, A.: Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus. In: Abadi, M., de Alfaro, L. (eds.) CONCUR 2005. LNCS, vol.\u00a03653, pp. 186\u2013201. Springer, Heidelberg (2005)"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-45061-0_11","volume-title":"Automata, Languages and Programming","author":"D. Gorla","year":"2003","unstructured":"Gorla, D., Pugliese, R.: Resource access and mobility control with dynamic privileges acquisition. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol.\u00a02719, pp. 119\u2013132. Springer, Heidelberg (2003)"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/11539452_18","volume-title":"CONCUR 2005 \u2013 Concurrency Theory","author":"C. Haack","year":"2005","unstructured":"Haack, C., Jeffrey, A.: Timed spi-calculus with types for secrecy and authenticity. In: Abadi, M., de Alfaro, L. (eds.) CONCUR 2005. LNCS, vol.\u00a03653, pp. 202\u2013216. Springer, Heidelberg (2005)"},{"key":"18_CR18","volume-title":"PLAS 2006: Programming Languages and Analysis for Security","author":"K.W. Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Certified in-lined reference monitoring on .NET. In: PLAS 2006: Programming Languages and Analysis for Security. ACM, New York (to appear, 2006)"},{"unstructured":"Hawblitzel, C., von Eicken, T.: Type system support for dynamic revocation. In: Workshop on Compiler Support for System Software, Electronic proceedings (1999)","key":"18_CR19"},{"key":"18_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/3-540-36576-1_18","volume-title":"Foundations of Software Science and Computational Structures","author":"M. Hennessy","year":"2003","unstructured":"Hennessy, M., Merro, M., Rathke, J.: Towards a Behavioural Theory of Access and Mobility Control in Distributed Systems. In: Gordon, A.D. (ed.) FOSSACS 2003. LNCS, vol.\u00a02620, pp. 282\u2013298. Springer, Heidelberg (2003)"},{"key":"18_CR21","first-page":"174","volume-title":"HLCL 1998: High-Level Concurrent Languages","author":"M. Hennessy","year":"1998","unstructured":"Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. In: HLCL 1998: High-Level Concurrent Languages, pp. 174\u2013188. Elsevier, Amsterdam (1998)"},{"issue":"5","key":"18_CR22","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1145\/570886.570890","volume":"24","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Information flow vs. resource access in the asynchronous pi-calculus. ACM Transactions on Programming Languages and Systems\u00a024(5), 566\u2013591 (2002)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"18_CR23","first-page":"283","volume-title":"CSFW 2001: Computer Security Foundations Workshop","author":"Z.D. Kirli","year":"2001","unstructured":"Kirli, Z.D.: Confined mobile functions. In: CSFW 2001: Computer Security Foundations Workshop, pp. 283\u2013294. IEEE, Los Alamitos (2001)"},{"issue":"3","key":"18_CR24","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S0167-6423(02)00034-5","volume":"44","author":"J. Kleist","year":"2002","unstructured":"Kleist, J., Sangiorgi, D.: Imperative objects as mobile processes. Science of Computer Programming\u00a044(3), 293\u2013342 (2002)","journal-title":"Science of Computer Programming"},{"key":"18_CR25","first-page":"898","volume-title":"VLDB 2003: Very Large Data Bases","author":"G. Miklau","year":"2003","unstructured":"Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: VLDB 2003, pp. 898\u2013909. Springer, Heidelberg (2003)"},{"key":"18_CR26","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2319.001.0001","volume-title":"The Definition of Standard ML (Revised)","author":"R. Milner","year":"1997","unstructured":"Milner, R., Tofte, M., Harper, R., MacQueen, D.: The Definition of Standard ML (Revised). MIT Press, Cambridge (1997)"},{"key":"18_CR27","first-page":"172","volume-title":"CSFW 2004: Computer Security Foundations Workshop","author":"A. Myers","year":"2004","unstructured":"Myers, A., Sabelfeld, A., Zdancewic, S.: Enforcing robust declassification. In: CSFW 2004: Computer Security Foundations Workshop, pp. 172\u2013186. IEEE, Los Alamitos (2004)"},{"issue":"1","key":"18_CR28","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0304-3975(99)00232-7","volume":"240","author":"R..D. Nicola","year":"2000","unstructured":"Nicola, R.D., Ferrari, G., Pugliese, R., Venneri, B.: Types for access control. Theoretical Computer Science\u00a0240(1), 215\u2013254 (2000)","journal-title":"Theoretical Computer Science"},{"issue":"2","key":"18_CR29","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1145\/1057387.1057392","volume":"27","author":"F. Pottier","year":"2005","unstructured":"Pottier, F., Skalka, C., Smith, S.: A systematic approach to static access control. ACM Transactions on Programming Languages and Systems\u00a027(2), 344\u2013382 (2005)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"unstructured":"Redell, D.D.: Naming and protection in extendible operating systems. Technical Report 140, Project MAC, MIT (1974)","key":"18_CR30"},{"issue":"1","key":"18_CR31","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Transactions on Information and System Security\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"18_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/BFb0052178","volume-title":"Object-Oriented Programming","author":"V.T. Vasconcelos","year":"1994","unstructured":"Vasconcelos, V.T.: Typed Concurrent Objects. In: Tokoro, M., Pareschi, R. (eds.) ECOOP 1994. LNCS, vol.\u00a0821, pp. 100\u2013117. Springer, Heidelberg (1994)"},{"key":"18_CR33","first-page":"27","volume-title":"FAST 2004: Formal Aspects in Security and Trust","author":"L. Zheng","year":"2004","unstructured":"Zheng, L., Myers, A.: Dynamic security labels and noninterference. In: FAST 2004: Formal Aspects in Security and Trust, pp. 27\u201340. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","CONCUR 2006 \u2013 Concurrency Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11817949_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:29:53Z","timestamp":1619508593000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11817949_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540373766","9783540373773"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/11817949_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}