{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:54:52Z","timestamp":1725504892349},"publisher-location":"Berlin, Heidelberg","reference-count":47,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540786627"},{"type":"electronic","value":"9783540786634"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78663-4_13","type":"book-chapter","created":{"date-parts":[[2008,3,8]],"date-time":"2008-03-08T06:00:01Z","timestamp":1204956001000},"page":"169-185","source":"Crossref","is-referenced-by-count":3,"title":["Access Control Based on Code Identity for Open Distributed Systems"],"prefix":"10.1007","author":[{"given":"Andrew","family":"Cirillo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"James","family":"Riely","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Necula, G.C.: Proof-carrying code. In: POPL 1997 (1997)","DOI":"10.1145\/263699.263712"},{"key":"13_CR2","unstructured":"Trusted Computing Group: TCG TPM Specification Version 1.2 (March 2006), http:\/\/www.trustedcomputinggroup.org"},{"key":"13_CR3","unstructured":"Trusted Computing Group: TCG Software Stack (TSS) Specification Version 1.2 (January 2006), http:\/\/www.trustedcomputinggroup.org"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation\u00a0148(1) (1999)","DOI":"10.1006\/inco.1998.2740"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1145\/325694.325734","volume-title":"POPL","author":"M. Abadi","year":"2000","unstructured":"Abadi, M., Fournet, C., Gonthier, G.: Authentication primitives and their compilation. In: POPL, pp. 302\u2013315. ACM Press, New York, NY, USA (2000)"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1145\/1030083.1030103","volume-title":"CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security","author":"E. Brickell","year":"2004","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security, pp. 132\u2013145. ACM Press, New York, NY, USA (2004)"},{"key":"13_CR7","unstructured":"Sadeghi, A.R., St\u00fcble, C.: Property-based attestation for computing platforms: Caring about properties, not mechanisms. In: New Security Paradigms Workshop (2004)"},{"key":"13_CR8","unstructured":"Schoen, S.: Trusted Computing: Promise and Risk. Electronic Frontier Foundation (October 2003), http:\/\/www.eff.org\/Infrastructure\/trusted_computing\/20031001_tc.pdf"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1145\/1063979.1064005","volume-title":"SACMAT 2005: Proceedings of the tenth ACM symposium on Access control models and technologies","author":"R. Sandhu","year":"2005","unstructured":"Sandhu, R., Zhang, X.: Peer-to-peer access control architecture using trusted computing technology. In: SACMAT 2005: Proceedings of the tenth ACM symposium on Access control models and technologies, pp. 147\u2013158. ACM Press, New York, NY, USA (2005)"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1133058.1133063","volume-title":"SACMAT 2006: Proceedings of the eleventh ACM symposium on Access control models and technologies","author":"T. Jaeger","year":"2006","unstructured":"Jaeger, T., Sailer, R., Shankar, U.: Prima: policy-reduced integrity measurement architecture. In: SACMAT 2006: Proceedings of the eleventh ACM symposium on Access control models and technologies, pp. 19\u201328. ACM Press, New York, NY, USA (2006)"},{"key":"13_CR11","unstructured":"Sangiorgi, D.: Expressing Mobility in Process Algebras: First-Order and Higher-Order Paradigms. PhD thesis, University of Edinburgh (1993)"},{"issue":"1","key":"13_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF01200262","volume":"30","author":"B. Thomsen","year":"1993","unstructured":"Thomsen, B.: Plain chocs: A second generation calculus for higher order processes. Acta Informatica\u00a030(1), 1\u201359 (1993)","journal-title":"Acta Informatica"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/BFb0032030","volume-title":"Automata, Languages and Programming","author":"R. Milner","year":"1990","unstructured":"Milner, R.: Functions as processes. In: Paterson, M. (ed.) ICALP 1990. LNCS, vol.\u00a0443, pp. 167\u2013180. Springer, Heidelberg (1990)"},{"issue":"4","key":"13_CR14","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst.\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"13_CR15","unstructured":"Abadi, M., Birrell, A., Wobber, T.: Access control in a world of software diversity. In: Tenth Workshop on Hot Topics in Operating Systems (HotOS X) (June 2005)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. In: ESOP, pp. 141\u2013156 (2005)","DOI":"10.1007\/978-3-540-31987-0_11"},{"key":"13_CR17","first-page":"31","volume":"00","author":"C. Fournet","year":"2007","unstructured":"Fournet, C., Gordon, A., Maffeis, S.: A type discipline for authorization in distributed systems. CSF\u00a000, 31\u201348 (2007)","journal-title":"CSF"},{"key":"13_CR18","first-page":"16","volume":"0","author":"A. Cirillo","year":"2007","unstructured":"Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do As I SaY! Programmatic Access Control with Explicit Identities. CSF\u00a00, 16\u201330 (2007)","journal-title":"CSF"},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/S0304-3975(00)00097-9","volume":"253","author":"D. Sangiorgi","year":"2001","unstructured":"Sangiorgi, D.: Asynchronous process calculi: the first-order and higher-order paradigms (tutorial). Theoretical Computer Science\u00a0253, 311\u2013350 (2001)","journal-title":"Theoretical Computer Science"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/BFb0055620","volume-title":"CONCUR \u201998 Concurrency Theory","author":"N. Yoshida","year":"1998","unstructured":"Yoshida, N.: Minimality and separation results on asynchronous mobile processes. In: Sangiorgi, D., de Simone, R. (eds.) CONCUR 1998. LNCS, vol.\u00a01466, p. 131. Springer, Heidelberg (1998)"},{"key":"13_CR21","unstructured":"Merro, M.: Locality in the pi-calculus and applications to distributed objects. PhD thesis, Ecole des Mines de Paris (October 2000)"},{"issue":"1","key":"13_CR22","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1006\/inco.2001.3089","volume":"173","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. Inf. Comput.\u00a0173(1), 82\u2013120 (2002)","journal-title":"Inf. Comput."},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11690634_8","volume-title":"Foundations of Software Science and Computation Structures","author":"C. Pitcher","year":"2006","unstructured":"Pitcher, C., Riely, J.: Dynamic policy discovery with remote attestation. In: Aceto, L., Ing\u00f3lfsd\u00f3ttir, A. (eds.) FOSSACS 2006. LNCS, vol.\u00a03921, Springer, Heidelberg (2006)"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Gordon, A.D., Jeffrey, A.S.A.: Types and effects for asymmetric cryptographic protocols. J. Computer Security 12(3\/4) (2004)","DOI":"10.3233\/JCS-2004-123-406"},{"key":"13_CR25","unstructured":"Haack, C., Jeffrey, A.S.A.: Pattern-matching spi-calculus. In: Proc. IFIP WG 1.7 Workshop on Formal Aspects in Security and Trust (2004)"},{"key":"13_CR26","first-page":"334","volume":"00","author":"N. Yoshida","year":"2000","unstructured":"Yoshida, N., Hennessy, M.: Assigning types to processes. LICS\u00a000, 334 (2000)","journal-title":"LICS"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Abadi, M.: Trusted computing, trusted third parties, and verified communications. In: SEC 2004: 19th IFIP International Information Security Conference (2004)","DOI":"10.1007\/1-4020-8143-X_19"},{"key":"13_CR28","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-540-27800-9_8","volume":"3108\/2004","author":"M. Peinado","year":"2004","unstructured":"Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A Trusted Open System. Information Security and Privacy\u00a03108\/2004, 86\u201397 (2004)","journal-title":"Information Security and Privacy"},{"key":"13_CR29","volume-title":"Trusted Computing Platforms: TCPA Technology in Context","author":"S. Pearson","year":"2002","unstructured":"Pearson, S.: Trusted Computing Platforms: TCPA Technology in Context. Prentice-Hall, Englewood Cliffs (2002)"},{"key":"13_CR30","series-title":"Lecture Notes in Computer Science","volume-title":"Applying Formal Methods: Testing, Performance, and M\/E-Commerce","author":"M. Abadi","year":"2004","unstructured":"Abadi, M., Wobber, T.: A logical account of NGSCB. In: N\u00fa\u00f1ez, M., Maamar, Z., Pelayo, F.L., Pousttchi, K., Rubio, F. (eds.) FORTE 2004. LNCS, vol.\u00a03236, Springer, Heidelberg (2004)"},{"key":"13_CR31","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: 13th USENIX Security Symposium (2004)"},{"key":"13_CR32","unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: A virtual machine directed approach to trusted computing. In: USENIX VM (2004)"},{"key":"13_CR33","unstructured":"Haldar, V., Franz, M.: Symmetric behavior-based trust: A new paradigm for internet computing. In: New Security Paradigms Workshop (2004)"},{"key":"13_CR34","doi-asserted-by":"crossref","unstructured":"Abadi, M., Blanchet, B.: Secrecy types for asymmetric communication. Theoretical Computer Science 298(3) (2003)","DOI":"10.1016\/S0304-3975(02)00863-0"},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"Gordon, A.D., Jeffrey, A.S.A.: Authenticity by typing for security protocols. J. Computer Security 11(4) (2003)","DOI":"10.3233\/JCS-2003-11402"},{"key":"13_CR36","series-title":"Lecture Notes in Computer Science","volume-title":"Programming Languages and Systems","author":"C. Fournet","year":"2005","unstructured":"Fournet, C., Gordon, A., Maffeis, S.: A type discipline for authorization policies. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol.\u00a03444, Springer, Heidelberg (2005)"},{"key":"13_CR37","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1145\/1272996.1273033","volume-title":"EuroSys 2007: Proceedings of the ACM SIGOPS\/EuroSys European Conference on Computer Systems 2007","author":"T. Wobber","year":"2007","unstructured":"Wobber, T., Yumerefendi, A., Abadi, M., Birrell, A., Simon, D.R.: Authorizing applications in Singularity. In: EuroSys 2007: Proceedings of the ACM SIGOPS\/EuroSys European Conference on Computer Systems 2007, Lisbon, Portugal, pp. 355\u2013368. ACM, New York, NY, USA (2007)"},{"key":"13_CR38","doi-asserted-by":"crossref","unstructured":"Wallach, D.S., Appel, A.W., Felten, E.W.: SAFKASI: a security mechanism for language-based systems. ACM Trans. Softw. Eng. Methodol.\u00a09(4) (2000)","DOI":"10.1145\/363516.363520"},{"key":"13_CR39","unstructured":"Abadi, M., Fournet, C.: Access control based on execution history. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium (2003)"},{"key":"13_CR40","doi-asserted-by":"crossref","unstructured":"Cardelli, L.: Program fragments, linking, and modularization. In: POPL 1997 (1997)","DOI":"10.1145\/263699.263735"},{"key":"13_CR41","series-title":"Lecture Notes in Computer Science","volume-title":"Programming Languages and Systems","author":"M. Bugliesi","year":"2004","unstructured":"Bugliesi, M., Focardi, R., Maffei, M.: Compositional analysis of authentication protocols. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol.\u00a02986, Springer, Heidelberg (2004)"},{"key":"13_CR42","doi-asserted-by":"crossref","unstructured":"Bugliesi, M., Focardi, R., Maffei, M.: Analysis of typed analyses of authentication protocols. In: CSFW (2005)","DOI":"10.1109\/CSFW.2005.8"},{"key":"13_CR43","unstructured":"Anderson, R., Kuhn, M.: Tamper resistance - a cautionary note. In: Second USENIX Workshop on Electronic Commerce Proceedings (1996)"},{"key":"13_CR44","unstructured":"Huang, A.: Hacking the Xbox. Xenatera Press (2003)"},{"key":"13_CR45","doi-asserted-by":"crossref","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: IEEE Symposium on Security and Privacy (1997)","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"13_CR46","doi-asserted-by":"crossref","unstructured":"Smith, S., Weingart, S.: Building a high-performance, programmable secure coprocessor. Computer Networks, Special Issue on Computer Network Security\u00a031 (1999)","DOI":"10.1016\/S1389-1286(98)00019-X"},{"key":"13_CR47","doi-asserted-by":"crossref","unstructured":"Irvine, C., Levin, T.: A cautionary note regarding the data integrity capacity of certain secure systems. In: Integrity, Internal Control and Security in Information Systems (2002)","DOI":"10.21236\/ADA435460"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78663-4_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:17:45Z","timestamp":1619522265000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78663-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540786627","9783540786634"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78663-4_13","relation":{},"subject":[]}}