{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:47:43Z","timestamp":1729666063446,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csfw.2003.1212712","type":"proceedings-article","created":{"date-parts":[[2004,1,23]],"date-time":"2004-01-23T23:33:03Z","timestamp":1074900783000},"page":"170-184","source":"Crossref","is-referenced-by-count":16,"title":["Type-based distributed access control"],"prefix":"10.1109","author":[{"given":"T.","family":"Chothia","sequence":"first","affiliation":[]},{"given":"D.","family":"Duggan","sequence":"additional","affiliation":[]},{"given":"J.","family":"Vitek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/SP.1981.10004"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/CSFW.2000.856943"},{"key":"ref31","article-title":"Language-based information-flow security","author":"sabelfeld","year":"2002","journal-title":"IEEE Journal on Selected Areas in Communications"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/292540.292551"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1145\/502034.502036"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/CSFW.2001.930133"},{"key":"ref35","article-title":"A type-based approach to program security","author":"volpano","year":"1997","journal-title":"Proceedings of the 7th International Joint Conference on the Theory and Practice of Software Development"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/CSFW.2001.930151"},{"key":"ref10","article-title":"The role of trust management in distributed systems security","author":"blaze","year":"1999","journal-title":"Secure Internet Programming Security Issues for Distributed and Mobile Objects volume 1603 of Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref12","article-title":"Secrecy and group creation","author":"cardelli","year":"2000","journal-title":"Concurrency Theory (CONCUR)"},{"key":"ref13","article-title":"A calculus of secure mobile computations","author":"castagna","year":"1999","journal-title":"Lecture Notes in Computer Science In Internet Programming Languages"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/359636.359712"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/CSFW.2002.1021819"},{"key":"ref16","article-title":"Simple public key certificate","author":"ellison","year":"1998","journal-title":"Internet Draft draft-ietf-spki-cert-structure-05 txt"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CSFW.2001.930143"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/CSFW.2002.1021808"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/268946.268976"},{"key":"ref28","article-title":"A simple view of type-secure information flow in the pi-calculus","author":"pottier","year":"2002","journal-title":"Computer Security Foundations Workshop"},{"key":"ref4","article-title":"Secure communications processing for distributed languages","author":"abadi","year":"1999","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1145\/248155.238781","article-title":"Safe kernel extensions without runtime checking","author":"necula","year":"1996","journal-title":"Operating Systems Design and Implementation"},{"key":"ref3","article-title":"Access control based on execution history","author":"abadi","year":"2003","journal-title":"Proceedings of the 10th Annual Network and Distributed System Security Symposium"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1006\/inco.1998.2740"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/351240.351245"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/325694.325734"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/174613.174614","article-title":"Authentication in the Taos operating system","volume":"12","author":"abadi","year":"1994","journal-title":"ACM Transactions on Computer Systems"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1145\/138873.138874","article-title":"Authentication in distributed systems: Theory and practice","volume":"10","author":"abadi","year":"1992","journal-title":"ACM Trans Comput Syst"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/503272.503277"},{"key":"ref9","first-page":"242","article-title":"From secrecy to authenticity in security protocols","author":"blanchet","year":"2002","journal-title":"9th International Static Analysis Symposium (SAS'02)"},{"key":"ref1","first-page":"611","article-title":"Security by typing in security protocols","author":"abadi","year":"1997","journal-title":"Theoretical Aspects of Computer Science"},{"key":"ref20","article-title":"Type-safe execution of mobile agents in anonymous networks","author":"hennessy","year":"1999","journal-title":"Secure Internet Programming Security Issues for Distributed and Mobile Objects Lecture Notes in Comnuter Science"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/44501.45065"},{"key":"ref21","first-page":"159","article-title":"Handling encryption in an analysis for secure information flow","author":"laud","year":"2003","journal-title":"European Symposium on Programming"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/SECPRI.1998.674834"},{"key":"ref23","first-page":"528","volume":"21","author":"morrisett","year":"1999","journal-title":"From System F to typed assembly language ACM TOPLAS"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/263699.263712"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/363516.363526"}],"event":{"acronym":"CSFW-03","name":"16th IEEE Computer Security Foundations Workshop","location":"Pacific Grove, CA, USA"},"container-title":["16th IEEE Computer Security Foundations Workshop, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8606\/27273\/01212712.pdf?arnumber=1212712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T23:18:20Z","timestamp":1497568700000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1212712\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/csfw.2003.1212712","relation":{},"subject":[]}}