Recognizing safety and liveness, Distributed Computing, vol.56, issue.1???2, pp.181-126, 1987. ,
DOI : 10.1007/BF01782772
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.5470
Information flow in trust management systems, Journal of Computer Security, vol.20, issue.6, pp.677-708, 2012. ,
DOI : 10.3233/JCS-2012-0443
URL : http://doi.org/10.3233/jcs-2012-0443
SecPAL: Design and semantics of a decentralized authorization language, Journal of Computer Security, vol.18, issue.4, pp.619-665, 2010. ,
DOI : 10.3233/JCS-2009-0364
The KeyNote Trust-Management System Version 2, RFCInformational), vol.2704, 1999. ,
DOI : 10.17487/rfc2704
Compliance checking in the PolicyMaker trust management system, FC '98: Proceedings of the Second International Conference on Financial Cryptography, pp.254-274, 1998. ,
DOI : 10.1007/BFb0055488
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983. ,
DOI : 10.1109/TIT.1983.1056650
SPKI Certificate Theory, RFCExperimental), vol.2693, 1999. ,
DOI : 10.17487/rfc2693
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.189.1209
Intransitive noninterference in nondeterministic systems, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.869-880, 2012. ,
DOI : 10.1145/2382196.2382288
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.303.6822
Service-Oriented Policy Management for Web-Application Frameworks, IEEE Internet Computing, vol.13, issue.6, pp.39-47, 2009. ,
DOI : 10.1109/MIC.2009.95
URL : http://www.tara.tcd.ie/bitstream/2262/67056/1/internet-computing-revision-2-final.pdf
Authorisation subterfuge by delegation in decentralised networks, International Security Protocols Workshop, 2005. ,
A non-functional approach to system integrity, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, 2003. ,
Avoiding Delegation Subterfuge Using Linked Local Permission Names, Proceedings of 8th International Workshop on Formal Aspects of Security and Trust (FAST2011), 2011. ,
DOI : 10.1007/978-3-642-29420-4_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.7791
Unwinding and Inference Control, 1984 IEEE Symposium on Security and Privacy, pp.75-87, 1984. ,
DOI : 10.1109/SP.1984.10019
DKAL: Distributed-Knowledge Authorization Language, 2008 21st IEEE Computer Security Foundations Symposium, p.CSF, 2008. ,
DOI : 10.1109/CSF.2008.8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.7900
Basic Theorems about Security, Journal of Computer Security, vol.1, issue.3-4, pp.385-411, 1992. ,
DOI : 10.3233/JCS-1992-13-409
URL : http://doi.org/10.3233/jcs-1992-13-409
Authentication in distributed systems: theory and practice, ACM Transactions on Computer Systems, vol.10, issue.4, pp.265-310, 1992. ,
DOI : 10.1145/138873.138874
RT: A role-based trust-management framework In: The Third DARPA Information Survivability Conference and Exposition (DISCEX III), pp.201-212, 2003. ,
Information flow and noninterference In: Encyclopedia of Cryptography and Security, pp.605-607, 2011. ,
What is intransitive noninterference?, Proceedings of the 12th IEEE Computer Security Foundations Workshop, pp.228-238, 1999. ,
DOI : 10.1109/CSFW.1999.779776
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.425
Mathematical Models of Computer Security, Lecture Notes in Computer Science, vol.2171, pp.1-62, 2001. ,
DOI : 10.1007/3-540-45608-2_1
Purloined domain name is an unsolved mystery, 2005. ,
A Logic for Analysing Subterfuge in Delegation Chains, Workshop on Formal Aspects in Security and Trust (FAST2005), 2005. ,
DOI : 10.1007/11679219_10
A framework for establishing decentralized secure coalitions, Proceedings of IEEE Computer Security Foundations Workshop, 2006. ,