Refinement type systems have proved very effective for security policy verification in distributed authorization systems. In earlier work [12], we have proposed an extension of existing refinement typing techniques to exploit sub-structural logics and affine typing in the analy- sis of resource aware authorization, with policies predicating over access counts, usage bounds and resource consumption. In the present paper, we show that the invariants that we enforced by means of ad-hoc typing mechanisms in our initial proposal can be internalized, and expressed directly as proof obligations for the underlying ane logical system. The new characterization leads to a more general, modular design of the system, and is effective in the analysis of ...
Despite considerable advancements in the area of access control and authorization languages, current...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
In trust negotiation and other distributed proving systems, networked entities cooperate to form pro...
Refinement type systems have proved very effective for security policy verification in distributed a...
Type systems for authorization are a popular device for the specification and verification of securi...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem-proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
Abstract. Distributed systems and applications are often expected to enforce high-level authorizatio...
Distributed systems and applications are often expected to enforce high-level authorization policie...
In most systems, authorization is specified using some low-level system-specific mechanisms, e.g. pr...
Despite considerable advancements in the area of access control and authorization languages, current...
Abstract. We propose a logic for specifying security policies at a very high level of abstraction. T...
We present Relational Hoare Type Theory (RHTT), a novel language and verification system capable of ...
We present the design and implementation of a typechecker for verifying security properties of the s...
Despite considerable advancements in the area of access control and authorization languages, current...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
In trust negotiation and other distributed proving systems, networked entities cooperate to form pro...
Refinement type systems have proved very effective for security policy verification in distributed a...
Type systems for authorization are a popular device for the specification and verification of securi...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem-proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
Abstract. Distributed systems and applications are often expected to enforce high-level authorizatio...
Distributed systems and applications are often expected to enforce high-level authorization policie...
In most systems, authorization is specified using some low-level system-specific mechanisms, e.g. pr...
Despite considerable advancements in the area of access control and authorization languages, current...
Abstract. We propose a logic for specifying security policies at a very high level of abstraction. T...
We present Relational Hoare Type Theory (RHTT), a novel language and verification system capable of ...
We present the design and implementation of a typechecker for verifying security properties of the s...
Despite considerable advancements in the area of access control and authorization languages, current...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
In trust negotiation and other distributed proving systems, networked entities cooperate to form pro...