We present a language for access control. The language is organized around the notion of execution on behalf of a principal. This is characterized using an indexed lax modality. Central to the language is the idea of manifest security – accessing a resource requires presenting a proof of accessibility to the resource monitor. Proofs are generated at runtime by actions such as typing in password, looking up an access-control list or by composing other proofs etc. In the present work, we consider a simplified setting in which the access-control theory is static. In such a case proofs can be regarded as static entities. Proof generation can be hoisted away from resource access since proofs become permanent. Also, the actual proofs are irreleva...
The scope rules in programming languages control the sharing of data among program units-e.g., block...
We present the design and implementation of a Certified Core Policy Language (ACCPL) that can be use...
Abstract. If an access control policy promises that a resource is protected in a system, how do we k...
We present a language for access control. The language is organized around the notion of execution o...
We present a language for access control. The language is organized around the notion of execution o...
An important component of a programming language for writing operating systems, or other large para...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
Class-based languages, such as Java and C#, implement encapsulation via access modifiers on classes,...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
Access control is the process of mediating every request to data and services maintained by a system...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
A major drawback of existing access control systems is that they have all been developed with a spec...
International audienceAccess control software must be based on a security policy model. Flaws in the...
Access control is the process of mediating every request to data and services maintained by a syste...
In this work we explore the use of process algebra in formal-ising and analysing access control poli...
The scope rules in programming languages control the sharing of data among program units-e.g., block...
We present the design and implementation of a Certified Core Policy Language (ACCPL) that can be use...
Abstract. If an access control policy promises that a resource is protected in a system, how do we k...
We present a language for access control. The language is organized around the notion of execution o...
We present a language for access control. The language is organized around the notion of execution o...
An important component of a programming language for writing operating systems, or other large para...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
Class-based languages, such as Java and C#, implement encapsulation via access modifiers on classes,...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
Access control is the process of mediating every request to data and services maintained by a system...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
A major drawback of existing access control systems is that they have all been developed with a spec...
International audienceAccess control software must be based on a security policy model. Flaws in the...
Access control is the process of mediating every request to data and services maintained by a syste...
In this work we explore the use of process algebra in formal-ising and analysing access control poli...
The scope rules in programming languages control the sharing of data among program units-e.g., block...
We present the design and implementation of a Certified Core Policy Language (ACCPL) that can be use...
Abstract. If an access control policy promises that a resource is protected in a system, how do we k...