dc.contributor.author | Abadi, Martin | |
dc.contributor.author | Burrows, Michael | |
dc.contributor.author | Lampson, Butler | |
dc.contributor.author | Plotkin, Gordon | |
dc.date.accessioned | 2003-11-05T16:12:09Z | |
dc.date.available | 2003-11-05T16:12:09Z | |
dc.date.issued | 1993 | |
dc.identifier.citation | ACM Transactions on Programming Languages and Systems, Vol. 15, No. 3, September 1993. | en |
dc.identifier.uri | http://hdl.handle.net/1842/207 | |
dc.description.abstract | We study some of the concepts, protocols, and algorithms for access control in distributed systems,
from a logical perspective. We account for how a principal may come to believe that another
principal is making a request, either on his own or on someone else’s behalf. We also provide
a logical language for access control lists and theories for deciding whether requests should be
granted. | en |
dc.format.extent | 282006 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | |
dc.subject | cryptography | en |
dc.subject | cryptographic protocols | en |
dc.subject | Laboratory for Foundations of Computer Science | |
dc.title | A Calculus for Access Control in Distributed Systems | en |
dc.type | Article | en |