A type system is presented that combines a weak form of information flow control, termed distributed access control in the paper, with typed cryptographic operations. The motivat...
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. W...
Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, ...
This paper defines a framework in which one can formalize a variety of authorization and policy issues that arise in access control of shared computing resources. Instantiations ...
Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart...
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal l...