Back to Results
First PageMeta Content
Datalog / Central Intelligence Agency / ALGOL 68 / Propositional calculus / Mathematical logic / Logic / Programming language theory


Beyond Proof-of-compliance: Security Analysis in Trust Management NINGHUI LI Purdue University JOHN C. MITCHELL Stanford University
Add to Reading List

Document Date: 2007-12-17 01:15:33


Open Document

File Size: 310,49 KB

Share Result on Facebook

City

Rockville / /

Company

Rolebased Trust / Network Associates Laboratories / HR. / TDP / H. WINSBOROUGH George Mason University Trust / Computer Sciences / /

/

Event

Man-Made Disaster / /

Facility

George Mason University / Stanford University / Purdue University / MITCHELL Stanford University / /

IndustryTerm

pushdown systems / software enforcement / immediate consequence operator / trust management systems / decentralized distributed systems / trust management / /

Organization

SSO / Department of Computer Science / Stanford University / George Mason University / WILLIAM H. WINSBOROUGH George Mason University Trust / Center for Secure Information Systems / A.r1 / X.u. / A.r / Purdue University / Department of Computer Sciences / /

Person

Li / Jim / Carl Alice / JOHN C. MITCHELL / Bob Given / John Q. Smith / Gunter / /

/

Position

System Security Officer / system administrator / access mediator / general HRU model / safety analysis / manager / precise model for security analysis / RT family / manager / SA.delegatedAccess / manager SA.access / employee SA.manager / RT / first author / author was / General / sub-language RT / manager SA.delegatedAccess / SA.manager / SA.delegatedAccess / programmer / /

ProgrammingLanguage

Datalog / R / /

ProvinceOrState

Maryland / California / /

SportsLeague

Stanford University / /

Technology

Operating Systems / /

SocialTag