{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:07:59Z","timestamp":1725505679000},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540787389"},{"type":"electronic","value":"9783540787396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78739-6_17","type":"book-chapter","created":{"date-parts":[[2008,4,2]],"date-time":"2008-04-02T08:39:06Z","timestamp":1207125546000},"page":"208-223","source":"Crossref","is-referenced-by-count":4,"title":["Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects (Extended Abstract)"],"prefix":"10.1007","author":[{"given":"Andrew","family":"Cirillo","sequence":"first","affiliation":[]},{"given":"Radha","family":"Jagadeesan","sequence":"additional","affiliation":[]},{"given":"Corin","family":"Pitcher","sequence":"additional","affiliation":[]},{"given":"James","family":"Riely","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Chess, B., O\u2019Neil, Y.T., West, J.: Javascript hijacking. Technical report, Fortify Software (2007), http:\/\/www.fortifysoftware.com\/news-events\/releases\/2007\/2007-04-02.jsp"},{"issue":"4","key":"17_CR2","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst.\u00a010(4), 265\u2013310 (1992)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"1","key":"17_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/174613.174614","volume":"12","author":"E. Wobber","year":"1994","unstructured":"Wobber, E., Abadi, M., Burrows, M., Lampson, B.: Authentication in the Taos operating system. ACM Trans. Comput. Syst.\u00a012(1), 3\u201332 (1994)","journal-title":"ACM Trans. Comput. Syst."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Abadi, M., Fournet, C., Gonthier, G.: Authentication primitives and their compilation. In: POPL, pp. 302\u2013315 (2000)","DOI":"10.1145\/325694.325734"},{"key":"17_CR5","unstructured":"Landau, S.: Liberty ID-WSF security and privacy overview (2006), http:\/\/www.projectliberty.org\/"},{"key":"17_CR6","first-page":"262","volume-title":"ACSAC","author":"N. Li","year":"2004","unstructured":"Li, N., Mitchell, J.C., Tong, D.: Securing Java RMI-based distributed applications. In: ACSAC, pp. 262\u2013271. IEEE Computer Society, Los Alamitos (2004)"},{"key":"17_CR7","unstructured":"Scheifler, B., Venners, B.: A conversation with Bob Scheifler, part I, by Bill Venners (2002), http:\/\/www.artima.com\/intv\/jinisecu.html"},{"issue":"3","key":"17_CR8","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s00165-004-0058-1","volume":"17","author":"A.D. Gordon","year":"2005","unstructured":"Gordon, A.D., Pucella, R.: Validating a web service security abstraction by typing. Formal Asp. Comput.\u00a017(3), 277\u2013318 (2005)","journal-title":"Formal Asp. Comput."},{"issue":"4","key":"17_CR9","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B.W., Plotkin, G.D.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst.\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"17_CR10","first-page":"263","volume-title":"ICFP","author":"M. Abadi","year":"2006","unstructured":"Abadi, M.: Access control in a core calculus of dependency. In: ICFP, pp. 263\u2013273. ACM, New York (2006)"},{"key":"17_CR11","first-page":"283","volume":"19","author":"D. Garg","year":"2006","unstructured":"Garg, D., Pfenning, F.: Non-interference in constructive authorization logic. CSFW\u00a019, 283\u2013296 (2006)","journal-title":"CSFW"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/11863908_19","volume-title":"Computer Security \u2013 ESORICS 2006","author":"D. Garg","year":"2006","unstructured":"Garg, D., Bauer, L., Bowers, K.D., Pfenning, F., Reiter, M.K.: A linear logic of authorization and knowledge. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 297\u2013312. Springer, Heidelberg (2006)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Woo, T.Y.C., Lam, S.S.: A semantic model for authentication protocols. In: IEEE Symposium on Research in Security and Privacy (1993)","DOI":"10.1109\/RISP.1993.287633"},{"key":"17_CR14","volume-title":"CSF","author":"C. Fournet","year":"2007","unstructured":"Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization in distributed systems. In: CSF, IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"17_CR15","volume-title":"CSF","author":"A. Cirillo","year":"2007","unstructured":"Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do As I SaY! programmatic access control with explicit identities. In: CSF, IEEE, Los Alamitos (2007)"},{"issue":"4","key":"17_CR16","doi-asserted-by":"crossref","first-page":"451","DOI":"10.3233\/JCS-2003-11402","volume":"11","author":"A.D. Gordon","year":"2003","unstructured":"Gordon, A.D., Jeffrey, A.: Authenticity by typing for security protocols. Journal of Computer Security\u00a011(4), 451\u2013520 (2003)","journal-title":"Journal of Computer Security"},{"key":"17_CR17","first-page":"1171","volume-title":"SIGMOD Conference","author":"P. Buneman","year":"2007","unstructured":"Buneman, P., Tan, W.C.: Provenance in databases. In: SIGMOD Conference, pp. 1171\u20131173. ACM, New York (2007)"},{"issue":"4","key":"17_CR18","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1145\/363516.363520","volume":"9","author":"D.S. Wallach","year":"2000","unstructured":"Wallach, D.S., Appel, A.W., Felten, E.W.: SAFKASI: a security mechanism for language-based systems. ACM Trans. Softw. Eng. Methodol.\u00a09(4), 341\u2013378 (2000)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"17_CR19","unstructured":"Abadi, M., Fournet, C.: Access control based on execution history. In: Proc. Network and Distributed System Security Symp. (2003)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Gifford, D.K., Lucassen, J.M.: Integrating functional and imperative programming. In: LISP and Functional Programming, pp. 28\u201338 (1986)","DOI":"10.1145\/319838.319848"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Lucassen, J.M., Gifford, D.K.: Polymorphic effect systems. In: POPL, pp. 47\u201357 (1988)","DOI":"10.1145\/73560.73564"},{"issue":"3","key":"17_CR22","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1017\/S0956796800000393","volume":"2","author":"J. Talpin","year":"1992","unstructured":"Talpin, J., Jouvelot, P.: Polymorphic type, region and effect inference. J. Funct. Program.\u00a02(3), 245\u2013271 (1992)","journal-title":"J. Funct. Program."},{"issue":"2","key":"17_CR23","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1006\/inco.1994.1046","volume":"111","author":"J. Talpin","year":"1994","unstructured":"Talpin, J., Jouvelot, P.: The type and effect discipline. Inf. Comput.\u00a0111(2), 245\u2013296 (1994)","journal-title":"Inf. Comput."},{"key":"17_CR24","unstructured":"Bierman, G., Parkinson, M., Pitts, A.: MJ: An imperative core calculus for Java and Java with effects. Technical Report 563, Cambridge University Computer Laboratory (2003)"},{"key":"17_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/3-540-48743-3_10","volume-title":"ECOOP \u201999 - Object-Oriented Programming","author":"A. Greenhouse","year":"1999","unstructured":"Greenhouse, A., Boyland, J.: An object-oriented effects system. In: Guerraoui, R. (ed.) ECOOP 1999. LNCS, vol.\u00a01628, pp. 205\u2013229. Springer, Heidelberg (1999)"},{"key":"17_CR26","unstructured":"Grothoff, C., Palsberg, J., Vitek, J.: Encapsulating objects with confined types. In: TOPLAS (to appear, 2007)"},{"issue":"6","key":"17_CR27","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1017\/S0956796806006125","volume":"16","author":"A. Potanin","year":"2006","unstructured":"Potanin, A., Noble, J., Clarke, D., Biddle, R.: Featherweight generic confinement. J. Funct. Program.\u00a016(6), 793\u2013811 (2006)","journal-title":"J. Funct. Program."},{"key":"17_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-3-540-45208-9_9","volume-title":"Theoretical Computer Science","author":"F. Damiani","year":"2003","unstructured":"Damiani, F., Drossopoulou, S., Giannini, P.: Refined effects for unanticipated object re-classification: Fickle3. In: Blundo, C., Laneve, C. (eds.) ICTCS 2003. LNCS, vol.\u00a02841, pp. 97\u2013110. Springer, Heidelberg (2003)"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"DeLine, R., F\u00e4hndrich, M.: Enforcing high-level protocols in low-level software. In: PLDI, pp. 59\u201369 (2001)","DOI":"10.1145\/378795.378811"},{"key":"17_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/11580850_16","volume-title":"Trustworthy Global Computing","author":"M. Dezani-Ciancaglini","year":"2005","unstructured":"Dezani-Ciancaglini, M., Yoshida, N., Ahern, A., Drossopoulou, S.: A distributed object-oriented language with session types. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, vol.\u00a03705, pp. 299\u2013318. Springer, Heidelberg (2005)"},{"key":"17_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-3-540-31987-0_11","volume-title":"Programming Languages and Systems","author":"C. Fournet","year":"2005","unstructured":"Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol.\u00a03444, pp. 141\u2013156. Springer, Heidelberg (2005)"},{"issue":"1","key":"17_CR32","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Flatt, M., Krishnamurthi, S., Felleisen, M.: Classes and mixins. In: POPL, pp. 171\u2013183 (1998)","DOI":"10.1145\/268946.268961"},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"Igarashi, A., Pierce, B., Wadler, P.: Featherweight Java: A minimal core calculus for Java and GJ. In: OOPSLA (1999)","DOI":"10.1145\/320384.320395"},{"issue":"11","key":"17_CR35","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/(SICI)1096-9942(199901\/03)5:1<3::AID-TAPO2>3.0.CO;2-T","volume":"5","author":"S. Drossopoulou","year":"1999","unstructured":"Drossopoulou, S., Eisenbach, S., Khurshid, S.: Is the Java type system sound? Theory and Practice of Object Systems\u00a05(11), 3\u201324 (1999)","journal-title":"Theory and Practice of Object Systems"},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"Bracha, G., Odersky, M., Stoutamire, D., Wadler, P.: Making the future safe for the past: Adding genericity to the Java programming language. In: OOPSLA, pp. 183\u2013200 (1998)","DOI":"10.1145\/286936.286957"},{"issue":"1","key":"17_CR37","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1006\/inco.2002.3092","volume":"177","author":"A. Igarashi","year":"2002","unstructured":"Igarashi, A., Pierce, B.C.: On inner classes. Information and Computation\u00a0177(1), 56\u201389 (2002)","journal-title":"Information and Computation"},{"key":"17_CR38","unstructured":"Gordon, A.D., Hankin, P.D.: A concurrent object calculus: Reduction and typing. In: Proceedings HLCL\u201998, ENTCS (1998)"},{"key":"17_CR39","first-page":"286","volume-title":"POPL","author":"L. Cardelli","year":"1995","unstructured":"Cardelli, L.: A language with distributed scope. In: POPL, pp. 286\u2013297. ACM Press, New York (1995)"},{"key":"17_CR40","unstructured":"Jeffrey, A.S.A.: A distributed object calculus. In: Proc. Foundations of Object Oriented Languages (2000)"},{"key":"17_CR41","doi-asserted-by":"crossref","unstructured":"Castellani, I.: Process algebras with localities. In: Handbook of Process Algebra, North-Holland, pp. 945\u20131045 (2001)","DOI":"10.1016\/B978-044482830-9\/50033-3"},{"key":"17_CR42","volume-title":"Design Patterns","author":"E. Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns. Addison-Wesley, Reading (1995)"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78739-6_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:20:47Z","timestamp":1619522447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78739-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540787389","9783540787396"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78739-6_17","relation":{},"subject":[]}}