Formal security analysis of basic network-attached storage
- 11 November 2005
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Typing correspondence assertions for communication protocolsTheoretical Computer Science, 2003
- Building secure file systems out of byzantine storagePublished by Association for Computing Machinery (ACM) ,2002
- Secure Implementation of Channel AbstractionsInformation and Computation, 2002
- Mobile values, new names, and secure communicationPublished by Association for Computing Machinery (ACM) ,2001
- Authentication primitives and their compilationPublished by Association for Computing Machinery (ACM) ,2000
- Authenticating network attached storageIEEE Micro, 2000
- Secrecy by typing in security protocolsJournal of the ACM, 1999
- The Polyadic π-Calculus: a TutorialPublished by Springer Nature ,1993
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- Fully abstract models of typed λ-calculiTheoretical Computer Science, 1977