UP | HOME

Bibliography

[1]
R. Pang et al., “Zanzibar: Google’s consistent, global authorization system,” in 2019 USENIX annual technical conference (USENIX ATC 19), 2019, pp. 33–46. doi: 10.5555/3358807.3358811.
[2]
E. Wobber, M. Abadi, M. Burrows, and B. Lampson, “Authentication in the taos operating system,” in ACM transactions on computer systems, in Acm transactions on computer systems, no. 1, vol. 12. Association for Computing Machinery, 1994, pp. 3–32. doi: 174613.174614.
[3]
J. Rees, “A security kernel based on the lambda calculus,” MIT; https://archive.org/details/bitsavers_mitaiaimAI_519667, A.I. Memo 1564, 1996.
[4]
L. Lamport, “Time, clocks, and the ordering of events in a distributed system,” Communications of the acm, vol. 21, no. 7, pp. 558–565, Jul. 1978, doi: 10.1145/359545.359563.
[5]
C. Kormanyos, Real-Time C++: Efficient Object-Oriented and Template Microcontroller Programming. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. doi: 10.1007/978-3-662-62996-3.
[6]
D. Hoyte, Let over lambda. Lulu.com, 2008.
[7]
P. Graham, On LISP: Advanced techniques for common LISP. Prentice-Hall, Inc., 1993.
[8]
D. F. Ferraiolo and D. R. Kuhn, “Role-Based Access Controls,” Jun. 2009, arXiv. doi: 10.48550/arXiv.0903.2171.
[9]
D. Feldman et al., Solving the bottom turtle — a SPIFFE way to establish trust in your infrastructure via universal identity. 2020. Available: https://spiffe.io/pdf/Solving-the-bottom-turtle-SPIFFE-SPIRE-Book.pdf
[10]
J. C. Corbett et al., “Spanner: Google’s Globally Distributed Database,” Acm transactions on computer systems, vol. 31, no. 3, pp. 1–22, Aug. 2013, doi: 10.1145/2491245.
[11]
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin, “A calculus for access control in distributed systems,” Acm transactions on programming languages and systems, vol. 15, no. 4, pp. 706–734, Sep. 1993, doi: 10.1145/155183.155225.
[12]
M. Abadi, M. Burrows, H. Pucha, A. Sadovsky, A. Shankar, and A. Taly, “Distributed authorization with distributed grammars,” in Essays dedicated to pierpaolo degano on programming languages with applications to biology and security - volume 9465, Berlin, Heidelberg: Springer-Verlag, 2015, pp. 10–26. doi: 10.5555/2963891.2963894.