Cited By
View all- Disselkoen CEline AHe SHeadley KHicks MHietala KKastner JMamat AMcCutchen MRungta NShah BTorlak EWells Ad'Amorim M(2024)How We Built Cedar: A Verification-Guided ApproachCompanion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering10.1145/3663529.3663854(351-357)Online publication date: 10-Jul-2024
- Cutler JDisselkoen CEline AHe SHeadley KHicks MHietala KIoannidis EKastner JMamat AMcAdams DMcCutchen MRungta NTorlak EWells A(2024)Cedar: A New Language for Expressive, Fast, Safe, and Analyzable AuthorizationProceedings of the ACM on Programming Languages10.1145/36498358:OOPSLA1(670-697)Online publication date: 29-Apr-2024
- Ge YZhu Q(2024)GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332697519(540-554)Online publication date: 1-Jan-2024
- Show More Cited By