The security pi-calculus and non-interference
From MaRDI portal
Publication:1772311
DOI10.1016/j.jlap.2004.01.003zbMath1067.68096OpenAlexW1999420484MaRDI QIDQ1772311
Publication date: 18 April 2005
Published in: The Journal of Logic and Algebraic Programming (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/2262/56473
Related Items (6)
Controlling information release in the \(\pi\)-calculus ⋮ Combining behavioural types with security analysis ⋮ A Testing Theory for a Higher-Order Cryptographic Language ⋮ The \(C_\pi\)-calculus: a model for confidential name passing ⋮ A static analysis of cryptographic processes: the denotational approach ⋮ Type-based information flow analysis for the \(\pi\)-calculus
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Modal logics for mobile processes
- Non-interference through determinism
- Testing equivalences for processes
- Resource access control in systems of mobile agents
- Typed behavioural equivalences for processes in the presence of subtyping
- A uniform type structure for secure information flow
- Behavioral equivalence in the polymorphic pi-calculus
This page was built for publication: The security pi-calculus and non-interference