Controlling information release in the -calculus
From MaRDI portal
Publication:2643083
Recommendations
Cites work
- scientific article; zbMATH DE number 1948408 (Why is no real title available?)
- scientific article; zbMATH DE number 1538026 (Why is no real title available?)
- scientific article; zbMATH DE number 1884409 (Why is no real title available?)
- A uniform type structure for secure information flow
- Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols
- CONCUR 2005 – Concurrency Theory
- Nondeterministic admissible interference
- The \(\pi\)-calculus: A theory of mobile processes
- The security pi-calculus and non-interference
- Trustworthy Global Computing
- Typed behavioural equivalences for processes in the presence of subtyping
- Verifying persistent security properties
Cited in
(7)- A calculus of trustworthy ad hoc networks
- Privacy by typing in the \(\pi\)-calculus
- Static analysis for the \(\pi\)-calculus with applications to security
- Persistent stochastic non-interference
- The complexity of synchronous notions of information flow security
- scientific article; zbMATH DE number 7447774 (Why is no real title available?)
- The \(C_\pi\)-calculus: a model for confidential name passing
This page was built for publication: Controlling information release in the \(\pi\)-calculus
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2643083)