Controlling information release in the \(\pi\)-calculus
From MaRDI portal
Publication:2643083
DOI10.1016/j.ic.2007.01.001zbMath1121.68079OpenAlexW2036635102MaRDI QIDQ2643083
Publication date: 23 August 2007
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2007.01.001
Related Items (5)
The complexity of synchronous notions of information flow security ⋮ Unnamed Item ⋮ A calculus of trustworthy ad hoc networks ⋮ Persistent Stochastic Non-Interference ⋮ The \(C_\pi\)-calculus: a model for confidential name passing
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The security pi-calculus and non-interference
- Verifying persistent security properties
- Bisimulation-based Non-deterministic Admissible Interference and its Application to the Analysis of Cryptographic Protocols
- Typed behavioural equivalences for processes in the presence of subtyping
- A uniform type structure for secure information flow
- Trustworthy Global Computing
- CONCUR 2005 – Concurrency Theory
This page was built for publication: Controlling information release in the \(\pi\)-calculus