Controlling information release in the -calculus
From MaRDI portal
Publication:2643083
DOI10.1016/J.IC.2007.01.001zbMATH Open1121.68079OpenAlexW2036635102MaRDI QIDQ2643083FDOQ2643083
Authors: Silvia Crafa, Sabina Rossi
Publication date: 23 August 2007
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2007.01.001
Recommendations
Cites Work
- Verifying persistent security properties
- The \(\pi\)-calculus: A theory of mobile processes
- Title not available (Why is that?)
- Title not available (Why is that?)
- A uniform type structure for secure information flow
- Typed behavioural equivalences for processes in the presence of subtyping
- CONCUR 2005 – Concurrency Theory
- Title not available (Why is that?)
- The security pi-calculus and non-interference
- Trustworthy Global Computing
- Nondeterministic admissible interference
- Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols
Cited In (7)
- Privacy by typing in the \(\pi\)-calculus
- The \(C_\pi\)-calculus: a model for confidential name passing
- Title not available (Why is that?)
- The complexity of synchronous notions of information flow security
- A calculus of trustworthy ad hoc networks
- Persistent stochastic non-interference
- Static analysis for the \(\pi\)-calculus with applications to security
This page was built for publication: Controlling information release in the \(\pi\)-calculus
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2643083)