Self-adaptation and secure information flow in multiparty communications
DOI10.1007/S00165-016-0381-3zbMATH Open1345.68232DBLPjournals/fac/CastellaniDP16arXiv1408.5978OpenAlexW2464556723WikidataQ57652348 ScholiaQ57652348MaRDI QIDQ315296FDOQ315296
Authors: Ilaria Castellani, Mariangiola Dezani-Ciancaglini, Jorge A. Pérez
Publication date: 20 September 2016
Published in: Formal Aspects of Computing (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1408.5978
Recommendations
Distributed systems (68M14) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Cites Work
- Multiparty asynchronous session types
- Adaptable processes
- A lattice model of secure information flow
- Subtyping for session types in the pi calculus
- Types and programing languages
- Multiple facets for dynamic information flow
- Information flow safety in multiparty sessions
- Multiparty Asynchronous Session Types
- Tracking Information Flow in Dynamic Tree Structures
- Secure Enforcement for Global Process Specifications
- Timed multiparty session types
- Secure Information Flow as a Safety Property
- Typing access control and secure information flow in sessions
- Session types = intersection types + union types
- Monitoring networks through multiparty session types
- Information flow inference for ML
- Global progress for dynamically interleaved multiparty sessions
- Structured Communication-Centred Programming for Web Services
- Combining behavioural types with security analysis
Cited In (9)
- Title not available (Why is that?)
- On runtime enforcement via suppressions
- Data-driven adaptation for smart sessions
- Reversibility in session-based concurrency: a fresh look
- Exploring type-level bisimilarity towards more expressive multiparty session types
- Title not available (Why is that?)
- Event-based run-time adaptation in communication-centric systems
- On first-order runtime enforcement of branching-time properties
- Title not available (Why is that?)
Uses Software
This page was built for publication: Self-adaptation and secure information flow in multiparty communications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q315296)