메뉴 건너뛰기




Volumn , Issue , 2001, Pages 103-114

Trust in the pi-calculus

Author keywords

Runtime coercion; Trust analysis; Type annotations; calculus

Indexed keywords

ALGORITHMS; BOOLEAN ALGEBRA; DATA FLOW ANALYSIS; SECURITY OF DATA;

EID: 0035790273     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/773184.773196     Document Type: Conference Paper
Times cited : (3)

References (26)
  • 1
    • 0013158911 scopus 로고    scopus 로고
    • http://www.beowuff.org/.
  • 2
    • 0013065940 scopus 로고    scopus 로고
    • http://www.seti.org/.
  • 3
    • 0013067226 scopus 로고    scopus 로고
    • http://www.distributed.net/.
  • 4
    • 0013067931 scopus 로고    scopus 로고
    • http://www.popularpower.com/.
  • 7
    • 0016949746 scopus 로고
    • A lattice model of information flow
    • May
    • D. E. Denning. A lattice model of information flow. Communications of the ACM, 19(5):236-243, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 8
    • 84974577536 scopus 로고    scopus 로고
    • Information flow vs. resource access in the asynchronous pi-calculus
    • 27th International Colloquium on Automata, Languages and Programming (ICALP '2000). Springer-Verlag, Berlin Germany, July. A longer version appeared as Computer Science Technical Report 2000:03, School of Cognitive and Computing Sciences, University of Sussex
    • M. Hennessy and J. Riely. Information flow vs. resource access in the asynchronous pi-calculus. In 27th International Colloquium on Automata, Languages and Programming (ICALP '2000), Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, July 2000. A longer version appeared as Computer Science Technical Report 2000:03, School of Cognitive and Computing Sciences, University of Sussex.
    • (2000) Lecture Notes in Computer Science
    • Hennessy, M.1    Riely, J.2
  • 9
    • 84947269249 scopus 로고    scopus 로고
    • Secure information flow as typed process behaviour
    • G. Smolka, editor, Held as Part of the Joint European Conferences on Theory and Practice of Software (ETAPS 2000), (Berlin, Germany, March/April 2000), of lncs. sv
    • K. Honda, V. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In G. Smolka, editor, Programming Languages and Systems: Proceedings of the 9th European Symposium on Programming (ESOP 2000), Held as Part of the Joint European Conferences on Theory and Practice of Software (ETAPS 2000), (Berlin, Germany, March/April 2000), volume 1782 of lncs, pages 180-199. sv, 2000.
    • (2000) Programming Languages and Systems: Proceedings of the 9th European Symposium on Programming (ESOP 2000) , vol.1782 , pp. 180-199
    • Honda, K.1    Vasconcelos, V.2    Yoshida, N.3
  • 10
    • 0034714632 scopus 로고    scopus 로고
    • Type reconstruction for linear pi-calculus with I/O subtyping
    • An extended abstract appeared in the Proceedings of SAS '97, LNCS 1302
    • A. Igarashi and N. Kobayashi. Type reconstruction for linear pi-calculus with I/O subtyping. Journal of Information and Computation, 161(1):1-44, 2000. An extended abstract appeared in the Proceedings of SAS '97, LNCS 1302.
    • (2000) Journal of Information and Computation , vol.161 , Issue.1 , pp. 1-44
    • Igarashi, A.1    Kobayashi, N.2
  • 12
    • 0013116981 scopus 로고
    • Boolean unification - The story so far
    • C. Kirchner, editor. Academic Press
    • U. Martin and T. Nipkow. Boolean unification - the story so far. In C. Kirchner, editor, Unification, pages 437-456. Academic Press, 1990.
    • (1990) Unification , pp. 437-456
    • Martin, U.1    Nipkow, T.2
  • 13
    • 0000511698 scopus 로고
    • The polyadic π-calculus: A tutorial
    • F. L. Hamer, W. Brauer, and H. Schwichtenberg, editors. Springer-Verlag
    • R. Milner. The polyadic π-calculus: A tutorial. In F. L. Hamer, W. Brauer, and H. Schwichtenberg, editors, Logic and Algebra of Specification. Springer-Verlag, 1993.
    • (1993) Logic and Algebra of Specification
    • Milner, R.1
  • 16
    • 0001800257 scopus 로고    scopus 로고
    • Safe, untrusted agents using proof-carrying code
    • G. Vigna, editor, Mobile Agents and Security. Springer-Verlag
    • G. C. Necula and P. Lee. Safe, untrusted agents using proof-carrying code. In G. Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419
    • Necula, G.C.1    Lee, P.2
  • 17
    • 1442284555 scopus 로고
    • Can you trust your Data?
    • M. I. S. P. D. Mosses and M. Nielsen, editors, Proceedings of the TAPSOFT/FASE'95 Conference, Aarhus, Denmark, may. Springer-Verlag
    • P. Ørbæk. Can you Trust your Data? In M. I. S. P. D. Mosses and M. Nielsen, editors, Proceedings of the TAPSOFT/FASE'95 Conference, volume 915 of LNCS of Springer Lecture Notes in Computer Science, pages 575-590, Aarhus, Denmark, may 1995. Springer-Verlag.
    • (1995) LNCS of Springer Lecture Notes in Computer Science , vol.915 , pp. 575-590
    • Ørbæk, P.1
  • 18
    • 84955596529 scopus 로고
    • Trust in the λ-calculus
    • A. Mycroft, editor, SAS'95: Static Analysis. Springer-Verlag
    • J. Palsberg and P. Ørbæk. Trust in the λ-calculus. In A. Mycroft, editor, SAS'95: Static Analysis, volume 983 of Lecture Notes in Computer Science, pages 314-330. Springer-Verlag, 1995.
    • (1995) Lecture Notes in Computer Science , vol.983 , pp. 314-330
    • Palsberg, J.1    Ørbæk, P.2
  • 19
    • 84957869855 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Lecture Notes in Computer Science, 1576:40-58, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1576 , pp. 40-58
    • Sabelfeld, A.1    Sands, D.2
  • 20
    • 0013114992 scopus 로고
    • From pi-calculus to higher-order pi-calculus-and back
    • Springer Verlag, LNCS 668
    • D. Sangiorgi. From pi-calculus to higher-order pi-calculus-and back. In TAPSOFT. Springer Verlag, LNCS 668, 1993.
    • (1993) TAPSOFT
    • Sangiorgi, D.1
  • 23
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Dec.
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, Dec. 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 25
    • 0013068230 scopus 로고    scopus 로고
    • Linear, strictness and usage logics
    • M. E. Houle and P. Eades, editors, Townsville, Jan. 29-30. Australian Computer Science Communications
    • D. A. Wright. Linear, strictness and usage logics. In M. E. Houle and P. Eades, editors, Proceedings of Conference on Computing: The Australian Theory Symposium, pages 73-80, Townsville, Jan. 29-30 1996. Australian Computer Science Communications.
    • (1996) Proceedings of Conference on Computing: The Australian Theory Symposium , pp. 73-80
    • Wright, D.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.