메뉴 건너뛰기




Volumn 168, Issue 1, 2001, Pages 68-92

Static analysis for the π-calculus with applications to security

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; POLYNOMIALS; SEMANTICS; SET THEORY;

EID: 0035838828     PISSN: 08905401     EISSN: None     Source Type: Journal    
DOI: 10.1006/inco.2000.3020     Document Type: Article
Times cited : (64)

References (45)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • September 1999
    • Abadi, M. (1999), Secrecy by typing in security protocols, J. ACM 46(5), 749-786, September 1999. Extended Abstract, in "Proceedings of Theoretical Aspects of Computer Software 1997," pp. 611-638, Springer-Verlag, Berlin/New York. [Extended version to appear in J. ACM]
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0001772130 scopus 로고    scopus 로고
    • Springer-Verlag, Berlin/New York. [Extended version to appear in J. ACM]
    • Abadi, M. (1999), Secrecy by typing in security protocols, J. ACM 46(5), 749-786, September 1999. Extended Abstract, in "Proceedings of Theoretical Aspects of Computer Software 1997," pp. 611-638, Springer-Verlag, Berlin/New York. [Extended version to appear in J. ACM]
    • (1997) Proceedings of Theoretical Aspects of Computer Software 1997 , pp. 611-638
  • 3
    • 84878558984 scopus 로고    scopus 로고
    • Protection in programming-language translations
    • "Proceedings of ICALP'98," Springer-Verlag, Berlin/New York
    • Abadi, M. (1998), Protection in programming-language translations, in "Proceedings of ICALP'98," Lecture Notes in Computer Science, Vol. 1443, pp. 868-883, Springer-Verlag, Berlin/New York.
    • (1998) Lecture Notes in Computer Science , vol.1443 , pp. 868-883
    • Abadi, M.1
  • 4
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols - The Spi calculus
    • Abadi, M., and Gordon, A. D. (1999), A calculus for cryptographic protocols-The Spi calculus, Inform. and Comput. 148(1), 1-70.
    • (1999) Inform. and Comput. , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 5
    • 84957064722 scopus 로고    scopus 로고
    • An asynchronous model of locality failure, and process mobility
    • "Proceedings of COORDINATION'97," Springer-Verlag, Berlin/New York
    • Amadio, R. M. (1997), An asynchronous model of locality failure, and process mobility, in "Proceedings of COORDINATION'97," Lecture Notes in Computer Science, Vol. 1282, pp. 374-391. Springer-Verlag, Berlin/New York.
    • (1997) Lecture Notes in Computer Science , vol.1282 , pp. 374-391
    • Amadio, R.M.1
  • 7
    • 0003973586 scopus 로고    scopus 로고
    • Ph.D. thesis, TD-2/00 Department of Computer Science, University of Pisa
    • Bodei, C. (2001), "Security Issues in Process Calculi," Ph.D. thesis, TD-2/00 Department of Computer Science, University of Pisa.
    • (2001) Security Issues in Process Calculi
    • Bodei, C.1
  • 8
    • 84945976575 scopus 로고    scopus 로고
    • Control flow analysis for the π-calculus
    • "Proceedings of CONCUR'98," Springer-Verlag, Berlin/New York
    • Bodei, C., Degano, P., Nielson F., and RiisNielsen, H. (1998), Control flow analysis for the π-calculus, in "Proceedings of CONCUR'98," Lecture Notes in Computer Science, Vol. 1466, pp. 84-98, Springer-Verlag, Berlin/New York.
    • (1998) Lecture Notes in Computer Science , vol.1466 , pp. 84-98
    • Bodei, C.1    Degano, P.2    Nielsen, F.3    Riisnielson, H.4
  • 9
    • 84937705299 scopus 로고    scopus 로고
    • Static analysis of processes for no read-up and no write down
    • "Proceedings of FoSSaCS'99," Springer-Verlag, Berlin/New York
    • Bodei, C., Degano, P., Nielson, F., and Riis Nielsen H. (1999), Static analysis of processes for no read-up and no write down, in "Proceedings of FoSSaCS'99," Lecture Notes in Computer Science, vol. 1578, pp. 120-134, Springer-Verlag, Berlin/New York.
    • (1999) Lecture Notes in Computer Science , vol.1578 , pp. 120-134
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Riis Nielsen, H.4
  • 10
    • 84947919695 scopus 로고    scopus 로고
    • Mobile ambients
    • "Proceedings of FoSSaCS'98," Springer-Verlag, Berlin/New York
    • Cardelli, L., and Gordon, A. D. (1998), Mobile ambients, in "Proceedings of FoSSaCS'98," Lecture Notes in Computer Science, Vol. 1378, pp. 140-155, Springer-Verlag, Berlin/New York.
    • (1998) Lecture Notes in Computer Science , vol.1378 , pp. 140-155
    • Cardelli, L.1    Gordon, A.D.2
  • 11
    • 0030681155 scopus 로고    scopus 로고
    • Types as abstract interpretations
    • Assoc. Comput. Mach. Press, New York
    • Cousot, P. (1997), Types as abstract interpretations, in "Proceedings of POPL'97," pp. 316-331, Assoc. Comput. Mach. Press, New York.
    • (1997) Proceedings of POPL'97 , pp. 316-331
    • Cousot, P.1
  • 12
    • 0018294932 scopus 로고
    • Systematic design of program analysis frameworks
    • Assoc. Comput. Mach. Press, New York
    • Cousot, P., and Cousot, R. (1979), Systematic design of program analysis frameworks, in "Proceedings of POPL'79," pp. 269-282, Assoc. Comput. Mach. Press, New York.
    • (1979) Proceedings of POPL'79 , pp. 269-282
    • Cousot, P.1    Cousot, R.2
  • 13
    • 0031601027 scopus 로고    scopus 로고
    • Proving trust in systems of second-order processes
    • IEEE Comput Soc., Los Alamitoes, CA
    • Dam, M. (1998), Proving trust in systems of second-order processes (extended abstract), in "Proceedings of HICSS 31," Vol. VII, pp. 255-264, IEEE Comput Soc., Los Alamitoes, CA.
    • (1998) Proceedings of HICSS 31 , vol.7 , pp. 255-264
    • Dam, M.1
  • 17
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi, R., and Gorrieri, R. (1997), The compositional security checker: A tool for the verification of information flow security properties, IEEE Trans. Software Eng. 23(9).
    • (1997) IEEE Trans. Software Eng. , vol.23 , Issue.9
    • Focardi, R.1    Gorrieri, R.2
  • 18
    • 84957891695 scopus 로고    scopus 로고
    • Implicit typing à la ML for the join calculus
    • "Proceedings of CONCUR'97," Springer-Verlag, Berlin/New York
    • Fournet, C., Laneve, C., Maranget, L., and Remy, D. (1997), Implicit typing à la ML for the join calculus, in "Proceedings of CONCUR'97," Lecture Notes in Computer Science, Vol. 1243, pp. 196-212, Springer-Verlag, Berlin/New York.
    • (1997) Lecture Notes in Computer Science , vol.1243 , pp. 196-212
    • Fournet, C.1    Laneve, C.2    Maranget, L.3    Remy, D.4
  • 19
    • 0030645011 scopus 로고    scopus 로고
    • Systematic realisation of control flow analysis CML
    • Assoc. Comput. Mach. Press, New York
    • Gasser, K. L. S., Nielsen, F., and Nielsen, H. R. (1997), Systematic realisation of control flow analysis CML, in "Proceedings of ICFP' 97," pp. 38-51, Assoc. Comput. Mach. Press, New York.
    • (1997) Proceedings of ICFP' 97 , pp. 38-51
    • Gasser, K.L.S.1    Nielsen, F.2    Nielsen, H.R.3
  • 22
    • 84957649493 scopus 로고    scopus 로고
    • Abstract interpretation of mobile ambients
    • "Proceedings of SAS' 99," Springer-Verlag, Berlin/New York
    • Hansen, R. R., Jenson, J. G., Nielsen, F., and Nielsen, H. R. (1999), Abstract interpretation of mobile ambients, in "Proceedings of SAS' 99," Lecture Notes in Computer Science, Vol. 1694, pp. 135-148, Springer-Verlag, Berlin/New York.
    • (1999) Lecture Notes in Computer Science , vol.1694 , pp. 135-148
    • Hansen, R.R.1    Jenson, J.G.2    Nielsen, F.3    Nielsen, H.R.4
  • 23
    • 0031701347 scopus 로고    scopus 로고
    • The SLam calculus: Programming with secrecy and integrity
    • Assoc. Comput. Mech. Press, New York
    • Heintze, N., and Riecke, J. G. (1998), The SLam calculus: Programming with secrecy and integrity, in "Proceedings of POPL '98," pp. 365-377, Assoc. Comput. Mech. Press, New York.
    • (1998) Proceedings of POPL '98 , pp. 365-377
    • Heintze, N.1    Riecke, J.G.2
  • 24
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson, B. W. (1973), A note on the confinement problem, Comm. Assoc. Comput. Mach. 16(10), 613-615.
    • (1973) Comm. Assoc. Comput. Mach. , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 30
    • 44049113210 scopus 로고
    • A calculus of mobile processes (I and II)
    • Milner, R., Parrow, J., and Walker, D. (1992), A calculus of mobile processes (I and II), Inform. and Comput. 100(1), 1-77.
    • (1992) Inform. and Comput. , vol.100 , Issue.1 , pp. 1-77
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 31
  • 34
    • 84945268253 scopus 로고    scopus 로고
    • Control-flow analysis in cubic time
    • "Proceedings of ESOP 2001," Springer-Verlag, Berlin/New York
    • Nielsen, F., and Seidl, H. (2001), Control-Flow Analysis in Cubic Time, in "Proceedings of ESOP 2001," LNCS, Vol. 2028, pp. 252-268, Springer-Verlag, Berlin/New York.
    • (2001) LNCS , vol.2028 , pp. 252-268
    • Nielsen, F.1    Seidl, H.2
  • 35
  • 37
    • 0001518312 scopus 로고    scopus 로고
    • Typing and sub-typing for mobile processes
    • Pierce, B. C., and Sangiorgi, D. (1996), Typing and sub-typing for mobile processes, Math. Structures Comput. Sci. 6(5) 409-454.
    • (1996) Math. Structures Comput. Sci. , vol.6 , Issue.5 , pp. 409-454
    • Pierce, B.C.1    Sangiorgi, D.2
  • 38
    • 0031675817 scopus 로고    scopus 로고
    • A typed language for distributed mobile processes
    • Assoc. Comput. Math. Press, New York
    • Riely, J., and Hennessy, M. (1998), A typed language for distributed mobile processes, in "Proceedings of POPL'98," pp. 378-390, Assoc. Comput. Math. Press, New York.
    • (1998) Proceedings of POPL'98 , pp. 378-390
    • Riely, J.1    Hennessy, M.2
  • 40
    • 84878539063 scopus 로고    scopus 로고
    • Global/local subtyping and capability inference for a distributed π-calculus
    • "Proceedings of ICALP'98," Springer-Verlag, Berlin/New York
    • Sewell, P. (1998), Global/local subtyping and capability inference for a distributed π-calculus, in "Proceedings of ICALP'98," Lecture Notes in Computer Science, Vol. 1443, pp. 695-706, Springer-Verlag, Berlin/New York.
    • (1998) Lecture Notes in Computer Science , vol.1443 , pp. 695-706
    • Sewell, P.1
  • 41
    • 84956693522 scopus 로고
    • Control flow analysis in Scheme
    • ACM SIGPLAN Notices
    • Shivers, O. (1988), Control flow analysis in Scheme, in "Proceedings of PLDI'88," Vol. 7(1), ACM SIGPLAN Notices.
    • (1988) Proceedings of PLDI'88 , vol.7 , Issue.1
    • Shivers, O.1
  • 42
    • 84878643881 scopus 로고    scopus 로고
    • Abstract interpretation of the π-calculus
    • "Analysis and Verification of Multiple Agent Languages," Springer-Verlag, Berlin/New York
    • Venet, A. (1997), Abstract interpretation of the π-calculus, in "Analysis and Verification of Multiple Agent Languages," Lecture Notes in Computer Science, Vol. 1192, pp. 51-75, Springer-Verlag, Berlin/New York.
    • (1997) Lecture Notes in Computer Science , vol.1192 , pp. 51-75
    • Venet, A.1
  • 43
    • 84905055376 scopus 로고    scopus 로고
    • Automatic determination of communications topologies in mobile systems
    • "Proceedings of SAS'98," Springer-Verlag, Berlin/New York
    • Venet, A. (1998), Automatic determination of communications topologies in mobile systems, in "Proceedings of SAS'98," Lecture Notes in Computer Science Vol. 1503, pp. 152-167, Springer-Verlag, Berlin/New York.
    • (1998) Lecture Notes in Computer Science , vol.1503 , pp. 152-167
    • Venet, A.1
  • 44
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • Assoc. Comput. Math. Press, New York
    • Volpano, D., and Smith, G. (1998), Secure information flow in a multi-threaded imperative language, in "Proceedings of POPL'98," pp. 355-364, Assoc. Comput. Math. Press, New York.
    • (1998) Proceedings of POPL'98 , pp. 355-364
    • Volpano, D.1    Smith, G.2
  • 45
    • 0001905093 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Volpano, D., Smith, G., and Irvine, C. (1996), A sound type system for secure flow analysis, J. Comput. Security 4, 4-21.
    • (1996) J. Comput. Security , vol.4 , pp. 4-21
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.