메뉴 건너뛰기




Volumn 39, Issue 1, 2004, Pages 147-160

Channel dependent types for higher-order mobile processes

Author keywords

Access control; Mobile processes; Secrecy; The higher order calculus; Types

Indexed keywords

CODES (SYMBOLS); COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTER NETWORKS; COMPUTER PROGRAMMING LANGUAGES; CONCURRENT ENGINEERING; DIFFERENTIATION (CALCULUS); MULTIMEDIA SYSTEMS; SECURITY OF DATA; WORLD WIDE WEB;

EID: 1442336686     PISSN: 03621340     EISSN: None     Source Type: Journal    
DOI: 10.1145/982962.964014     Document Type: Conference Paper
Times cited : (8)

References (57)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Abadi, M., Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 7
    • 1442284573 scopus 로고    scopus 로고
    • MJ: An imperative core calculus for java and java with effects
    • UCAM-CL-TR-563, Cambridge
    • Bierman, G.M., Parkinson, M.J and Pitts, A.M., MJ: an imperative core calculus for Java and Java with effects, UCAM-CL-TR-563, Cambridge, 2003.
    • (2003)
    • Bierman, G.M.1    Parkinson, M.J.2    Pitts, A.M.3
  • 9
    • 1442309168 scopus 로고    scopus 로고
    • The seal calculus
    • Castagna, G., Vitek, J. and Zappa, F., The seal calculus, 2003, available from ftp://ftp.di.ens.fr/pub/castagna/.
    • (2003)
    • Castagna, G.1    Vitek, J.2    Zappa, F.3
  • 10
    • 12444299406 scopus 로고    scopus 로고
    • Information flow security in boxed ambients
    • Crafa, S., Bugliesi, M. and Castagna, G., Information Flow Security in Boxed Ambients, ENTCS 66 No. 3, 2003.
    • (2003) ENTCS , vol.66 , Issue.3
    • Crafa, S.1    Bugliesi, M.2    Castagna, G.3
  • 11
    • 0017517624 scopus 로고    scopus 로고
    • Certification of programs for secure information flow
    • ACM
    • Denning, D. and Denning, P., Certification of programs for secure information flow. Communication of ACM, ACM, 20:504-513, 1997.
    • (1997) Communication of ACM , vol.20 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 12
    • 0036041144 scopus 로고    scopus 로고
    • Stack inspection: Theory and Variants
    • ACM
    • Fournet, C. and Gordon, A.D., Stack Inspection: theory and variants, POPL, 307-318, ACM, 2002.
    • (2002) POPL , pp. 307-318
    • Fournet, C.1    Gordon, A.D.2
  • 13
    • 0038414953 scopus 로고    scopus 로고
    • Typing correspondence assertions for communication protocols
    • Gordon, A. and Jeffrey, A., Typing correspondence assertions for communication protocols, TCS, 300(2003):379-409.
    • (2003) TCS , vol.300 , pp. 379-409
    • Gordon, A.1    Jeffrey, A.2
  • 14
    • 0041865338 scopus 로고    scopus 로고
    • Separating access control policy, enforcement, and functionality in extensible systems
    • Feb.
    • Grimm, R. and Bershad, B., Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems, ACM Transactions on Computer Systems, 19(1):36-70, Feb., 2001.
    • (2001) ACM Transactions on Computer Systems , vol.19 , Issue.1 , pp. 36-70
    • Grimm, R.1    Bershad, B.2
  • 16
    • 0031701347 scopus 로고    scopus 로고
    • The SLam calculus: Programming with secrecy and integrity
    • ACM Press
    • Heintze, N. and Riecke, J., The SLam Calculus: Programming with Secrecy and Integrity, POPL'98, pp.365-377. ACM Press, 1998.
    • (1998) POPL'98 , pp. 365-377
    • Heintze, N.1    Riecke, J.2
  • 17
    • 1442358025 scopus 로고    scopus 로고
    • SafeDpi: A language for controlling mobile code
    • Sussex Technical Report, 2003/02
    • Hennessy, M., Rathke, J. and Yoshida, N, SafeDpi: a language for controlling mobile code, Sussex Technical Report, 2003/02, 2003.
    • (2003)
    • Hennessy, M.1    Rathke, J.2    Yoshida, N.3
  • 18
    • 0029719979 scopus 로고    scopus 로고
    • Composing processes
    • ACM
    • Honda, K., Composing Processes, POPL'96, pp.344-357, ACM, 1996.
    • (1996) POPL'96 , pp. 344-357
    • Honda, K.1
  • 19
    • 84947269249 scopus 로고    scopus 로고
    • Secure information flow as typed process behaviour
    • Springer
    • Honda, K., Vasconcelos, V. and Yoshida, N, Secure Information Flow as Typed Process Behaviour, ESOP'00, LNCS 1782, pp. 180-199, Springer, 2000.
    • (2000) ESOP'00, LNCS 1782 , pp. 180-199
    • Honda, K.1    Vasconcelos, V.2    Yoshida, N.3
  • 20
    • 0029404929 scopus 로고
    • On reduction-based process semantics
    • North-Holland
    • Honda, K. and Yoshida, N., On Reduction-Based Process Semantics. TCS, pp. 437-486, No.151, North-Holland, 1995.
    • (1995) TCS , Issue.151 , pp. 437-486
    • Honda, K.1    Yoshida, N.2
  • 21
    • 0000423953 scopus 로고    scopus 로고
    • Game-theoretic analysis of call-by-value computation
    • North-Holland
    • Honda, K. and Yoshida, N. Game-theoretic analysis of call-by-value computation. TCS Vol. 221 (1999), 393-456, North-Holland, 1999.
    • (1999) TCS , vol.221 , pp. 393-456
    • Honda, K.1    Yoshida, N.2
  • 22
    • 0036040303 scopus 로고    scopus 로고
    • A uniform type structure for secure information flow
    • ACM Press; The full version: a DOC technical report, Imperial College London, revised August 2003
    • Honda, K. and Yoshida, N., A Uniform Type Structure for Secure Information Flow, POPL'02, 81-92, ACM Press, 2002. The full version: a DOC technical report, Imperial College London, revised August 2003, available at: www.doc.ic.ac.uk/~yoshdia.
    • (2002) POPL'02 , pp. 81-92
    • Honda, K.1    Yoshida, N.2
  • 23
    • 1442358026 scopus 로고    scopus 로고
    • Noninterference through flow analysis
    • Sep
    • Honda, K. and Yoshida, N., Noninterference through Flow Analysis, 40 pages, Sep 2003, available at: www.doc.ic.ac.uk/~yoshdia.
    • (2003) , pp. 40
    • Honda, K.1    Yoshida, N.2
  • 24
    • 0034672932 scopus 로고    scopus 로고
    • On full abstraction for PCF: I, II and III
    • Hyland, M. and Ong, L., "On Full Abstraction for PCF": I, II and III. Info. & Comp. 163 (2000), 285-408.
    • (2000) Info. & Comp. , vol.163 , pp. 285-408
    • Hyland, M.1    Ong, L.2
  • 25
    • 0036039869 scopus 로고    scopus 로고
    • Resource usage analysis
    • Portland, OR, ACM
    • Igarashi, A. and Kobayashi, N., Resource Usage Analysis, POPL'02, 331-342, Portland, OR, ACM, 2002.
    • (2002) POPL'02 , pp. 331-342
    • Igarashi, A.1    Kobayashi, N.2
  • 26
    • 0035029826 scopus 로고    scopus 로고
    • A genetic type system for the Pi-calculus
    • ACM; To appear in TCS
    • Igarashi, A. and Kobayashi, N., A Genetic Type System for the Pi-Calculus, POPL'01, 128-141. ACM, 2001. To appear in TCS
    • (2001) POPL'01 , pp. 128-141
    • Igarashi, A.1    Kobayashi, N.2
  • 27
    • 0012583283 scopus 로고    scopus 로고
    • Featherweight Java: A minimal core calculus for Java and GJ
    • May
    • Igarashi, A., Pierce, B. and Wadler, P., Featherweight Java: A Minimal Core Calculus for Java and GJ. TOPLAS, 23(3):396-450, May 2001.
    • (2001) TOPLAS , vol.23 , Issue.3 , pp. 396-450
    • Igarashi, A.1    Pierce, B.2    Wadler, P.3
  • 28
    • 85039581713 scopus 로고    scopus 로고
    • Java, Sun Microsystems Inc., http://www.javasoft.com/.
  • 29
    • 85039581561 scopus 로고    scopus 로고
    • Contextual equivalence for higher-order pi-calculus revisited
    • Jeffrety, A. and Rathke, J., Contextual equivalence for higher-order pi-calculus revisited, MFPS XIX, Montreal, 2003.
    • MFPS XIX, Montreal, 2003
    • Jeffrety, A.1    Rathke, J.2
  • 31
    • 0001065208 scopus 로고    scopus 로고
    • Linear types and the π-calculus
    • Kobayashi, N., Pierce, B., and Turner, D., Linear types and the π-calculus, TOPLAS, 21(5):914-947, 1999.
    • (1999) TOPLAS , vol.21 , Issue.5 , pp. 914-947
    • Kobayashi, N.1    Pierce, B.2    Turner, D.3
  • 32
    • 1442333576 scopus 로고    scopus 로고
    • .NET framework developer's guide
    • Microsoft Corporation, .NET Framework Developer's Guide, http://msdn.microsoft.com, 2003.
    • (2003)
  • 33
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • Myers, M., JFlow: Practical mostly-static information flow control. POPL'99, 228-241, 1999.
    • (1999) POPL'99 , pp. 228-241
    • Myers, M.1
  • 35
    • 44049113210 scopus 로고
    • A calculus of mobile processes
    • Milner, R., Parrow, J.G. and Walker, D.J., A Calculus of Mobile Processes. Info. & Comp., 100(1), pp.1-77, 1992.
    • (1992) Info. & Comp. , vol.100 , Issue.1 , pp. 1-77
    • Milner, R.1    Parrow, J.G.2    Walker, D.J.3
  • 38
    • 84945270736 scopus 로고    scopus 로고
    • A systematic approach to access control
    • LNCS; Springer
    • Pottier, F., Skalka, C. and Smith, S., A systematic approach to access control. ESOP01, LNCS 30-45, Springer, 2001.
    • (2001) ESOP01 , pp. 30-45
    • Pottier, F.1    Skalka, C.2    Smith, S.3
  • 39
    • 0032646395 scopus 로고    scopus 로고
    • Trust and partial typing in open systems of mobile agents
    • ACM Press
    • Riely,J. and Hennessy, M., Trust and partial typing in open systems of mobile agents. POPL'99, ACM Press, 1999.
    • (1999) POPL'99
    • Riely, J.1    Hennessy, M.2
  • 40
    • 0003967839 scopus 로고
    • Expressing mobility in process algebras: First order and higher order paradigms
    • Ph.D. Thesis, University of Edinburgh, CST-99-93
    • Sangiorgi, D., Expressing Mobility in Process Algebras: First Order and Higher Order Paradigms. Ph.D. Thesis, University of Edinburgh, CST-99-93, 1993.
    • (1993)
    • Sangiorgi, D.1
  • 41
    • 1442333573 scopus 로고    scopus 로고
    • Asynchronous process calculi: The first-order and higher-order paradigms
    • Sangiorgi, D., Asynchronous process calculi: the first-order and higher-order paradigms, TCS, 1999.
    • (1999) TCS
    • Sangiorgi, D.1
  • 43
    • 85039587204 scopus 로고    scopus 로고
    • The M-calculus: A higher-order distributed process calculus
    • Schmitt, A. and Stefani, J-B., The M-calculus: A Higher-Order Distributed Process Calculus, POPL03, ACM, 2003.
    • POPL03, ACM, 2003
    • Schmitt, A.1    Stefani, J.-B.2
  • 44
    • 0037272061 scopus 로고    scopus 로고
    • Secure composition of untrusted code: Box pi, wrappers, and casuality types
    • Sewell, P. and Vitek, J., Secure Composition of Untrusted Code: Box pi, Wrappers, and Casuality Types. Vol. 11, Number 2, 135-188, Journal of Computers Security, 2003.
    • (2003) Journal of Computers Security , vol.11 , Issue.2 , pp. 135-188
    • Sewell, P.1    Vitek, J.2
  • 45
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • Smith, G., A New Type System for Secure Information Flow, CSFW'01, IEEE 2001.
    • CSFW'01, IEEE, 2001
    • Smith, G.1
  • 46
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • Smith, G. and Volpano, D., Secure information flow in a multi-threaded imperative language, pp. 355-364, POPL'98, ACM, 1998.
    • POPL'98, ACM, 1998 , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 47
    • 85024747258 scopus 로고
    • Typed concurrent objects
    • Springer-Verlag
    • Vasconcelos, V., Typed concurrent objects. ECOOP'94, LNCS 821, pp.100-117. Springer-Verlag, 1994.
    • (1994) ECOOP'94, LNCS 821 , pp. 100-117
    • Vasconcelos, V.1
  • 48
    • 0031542975 scopus 로고    scopus 로고
    • Extensible security architectures for Java
    • IEEE
    • Wallach, D.S. et al., Extensible security architectures for Java. SOSP, 116-128, IEEE, 1997.
    • (1997) SOSP , pp. 116-128
    • Wallach, D.S.1
  • 50
    • 85039581964 scopus 로고    scopus 로고
    • Nomadic pict: Correct communication infrastructure for mobile computation
    • Unypoth, A. and Sewell, P., Nomadic Pict: Correct Communication Infrastructure for Mobile Computation, POPL01, ACM, 2001.
    • POPL01, ACM, 2001
    • Unypoth, A.1    Sewell, P.2
  • 51
    • 84947920982 scopus 로고    scopus 로고
    • Graph types for monadic mobile processes
    • Springer; Full version as LFCS Technical Report, ECS-LFCS-96-350
    • Yoshida, N., Graph Types for Monadic Mobile Processes, FSTTCS'16, LNCS 1180, pp. 371-386, Springer, 1996. Full version as LFCS Technical Report, ECS-LFCS-96-350, 1996.
    • (1996) FSTTCS'16, LNCS 1180 , pp. 371-386
    • Yoshida, N.1
  • 52
    • 1442284569 scopus 로고    scopus 로고
    • Type-based liveness guarantee in the presence of nontermination and nondeterminism
    • April; MCS Technical Report, 2002-20, University of Leicester
    • Yoshida, N., Type-Based Liveness Guarantee in the Presence of Nontermination and Nondeterminism, April 2002. MCS Technical Report, 2002-20, University of Leicester, available at www.mcs.le.ac.uk/~yoshida.
    • (2002)
    • Yoshida, N.1
  • 53
    • 0034871529 scopus 로고    scopus 로고
    • Strong normalisation in the π-calculus
    • IEEE; Full version: to appear in Journal of Info. & Comp.
    • Yoshida, N., Berger, M. and Honda, K., Strong Normalisation in the π-Calculus, LICS'01, 311-322, IEEE, 2001. Full version: to appear in Journal of Info. & Comp., available at www.dos.ic.ac.uk/~yoshida.
    • (2001) LICS'01 , pp. 311-322
    • Yoshida, N.1    Berger, M.2    Honda, K.3
  • 54
    • 84888256815 scopus 로고    scopus 로고
    • Subtyping and locality in distributed higher order processes
    • Springer
    • Yoshida, N. and Hennessy, M., Subtyping and Locality in Distributed Higher Order Processes. CONCUR'99, LNCS 1664, pp.557-573, Springer, 1999.
    • (1999) CONCUR'99, LNCS 1664 , pp. 557-573
    • Yoshida, N.1    Hennessy, M.2
  • 55
    • 0036590522 scopus 로고    scopus 로고
    • Assigning types to processes
    • Academic Press; Extended abstract appeared in LICS'00
    • Yoshida, N. and Hennessy, M., Assigning Types to Processes, Info. & Comp., Volume 174, Issue 2, 143-179, Academic Press, 2002. Extended abstract appeared in LICS'00.
    • (2002) Info. & Comp. , vol.174 , Issue.2 , pp. 143-179
    • Yoshida, N.1    Hennessy, M.2
  • 57
    • 85039582958 scopus 로고    scopus 로고
    • The full version of this paper, Part I, II and III
    • The full version of this paper, Part I, II and III, available at www.doc.ic.ac.uk/~yoshida.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.