메뉴 건너뛰기




Volumn 2303, Issue , 2002, Pages 417-433

Linearity and bisimulation

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS; SEMANTICS;

EID: 19044369934     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45931-6_29     Document Type: Conference Paper
Times cited : (26)

References (36)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Abadi, M., Secrecy by typing in security protocols. Journal of the ACM, 46(5):749–786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0005294877 scopus 로고    scopus 로고
    • Secrecy in programming-language semantics
    • April
    • Abadi, M., Secrecy in programming-language semantics, MFPS XV, ENTCS, 20 (April 1999).
    • (1999) MFPS XV, ENTCS , pp. 20
    • Abadi, M.1
  • 5
    • 84949043041 scopus 로고    scopus 로고
    • Bisimulation in name-passing calculi without matching
    • Boreale, M. and Sangiorgi, D. Bisimulation in name-passing calculi without matching. LICS’98, IEEE, 1998.
    • (1998) LICS’98, IEEE
    • Boreale, M.1    Sangiorgi, D.2
  • 6
    • 84888883433 scopus 로고    scopus 로고
    • Sequentiality and the p-Calculus
    • Springer
    • Berger, M., Honda, K. and Yoshida, N., Sequentiality and the p-Calculus, TLCA’01, LNCS 2044, 29–45, Springer, 2001. The full version available at www.dcs.qmw.ac.uk/~kohei.
    • (2001) TLCA’01, LNCS , vol.2044 , pp. 29-45
    • Berger, M.1    Honda, K.2    Yoshida, N.3
  • 7
    • 84879520825 scopus 로고    scopus 로고
    • Noninterference for Concurrent Programs
    • Springer
    • Boudol, G. and Castellani, I., Noninterference for Concurrent Programs, ICALP’01, LNCS, Springer, 2001.
    • (2001) ICALP’01, LNCS
    • Boudol, G.1    Castellani, I.2
  • 8
    • 0017517624 scopus 로고    scopus 로고
    • Certification of programs for secure information flow
    • Denning, D. and Denning, P., Certification of programs for secure information flow. Communication of ACM, ACM, 20:504–513, 1997.
    • (1997) Communication of ACM, ACM , vol.20 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 9
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi, R. and Gorrieri, R., The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9), 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9
    • Focardi, R.1    Gorrieri, R.2
  • 10
    • 84974597207 scopus 로고    scopus 로고
    • Non-interference for the analysis of cryptographic protocols
    • Springer
    • Focardi, R., Gorrieri, R. and Martinelli, F., Non-interference for the analysis of cryptographic protocols. ICALP’00, LNCS 1853, Springer, 2000.
    • (2000) ICALP’00, LNCS , vol.1853
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 11
    • 4043088311 scopus 로고    scopus 로고
    • Types and Subtypes for Client-Server Interactions
    • Springer
    • Gay, S. and Hole, M., Types and Subtypes for Client-Server Interactions, ESOP’99, LNCS 1576, 74–90, Springer, 1999.
    • (1999) ESOP’99, LNCS , vol.1576 , pp. 74-90
    • Gay, S.1    Hole, M.2
  • 13
    • 4043061377 scopus 로고    scopus 로고
    • Typed behavioural equivalences for processes in the presence of subtyping
    • Hennessy, M. and Rathke, J., Typed behavioural equivalences for processes in the presence of subtyping, To appear in Proc. CATS 2002.
    • (2002) Proc. CATS
    • Hennessy, M.1    Rathke, J.2
  • 14
    • 84974577536 scopus 로고    scopus 로고
    • Information flow vs resource access in the asynchronous pi-calculus
    • Springer
    • Hennessy, M. and Riely, J., Information flow vs resource access in the asynchronous pi-calculus, ICALP’00, LNCS 1853, 415–427, Springer, 2000.
    • (2000) ICALP’00, LNCS , vol.1853 , pp. 415-427
    • Hennessy, M.1    Riely, J.2
  • 15
    • 85029492434 scopus 로고
    • Types for Dyadic Interaction
    • Honda, K., Types for Dyadic Interaction. CONCUR’93, LNCS 715, 509–523, 1993.
    • (1993) CONCUR’93, LNCS , vol.715 , pp. 509-523
    • Honda, K.1
  • 16
    • 0029719979 scopus 로고    scopus 로고
    • Composing Processes
    • ACM
    • Honda, K., Composing Processes, POPL’96, 344–357, ACM, 1996.
    • (1996) POPL’96 , pp. 344-357
    • Honda, K.1
  • 17
    • 84949043042 scopus 로고    scopus 로고
    • Notes on Linear Typing for Free Outputs, May
    • Honda, K., Notes on Linear Typing for Free Outputs, May, 2001.
    • (2001)
    • Honda, K.1
  • 18
    • 84947741770 scopus 로고    scopus 로고
    • Language Primitives and Type Discipline for Structured Communication-Based Programming
    • Springer-Verlag
    • Honda, K., Kubo, M. and Vasconcelos, V., Language Primitives and Type Discipline for Structured Communication-Based Programming. ESOP’98, LNCS 1381, 122–138. Springer-Verlag, 1998.
    • (1998) ESOP’98, LNCS , vol.1381 , pp. 122-138
    • Honda, K.1    Kubo, M.2    Vasconcelos, V.3
  • 19
    • 84983016110 scopus 로고
    • An object calculus for asynchronous communication
    • Honda, K. and Tokoro, M. An object calculus for asynchronous communication. ECOOP’91, LNCS 512, 133–147, 1991.
    • (1991) ECOOP’91, LNCS , vol.512 , pp. 133-147
    • Honda, K.1    Tokoro, M.2
  • 20
    • 84947269249 scopus 로고    scopus 로고
    • Secure Information Flow as Typed Process Behaviour
    • Honda, K., Vasconcelos, V. and Yoshida, N., Secure Information Flow as Typed Process Behaviour, ESOP’00, LNCS 1782, 180–199, 2000.
    • (2000) ESOP’00, LNCS , vol.1782 , pp. 180-199
    • Honda, K.1    Vasconcelos, V.2    Yoshida, N.3
  • 21
    • 0029404929 scopus 로고
    • On Reduction-Based Process Semantics
    • Honda, K. and Yoshida, N. On Reduction-Based Process Semantics. TCS, 151, 437–486, 1995.
    • (1995) TCS , vol.151 , pp. 437-486
    • Honda, K.1    Yoshida, N.2
  • 22
    • 0000423953 scopus 로고    scopus 로고
    • Game-theoretic analysis of call-by-value computation
    • (1999)
    • Honda, K. and Yoshida, N., Game-theoretic analysis of call-by-value computation. TCS, 221 (1999), 393–456, 1999.
    • (1999) TCS , vol.221 , pp. 393-456
    • Honda, K.1    Yoshida, N.2
  • 23
    • 0036040303 scopus 로고    scopus 로고
    • A uniform type structure for secure information flow
    • Honda, K. and Yoshida, N., A uniform type structure for secure information flow, To appear in POPL’02, ACM, 2002.
    • (2002) POPL’02, ACM
    • Honda, K.1    Yoshida, N.2
  • 24
    • 0034672932 scopus 로고    scopus 로고
    • On Full Abstraction for PCF
    • (2000)
    • Hyland, M. and Ong, L., “On Full Abstraction for PCF”: I, II and III. Info. & Comp. 163(2000), 285–408, 2000.
    • (2000) I, II and III. Info. & Comp , vol.163 , pp. 285-408
    • Hyland, M.1    Ong, L.2
  • 26
    • 84976193394 scopus 로고
    • Functions as Processes
    • CUP
    • Milner, R., Functions as Processes. MSCS, 2(2), 119–146, CUP, 1992.
    • (1992) MSCS , vol.2 , Issue.2 , pp. 119-146
    • Milner, R.1
  • 27
    • 84968816021 scopus 로고
    • Barbed Bisimulation
    • Springer
    • Milner, R. and Sangiorgi, D., Barbed Bisimulation, ICALP’92, LNCS 623, 685–695, Springer, 1992.
    • (1992) ICALP’92, LNCS , vol.623 , pp. 685-695
    • Milner, R.1    Sangiorgi, D.2
  • 28
    • 84951190926 scopus 로고    scopus 로고
    • On confluence in the p-Calculus
    • Springer
    • Philippou, A. and Walker, D., On confluence in the p-Calculus, ICALP’97, LNCS 1256, 314–324, Springer, 1997.
    • (1997) ICALP’97, LNCS , vol.1256 , pp. 314-324
    • Philippou, A.1    Walker, D.2
  • 29
    • 0030260547 scopus 로고    scopus 로고
    • P-calculus, internal mobility, and agent-passing calculi
    • Sangiorgi, D. p-calculus, internal mobility, and agent-passing calculi. TCS, 167(2):235–271, 1996.
    • (1996) TCS , vol.167 , Issue.2 , pp. 235-271
    • Sangiorgi, D.1
  • 30
    • 0000973591 scopus 로고    scopus 로고
    • The name discipline of uniform receptiveness
    • Sangiorgi, D., The name discipline of uniform receptiveness, TCS, 221, 457–493, 1999.
    • (1999) TCS , vol.221 , pp. 457-493
    • Sangiorgi, D.1
  • 31
    • 84957869855 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • Springer
    • Sabelfield, A. and Sands, D. A per model of secure information flow in sequential programs. ESOP’99, LNCS 1576, Springer, 1999.
    • (1999) ESOP’99, LNCS , vol.1576
    • Sabelfield, A.1    Sands, D.2
  • 32
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • Smith, G. and Volpano, D., Secure information flow in a multi-threaded imperative language, 355–364, POPL’98, ACM, 1998.
    • (1998) POPL’98, ACM , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 33
    • 85024747258 scopus 로고
    • Typed concurrent objects
    • Springer
    • Vasconcelos, V., Typed concurrent objects. ECOOP’94, LNCS 821, 100–117. Springer, 1994.
    • (1994) ECOOP’94, LNCS , vol.821 , pp. 100-117
    • Vasconcelos, V.1
  • 34
    • 84947920982 scopus 로고    scopus 로고
    • Graph Types for Mobile Processes
    • Springer
    • Yoshida, N. Graph Types for Mobile Processes. FST/TCS’16, LNCS 1180, 371–386, Springer, 1996.
    • (1996) FST/TCS’16, LNCS , vol.1180 , pp. 371-386
    • Yoshida, N.1
  • 35
    • 19044368044 scopus 로고    scopus 로고
    • Strong Normalisation in the p-Calculus
    • The full version as MCS technical report, 2001-09, University of Leicester, 2001
    • Yoshida, N., Berger, M. and Honda, K., Strong Normalisation in the p-Calculus, LICS’01, IEEE, 2001. The full version as MCS technical report, 2001-09, University of Leicester, 2001. Available at www.mcs.le.ac.uk/~nyoshida/paper.html.
    • (2001) LICS’01, IEEE
    • Yoshida, N.1    Berger, M.2    Honda, K.3
  • 36
    • 84949043044 scopus 로고    scopus 로고
    • MCS technical report, 2001-48, University of Leicester
    • A full version of this paper. MCS technical report, 2001-48, University of Leicester, 2001. Available at www.mcs.le.ac.uk/~nyoshida/paper.html.
    • (2001)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.