메뉴 건너뛰기




Volumn 31, Issue , 2004, Pages 147-160

Channel dependent types for higher-order mobile processes

Author keywords

Access Control; Mobile Processes; Secrecy; The Higher Order Calculus; Types

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER PROGRAMMING LANGUAGES; ERROR ANALYSIS; FUNCTIONS; INTEGRATION; SECURITY OF DATA; THEOREM PROVING;

EID: 2442562500     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/964001.964014     Document Type: Conference Paper
Times cited : (11)

References (57)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Abadi, M., Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 3
    • 84890865854 scopus 로고    scopus 로고
    • Access Control based on Execution History
    • California
    • Abadi, M. and Fournet, C, Access Control based on Execution History, NDSS'03, California, 2003.
    • (2003) NDSS'03
    • Abadi, M.1    Fournet, C.2
  • 5
    • 84888883433 scopus 로고    scopus 로고
    • Sequentiality and the π-Calculus
    • 2044, Springer
    • Berger, M., Honda, K. and Yoshida, N., Sequentiality and the π-Calculus, TLCA01, LNCS 2044, 29-45, Springer, 2001.
    • (2001) TLCA01 , pp. 29-45
    • Berger, M.1    Honda, K.2    Yoshida, N.3
  • 6
    • 35248866941 scopus 로고    scopus 로고
    • Genericity and the π-Calculus
    • LNCS 2620, Springer
    • Berger, M., Honda, K. and Yoshida, N., Genericity and the π-Calculus, FoSSaCs'03, LNCS 2620, 103-119, Springer, 2003.
    • (2003) FoSSaCs'03 , pp. 103-119
    • Berger, M.1    Honda, K.2    Yoshida, N.3
  • 10
    • 12444299406 scopus 로고    scopus 로고
    • Information Flow Security in Boxed Ambients
    • Crafa, S., Bugliesi, M. and Castagna, G., Information Flow Security in Boxed Ambients, ENTCS 66 No. 3, 2003.
    • (2003) ENTCS , vol.66 , Issue.3
    • Crafa, S.1    Bugliesi, M.2    Castagna, G.3
  • 11
    • 0017517624 scopus 로고    scopus 로고
    • Certification of programs for secure information flow
    • ACM
    • Denning, D. and Denning, P., Certification of programs for secure information flow. Communication of ACM, ACM, 20:504-513, 1997.
    • (1997) Communication of ACM , vol.20 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 12
    • 0036041144 scopus 로고    scopus 로고
    • Stack inspection: Theory and variants
    • ACM
    • Foumet, C. and Gordon, A.D., Stack Inspection: theory and variants, POPL, 307-318, ACM, 2002.
    • (2002) POPL , pp. 307-318
    • Foumet, C.1    Gordon, A.D.2
  • 13
    • 0038414953 scopus 로고    scopus 로고
    • Typing correspondence assertions for communication protocols
    • Gordon, A. and Jeffery, A., Typing correspondence assertions for communication protocols, TCS, 300(2003):379-409.
    • TCS , vol.300 , Issue.2003 , pp. 379-409
    • Gordon, A.1    Jeffery, A.2
  • 14
    • 0041865338 scopus 로고    scopus 로고
    • Separating access control policy, enforcement, and functionality in extensible systems
    • Feb.
    • Grimm, R. and Bershad, B., Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems, ACM Transactions on Computer Systems, 19(1):36-70, Feb., 2001.
    • (2001) ACM Transactions on Computer Systems , vol.19 , Issue.1 , pp. 36-70
    • Grimm, R.1    Bershad, B.2
  • 16
    • 0031701347 scopus 로고    scopus 로고
    • The SLam Calculus: Programming with Secrecy and Integrity
    • ACM Press
    • Heintze, N. and Riecke, J., The SLam Calculus: Programming with Secrecy and Integrity, POPL'98, pp.365-377. ACM Press, 1998.
    • (1998) POPL'98 , pp. 365-377
    • Heintze, N.1    Riecke, J.2
  • 18
    • 0029719979 scopus 로고    scopus 로고
    • Composing processes
    • ACM
    • Honda, K., Composing Processes, POPL'96, pp.344-357, ACM, 1996.
    • (1996) POPL'96 , pp. 344-357
    • Honda, K.1
  • 19
    • 84947269249 scopus 로고    scopus 로고
    • Secure information flow as typed process behaviour
    • LNCS 1782, Springer
    • Honda, K., Vasconcelos, V. and Yoshida, N, Secure Information Flow as Typed Process Behaviour, ESOP'OO, LNCS 1782, pp.180-199, Springer, 2000.
    • (2000) ESOP'OO , pp. 180-199
    • Honda, K.1    Vasconcelos, V.2    Yoshida, N.3
  • 20
    • 0029404929 scopus 로고
    • On reduction-based process semantics
    • North-Holland
    • Honda, K. and Yoshida, N., On Reduction-Based Process Semantics. TCS, pp.437-486, No. 151, North-Holland, 1995.
    • (1995) TCS , Issue.151 , pp. 437-486
    • Honda, K.1    Yoshida, N.2
  • 21
    • 0000423953 scopus 로고    scopus 로고
    • Game-theoretic analysis of call-by-value computation
    • North-Holland
    • Honda, K. and Yoshida, N. Game-theoretic analysis of call-by-value computation. TCS Vol. 221 (1999), 393-456, North-Holland, 1999.
    • (1999) TCS , vol.221 , Issue.1999 , pp. 393-456
    • Honda, K.1    Yoshida, N.2
  • 22
    • 0036040303 scopus 로고    scopus 로고
    • A uniform type structure for secure information flow
    • ACM Prcess, The full version: a DOC technical report, Imperial College London, revised August 2003
    • Honda, K. and Yoshida, N., A Uniform Type Structure for Secure Information Flow, POPL'02, 81-92, ACM Press, 2002. The full version: a DOC technical report, Imperial College London, revised August 2003, available at: www.doc.ic.ac.uk/~yoshdia.
    • (2002) POPL'02 , pp. 81-92
    • Honda, K.1    Yoshida, N.2
  • 24
    • 0034672932 scopus 로고    scopus 로고
    • On full abstraction for PCF: I, II and III
    • Hyland, M. and Ong, L., "On Full Abstraction for PCF": I, II and III. Info. & Comp. 163 (2000), 285-408.
    • (2000) Info. & Comp. , vol.163 , pp. 285-408
    • Hyland, M.1    Ong, L.2
  • 25
    • 0036039869 scopus 로고    scopus 로고
    • Resource Usage Analysis
    • Portland, OR, ACM
    • Igarashi, A. and Kobayashi, N., Resource Usage Analysis, POPL'02, 331-342, Portland, OR, ACM, 2002.
    • (2002) POPL'02 , pp. 331-342
    • Igarashi, A.1    Kobayashi, N.2
  • 26
    • 0035029826 scopus 로고    scopus 로고
    • A generic type system for the pi-calculus
    • ACM, To appear in TCS
    • Igarashi, A. and Kobayashi, N., A Generic Type System for the Pi-Calculus, POPL'01, 128-141, ACM, 2001. To appear in TCS.
    • (2001) POPL'01 , pp. 128-141
    • Igarashi, A.1    Kobayashi, N.2
  • 27
    • 0012583283 scopus 로고    scopus 로고
    • Featherweight Java: A Minimal Core Calculus for Java and GJ
    • May
    • Igarashi, A., Pierce, B. and Wadler, P., Featherweight Java: A Minimal Core Calculus for Java and GJ. TOPLAS, 23(3):396-450, May 2001.
    • (2001) TOPLAS , vol.23 , Issue.3 , pp. 396-450
    • Igarashi, A.1    Pierce, B.2    Wadler, P.3
  • 28
    • 84862362113 scopus 로고    scopus 로고
    • Java, Sun Microsystems Inc., http://www.javasoft.com/.
  • 29
    • 24644505297 scopus 로고    scopus 로고
    • Contextual equivalence for higher-order pi-calculus revisited
    • Montreal
    • Jeffrey, A. and Rathke, J., Contextual equivalence for higher-order pi-calculus revisited, MFPS XIX, Montreal, 2003.
    • (2003) MFPS XIX
    • Jeffrey, A.1    Rathke, J.2
  • 31
    • 0001065208 scopus 로고    scopus 로고
    • Linear types and the π-calculus
    • Kobayashi, N., Pierce, B., and Turner, D., Linear types and the π-calculus, TOPLAS, 21(5):914-947, 1999.
    • (1999) TOPLAS , vol.21 , Issue.5 , pp. 914-947
    • Kobayashi, N.1    Pierce, B.2    Turner, D.3
  • 33
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • Myers, M., JFlow: Practical mostly-static information flow control. POPL'99, 228-241, 1999.
    • (1999) POPL'99 , pp. 228-241
    • Myers, M.1
  • 35
    • 44049113210 scopus 로고
    • A calculus of mobile processes
    • Milner, R., Parrow, J.G. and Walker, D.J., A Calculus of Mobile Processes. Info. & Comp., 100(1), pp.1-77, 1992.
    • (1992) Info. & Comp. , vol.100 , Issue.1 , pp. 1-77
    • Milner, R.1    Parrow, J.G.2    Walker, D.J.3
  • 36
    • 0002735526 scopus 로고    scopus 로고
    • Proof-carrying code
    • ACM
    • Necula, G., Proof-carrying code. POPL'96, ACM, 1996.
    • (1996) POPL'96
    • Necula, G.1
  • 38
    • 0002772957 scopus 로고    scopus 로고
    • A systematic approach to access control
    • LNCS 30-45, Springer
    • Pottier, F., Skalka, C. and Smith, S., A systematic approach to access control. ESOP01, LNCS 30-45, Springer, 2001.
    • (2001) ESOP01
    • Pottier, F.1    Skalka, C.2    Smith, S.3
  • 39
    • 0032646395 scopus 로고    scopus 로고
    • Trust and partial typing in open systems of mobile agents
    • ACM Press
    • Riely, J. and Hennessy, M., Trust and partial typing in open systems of mobile agents. POPL'99, ACM Press, 1999.
    • (1999) POPL'99
    • Riely, J.1    Hennessy, M.2
  • 41
    • 1442333573 scopus 로고    scopus 로고
    • Asynchronous process calculi: The first-order and higher-order paradigms
    • Sangiorgi, D., Asynchronous process calculi: the first-order and higher-order paradigms, TCS, 1999.
    • (1999) TCS
    • Sangiorgi, D.1
  • 42
    • 2442537413 scopus 로고    scopus 로고
    • Termination of processes
    • Sangiorgi, D., Termination of Processes, CONCUR'02, 2002
    • (2002) CONCUR'02
    • Sangiorgi, D.1
  • 43
    • 0038643976 scopus 로고    scopus 로고
    • The M-calculus: A higher-order distributed process calculus
    • ACM
    • Schmitt, A. and Stefani, J.-B., The M-calculus: A Higher-Order Distributed Process Calculus, POPL03, ACM, 2003.
    • (2003) POPL03
    • Schmitt, A.1    Stefani, J.-B.2
  • 44
    • 0037272061 scopus 로고    scopus 로고
    • Secure composition of untrusted code: Box pi, wrappers, and causality types
    • Sewell, P. and Vitek, J., Secure Composition of Untrusted Code: Box pi, Wrappers, and Causality Types. Vol. 11, Number 2, 135-188, Journal of Computer Security, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.2 , pp. 135-188
    • Sewell, P.1    Vitek, J.2
  • 45
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • IEEE
    • Smith, G., A New Type System for Secure Information Flow, CSFW'01, IEEE, 2001.
    • (2001) CSFW'01
    • Smith, G.1
  • 46
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multithreaded imperative language
    • ACM
    • Smith, G. and Volpano, D., Secure information flow in a multithreaded imperative language, pp.355-364, POPL'98, ACM, 1998.
    • (1998) POPL'98 , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 47
    • 85024747258 scopus 로고
    • Typed concurrent objects
    • LNCS 821, Springer-Verlag
    • Vasconcelos, V., Typed concurrent objects. ECOOP'94, LNCS 821, pp.100-117. Springer-Verlag, 1994.
    • (1994) ECOOP'94 , pp. 100-117
    • Vasconcelos, V.1
  • 48
    • 0031542975 scopus 로고    scopus 로고
    • Extensible security architectures for Java
    • IEEE
    • Wallach, D.S, et al., Extensible security architectures for Java. SOSP, 116-128, IEEE, 1997.
    • (1997) SOSP , pp. 116-128
    • Wallach, D.S.1
  • 50
    • 2442628728 scopus 로고    scopus 로고
    • Nomadic pict: Correct communication infrastructure for mobile computation
    • ACM
    • Unypoth, A. and Sewell, P., Nomadic Pict: Correct Communication Infrastructure for Mobile Computation, POPL01, ACM, 2001.
    • (2001) POPL01
    • Unypoth, A.1    Sewell, P.2
  • 51
    • 84947920982 scopus 로고    scopus 로고
    • Graph types for monadic mobile processes
    • LNCS 1180, Springer, Full version as LFCS Technical Report, ECS-LFCS-96-350, 1996
    • Yoshida, N., Graph Types for Monadic Mobile Processes, FSTTCS'16, LNCS 1180, pp. 371-386, Springer, 1996. Full version as LFCS Technical Report, ECS-LFCS-96-350, 1996.
    • (1996) FSTTCS'16 , pp. 371-386
    • Yoshida, N.1
  • 52
    • 1442284569 scopus 로고    scopus 로고
    • Type-based liveness guarantee in the presence of nontermination and nondeterminism
    • April, University of Leicester
    • Yoshida, N., Type-Based Liveness Guarantee in the Presence of Nontermination and Nondeterminism, April 2002. MCS Technical Report, 2002-20, University of Leicester, available at www.mcs.le.ac.uk/~yoshida.
    • (2002) MCS Technical Report , vol.2002 , Issue.20
    • Yoshida, N.1
  • 53
    • 0034871529 scopus 로고    scopus 로고
    • Strong normalisation in the π-Calculus
    • LICS'01, IEEE, Full version: to appear
    • Yoshida, N., Berger, M. and Honda, K., Strong Normalisation in the π-Calculus, LICS'01, 311-322, IEEE, 2001. Full version: to appear in Journal of Info. & Comp., available at www.dos.ic.ac.uk/~yoshida.
    • (2001) Journal of Info. & Comp. , pp. 311-322
    • Yoshida, N.1    Berger, M.2    Honda, K.3
  • 54
    • 84888256815 scopus 로고    scopus 로고
    • Subtyping and locality in distributed higher order processes
    • LNCS 1664, Springer
    • Yoshida, N. and Hennessy, M., Subtyping and Locality in Distributed Higher Order Processes. CONCUR'99, LNCS 1664, pp.557-573, Springer, 1999.
    • (1999) CONCUR'99 , pp. 557-573
    • Yoshida, N.1    Hennessy, M.2
  • 55
    • 0036590522 scopus 로고    scopus 로고
    • Assigning types to processes
    • Academic Press, Extended abstract appeared in LICS'00
    • Yoshida, N. and Hennessy, M., Assigning Types to Processes, Info. &. Comp., Volume 174, Issue 2, 143-179, Academic Press, 2002. Extended abstract appeared in LICS'00.
    • (2002) Info. &. Comp. , vol.174 , Issue.2 , pp. 143-179
    • Yoshida, N.1    Hennessy, M.2
  • 56
    • 19044369934 scopus 로고    scopus 로고
    • Linearity and bisimulation
    • FoSSaCs 2002, Springer
    • Yoshida, N., Honda, K. and Berger, M. Linearity and Bisimulation, FoSSaCs 2002, LNCS 2303, pp.417-433, Springer, 2002.
    • (2002) LNCS , vol.2303 , pp. 417-433
    • Yoshida, N.1    Honda, K.2    Berger, M.3
  • 57
    • 84862361628 scopus 로고    scopus 로고
    • The full version of this paper, Part I, II and III
    • The full version of this paper, Part I, II and III, available at www.doc.ic.ac.uk/~yoshida


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.