The security pi-calculus and non-interference

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Calculus for Cryptographic Protocols the Spi Calculus 1 Security and the Pi Calculus

We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) su ces for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as ...

متن کامل

Static Analysis for the pi-Calculus with Applications to Security

Control Flow Analysis is a static technique for predicting safe and computable approximations to the set of values that the objects of a program may assume during its execution. We present an analysis for the π -calculus that shows how names will be bound to actual channels at run time. The result of our analysis establishes a super-set of the set of channels to which a given name may be bound ...

متن کامل

Formalising privacy-type security properties using the applied pi calculus

Privacy is a general requirement that needs to be studied in di↵erent contexts. We identify some applications for wich privacy plays an important role, and with significant interest in terms of societal impact. Since each application leads to several definitions of privacy, and raise some particular modelling issues, we concentrate our e↵orts on the three following applications: electronic voti...

متن کامل

Simulation based security in the applied pi calculus

Wepresent a symbolic framework for refinement and composition of security protocols. The framework uses the notion of ideal functionalities. These are abstract systems which are secure by construction and which can be combined into larger systems. They can be separately refined in order to obtain concrete protocols implementing them. Our work builds on ideas from the “trusted party paradigm” us...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Logic and Algebraic Programming

سال: 2005

ISSN: 1567-8326

DOI: 10.1016/j.jlap.2004.01.003