A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Calculus for Secure Mobility
[chapter]
2003
Lecture Notes in Computer Science
We focus on the applied pi calculus [Abadi, Fournet, POPL'01] which is not limited to a small set of built-in primitives: cryptographic primitives can be defined by equational theories. ...
Example: symmetric encryption decrypt(encrypt(x, y), y) = x optionally, we can add decrypt(M, N ) = wrong when M = encrypt(L, N ) for all L. ...
Introduction Our goal is to combine: • cryptography • mobility: processes/programs being sent on the network • locations: protections by firewalls for instance to represent all security aspects of network ...
doi:10.1007/978-3-540-40965-6_13
fatcat:guqlq36bebajzkj6d5xm6qb744
Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus
[chapter]
2010
Lecture Notes in Computer Science
A Formal Model for Security
Policies for Multi-domain Mobile
Networks in Ambient Calculus
Data Sets and Relations
Authorization Terms
Role Based Access Control Model
Location and Mobility ...
Formal Model for Security Policy Formal Specification of Mobile Processes in Ambient Calculus Formalization of Location and Mobility Related Policy Constraints Formal Model for Security Policy Related ...
doi:10.1007/978-3-642-14706-7_12
fatcat:yiok7qsd5facpa7qzs5goclspe
Types for Access Control in a Calculus of Mobile Resources
2007
Electronical Notes in Theoretical Computer Science
Hans Hüttel, Morten Kühnrich Types for Access Control in a Calculus of Mobile Resources ...
In this talk we describe a type system for controlling border crossing phenomena in the Calculus of Mobile Resources. ...
Introduction The Calculus of Mobile Resources The type system Properties of the type system Type inference Conclusion and future work Appendix
Ideas for further work A complexity analysis of the type ...
doi:10.1016/j.entcs.2005.05.044
fatcat:o7vgb4qqijejng2auld5lvcexm
Type-Based Security for Mobile Computing Integrity, Secrecy and Liveness
2006
Electronical Notes in Theoretical Computer Science
This paper sketches an idea on how to challenge the three security issues concentrating on code mobility, by the development of a general theory of types of the π-calculus and the higher-order π-calculus ...
; and how to apply it for designing secure concurrent and distributed programming languages. ...
We use the HOπ-calculus for a design of new explicit code mobility primitives as well as a representation of runtime of distributed objects. ...
doi:10.1016/j.entcs.2005.12.115
fatcat:nuyji5iylbgeli36wjrmm6g35a
Guest editors' introduction: Special issue on The π-calculus
2005
The Journal of Logic and Algebraic Programming
During the last decade, the π-calculus has seen an enormous proliferation of variants, techniques and applications, such that there is now a whole family of calculi for mobile processes (see the mobility ...
The π-calculus, originally introduced by Robin Milner, Joachim Parrow, and David Walker back in 1989 arose as a generalization of the algebraic process calculus CCS. ...
Of course, we also thank the authors of the papers for their high-quality submissions, for meeting deadlines, and for their patience with us in the production of this volume. ...
doi:10.1016/j.jlap.2004.01.002
fatcat:6z4qto4zs5az3hq65ixwhsahby
On privacy calculus and underlying consumer concerns influencing mobile banking subscriptions
2012
2012 Information Security for South Africa
Despite a growing trend in mobile banking service offerings by SA banks, privacy and security issues are still considered a concern. ...
Privacy Calculus Theory (PCT) has been used as a theoretical lens to explain the cognitive process involved when a potential mobile banking subscriber is presented with mobile banking technology solutions ...
The research work therefore set out to test the above hypotheses regarding the psyche underlying privacy calculus for a South African mobile banking consumer. ...
doi:10.1109/issa.2012.6320453
dblp:conf/issa/NjengaN12
fatcat:owdnocotozcavd46ohvr5lse4y
A formalism for hierarchical mobile agents
2000
Proceedings International Symposium on Software Engineering for Parallel and Distributed Systems PDSE-99
The system also offers a security mechanism for mobile agents by using well-defined properties of the calculus. * ...
This paper presents a theoretical and practical framework for constructing and reasoning about mobile agents. The framework is formulated as a process calculus and has two contributions. ...
Acknowledgements We would like to thank anonymous referees for providing many constructive and valuable suggestions. ...
doi:10.1109/pdse.2000.847863
dblp:conf/pdse/Satoh00
fatcat:diueinl6xzc2ncq6f5ijf57fvi
Reasoning about Security in Mobile Ambients
[chapter]
2001
Lecture Notes in Computer Science
As it turns out, MAC security does not appear to have fully convincing interpretations in the calculus. The second part proposes a solution to this impasse, based on a variant of Mobile Ambients. ...
The paper gives an assessment of security for Mobile Ambients, with specific focus on mandatory access control (MAC) policies in multilevel security systems. ...
Thanks to Luca Cardelli for insightful comments and discussion, and to the anonymous referees. ...
doi:10.1007/3-540-44685-0_8
fatcat:jmwdjoz3hncmbe22fkca3dphli
Mobile Processes: A Commented Bibliography
[chapter]
2001
Lecture Notes in Computer Science
We propose a short bibliographic survey of calculi for mobile processes. ...
as modelled in the π-calculus of Milner, Parrow and Walker for example, and motile processes, which can exhibit motion, as modelled in the ambient calculus of Cardelli and Gordon. ...
Acknowledgments I would like to thank Uwe Nestmann and Peter Sewell for helpful comments. Luca Cardelli and Andy Gordon commented on a previous version of this text. ...
doi:10.1007/3-540-45510-8_11
fatcat:ksp2ci37rbc5jbwokvcs2ugspq
Access control in mobile ambient calculi: A comparative view
2008
Theoretical Computer Science
In the security world, a system is considered trusted if it controls the access to its resources, i.e. every request for the access to a resource is honored if and only if the subject requiring the resource ...
Ambient Calculi represent a class of process calculi used to describe and model mobile and distributed computations. ...
Acknowledgment The authors are grateful to the referees for their helpful comments.
References ...
doi:10.1016/j.tcs.2008.01.024
fatcat:2uxkcqtuuzgsloh3bmmeto5av4
Mapping Mobile Statechart Diagrams to the π-Calculus using Graph Transformation
2016
International Journal of Intelligent Information Technologies
Then, a twofold graph grammar is developed for the automatic mapping of mo-bile statechart diagrams into flowgraphs and in the same time generates the cor-responding π-calculus specification. ...
This paper provides a graphical yet formal approach for the modeling, simulation and verification of mobile statechart diagrams using graph transformations in the AToM3 tool. ...
π-Calculus The π-calculus (Milner, 1993 (Milner, , 1999 ) is a process algebra that is used for specifying concurrent systems with mobile communication. ...
doi:10.4018/ijiit.2016100101
fatcat:sgcqdajf3vhwdml4mwxx54pste
Foreword
2000
Theoretical Computer Science
This calculus, which is deÿned formally using an operational semantics, opens new perspectives for reasoning about mobility and security. The paper by R. ...
The last two papers address security issues in the context of mobile code. L. Cardelli and A. D. ...
doi:10.1016/s0304-3975(99)00225-x
fatcat:wasbiikkurcbbkearbh4gtrmtq
Formal Specification and Verification of Complex Systems1 1Work partially founded by Miur projectSP4
2003
Electronical Notes in Theoretical Computer Science
This approach requires a temporal logic (for example the one defined in [8] ) to be used for expressing security properties, such as secrecy and integrity, while the spi-calculus is provided with an operational ...
Model checking of security protocols The wide diffusion of Internet as a commercial medium makes the guarantee of security a necessity for every distributed protocol running over it. ...
doi:10.1016/s1571-0661(04)80829-6
fatcat:guoaosvlrjf45d3bxprlwsibja
ACVisualizer: A visualization tool for APi-calculus
2008
Multiagent and Grid Systems
This paper presents ACVisualizer, a visualization software for APi-calculus, which provides such high level support for modeling mobile agent systems. ...
One such calculus, called APi-calculus (an extension to Pi-calculus), provides support for modeling migration, intelligence, natural grouping and security in agent-based systems [18] . ...
As noted before a milieu is a new concept introduced in APi-calculus that provides for a natural grouping of processes and hosts and provides features for security. ...
doi:10.3233/mgs-2008-4303
fatcat:huyrwoi7pbgt5kbd4cnnxr6mva
Modelling the Security of Smart Cards by Hard and Soft Types for Higher-Order Mobile Embedded Resources
2007
Electronical Notes in Theoretical Computer Science
We provide a type system inspired by affine intuitionistic logic for the calculus of Higher-Order Mobile Embedded Resources (Homer), resulting in the first process calculus combining affine linear (non-copyable ...
We exemplify the use of the calculus by modelling a simplistic e-cash Smart Card system, the security of which depends on the interplay between (linear) mobile hardware, embedded (non-linear) mobile processes ...
By a concrete e-cash Smart Card system we have exemplified that the calculus captures the difference between mobile computing hardware and embedded mobile software computations, which is crucial for the ...
doi:10.1016/j.entcs.2007.09.011
fatcat:2lfoacyso5bblp74q47rfqswne
« Previous
Showing results 1 — 15 out of 18,166 results