Filters








18,166 Hits in 3.5 sec

A Calculus for Secure Mobility [chapter]

Bruno Blanchet, Benjamin Aziz
2003 Lecture Notes in Computer Science  
We focus on the applied pi calculus [Abadi, Fournet, POPL'01] which is not limited to a small set of built-in primitives: cryptographic primitives can be defined by equational theories.  ...  Example: symmetric encryption decrypt(encrypt(x, y), y) = x optionally, we can add decrypt(M, N ) = wrong when M = encrypt(L, N ) for all L.  ...  Introduction Our goal is to combine: • cryptography • mobility: processes/programs being sent on the network • locations: protections by firewalls for instance to represent all security aspects of network  ... 
doi:10.1007/978-3-540-40965-6_13 fatcat:guqlq36bebajzkj6d5xm6qb744

Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus [chapter]

Devrim Unal, Ozan Akar, M. Ufuk Caglayan
2010 Lecture Notes in Computer Science  
A Formal Model for Security Policies for Multi-domain Mobile Networks in Ambient Calculus  Data Sets and Relations  Authorization Terms  Role Based Access Control Model  Location and Mobility  ...   Formal Model for Security Policy  Formal Specification of Mobile Processes in Ambient Calculus  Formalization of Location and Mobility Related Policy Constraints Formal Model for Security Policy Related  ... 
doi:10.1007/978-3-642-14706-7_12 fatcat:yiok7qsd5facpa7qzs5goclspe

Types for Access Control in a Calculus of Mobile Resources

Hans Hüttel, Morten Kühnrich
2007 Electronical Notes in Theoretical Computer Science  
Hans Hüttel, Morten Kühnrich Types for Access Control in a Calculus of Mobile Resources  ...  In this talk we describe a type system for controlling border crossing phenomena in the Calculus of Mobile Resources.  ...  Introduction The Calculus of Mobile Resources The type system Properties of the type system Type inference Conclusion and future work Appendix Ideas for further work A complexity analysis of the type  ... 
doi:10.1016/j.entcs.2005.05.044 fatcat:o7vgb4qqijejng2auld5lvcexm

Type-Based Security for Mobile Computing Integrity, Secrecy and Liveness

Nobuko Yoshida
2006 Electronical Notes in Theoretical Computer Science  
This paper sketches an idea on how to challenge the three security issues concentrating on code mobility, by the development of a general theory of types of the π-calculus and the higher-order π-calculus  ...  ; and how to apply it for designing secure concurrent and distributed programming languages.  ...  We use the HOπ-calculus for a design of new explicit code mobility primitives as well as a representation of runtime of distributed objects.  ... 
doi:10.1016/j.entcs.2005.12.115 fatcat:nuyji5iylbgeli36wjrmm6g35a

Guest editors' introduction: Special issue on The π-calculus

Uwe Nestmann, Björn Victor
2005 The Journal of Logic and Algebraic Programming  
During the last decade, the π-calculus has seen an enormous proliferation of variants, techniques and applications, such that there is now a whole family of calculi for mobile processes (see the mobility  ...  The π-calculus, originally introduced by Robin Milner, Joachim Parrow, and David Walker back in 1989 arose as a generalization of the algebraic process calculus CCS.  ...  Of course, we also thank the authors of the papers for their high-quality submissions, for meeting deadlines, and for their patience with us in the production of this volume.  ... 
doi:10.1016/j.jlap.2004.01.002 fatcat:6z4qto4zs5az3hq65ixwhsahby

On privacy calculus and underlying consumer concerns influencing mobile banking subscriptions

Kennedy Njenga, Sifiso Ndlovu
2012 2012 Information Security for South Africa  
Despite a growing trend in mobile banking service offerings by SA banks, privacy and security issues are still considered a concern.  ...  Privacy Calculus Theory (PCT) has been used as a theoretical lens to explain the cognitive process involved when a potential mobile banking subscriber is presented with mobile banking technology solutions  ...  The research work therefore set out to test the above hypotheses regarding the psyche underlying privacy calculus for a South African mobile banking consumer.  ... 
doi:10.1109/issa.2012.6320453 dblp:conf/issa/NjengaN12 fatcat:owdnocotozcavd46ohvr5lse4y

A formalism for hierarchical mobile agents

Satoh
2000 Proceedings International Symposium on Software Engineering for Parallel and Distributed Systems PDSE-99  
The system also offers a security mechanism for mobile agents by using well-defined properties of the calculus. *  ...  This paper presents a theoretical and practical framework for constructing and reasoning about mobile agents. The framework is formulated as a process calculus and has two contributions.  ...  Acknowledgements We would like to thank anonymous referees for providing many constructive and valuable suggestions.  ... 
doi:10.1109/pdse.2000.847863 dblp:conf/pdse/Satoh00 fatcat:diueinl6xzc2ncq6f5ijf57fvi

Reasoning about Security in Mobile Ambients [chapter]

Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
2001 Lecture Notes in Computer Science  
As it turns out, MAC security does not appear to have fully convincing interpretations in the calculus. The second part proposes a solution to this impasse, based on a variant of Mobile Ambients.  ...  The paper gives an assessment of security for Mobile Ambients, with specific focus on mandatory access control (MAC) policies in multilevel security systems.  ...  Thanks to Luca Cardelli for insightful comments and discussion, and to the anonymous referees.  ... 
doi:10.1007/3-540-44685-0_8 fatcat:jmwdjoz3hncmbe22fkca3dphli

Mobile Processes: A Commented Bibliography [chapter]

Silvano Dal Zilio
2001 Lecture Notes in Computer Science  
We propose a short bibliographic survey of calculi for mobile processes.  ...  as modelled in the π-calculus of Milner, Parrow and Walker for example, and motile processes, which can exhibit motion, as modelled in the ambient calculus of Cardelli and Gordon.  ...  Acknowledgments I would like to thank Uwe Nestmann and Peter Sewell for helpful comments. Luca Cardelli and Andy Gordon commented on a previous version of this text.  ... 
doi:10.1007/3-540-45510-8_11 fatcat:ksp2ci37rbc5jbwokvcs2ugspq

Access control in mobile ambient calculi: A comparative view

Ines Margaria, Maddalena Zacchi
2008 Theoretical Computer Science  
In the security world, a system is considered trusted if it controls the access to its resources, i.e. every request for the access to a resource is honored if and only if the subject requiring the resource  ...  Ambient Calculi represent a class of process calculi used to describe and model mobile and distributed computations.  ...  Acknowledgment The authors are grateful to the referees for their helpful comments. References  ... 
doi:10.1016/j.tcs.2008.01.024 fatcat:2uxkcqtuuzgsloh3bmmeto5av4

Mapping Mobile Statechart Diagrams to the π-Calculus using Graph Transformation

Aissam Belghiat, Allaoua Chaoui
2016 International Journal of Intelligent Information Technologies  
Then, a twofold graph grammar is developed for the automatic mapping of mo-bile statechart diagrams into flowgraphs and in the same time generates the cor-responding π-calculus specification.  ...  This paper provides a graphical yet formal approach for the modeling, simulation and verification of mobile statechart diagrams using graph transformations in the AToM3 tool.  ...  π-Calculus The π-calculus (Milner, 1993 (Milner, , 1999 ) is a process algebra that is used for specifying concurrent systems with mobile communication.  ... 
doi:10.4018/ijiit.2016100101 fatcat:sgcqdajf3vhwdml4mwxx54pste

Foreword

Daniel Le Métayer
2000 Theoretical Computer Science  
This calculus, which is deÿned formally using an operational semantics, opens new perspectives for reasoning about mobility and security. The paper by R.  ...  The last two papers address security issues in the context of mobile code. L. Cardelli and A. D.  ... 
doi:10.1016/s0304-3975(99)00225-x fatcat:wasbiikkurcbbkearbh4gtrmtq

Formal Specification and Verification of Complex Systems1 1Work partially founded by Miur projectSP4

S. Gnesi
2003 Electronical Notes in Theoretical Computer Science  
This approach requires a temporal logic (for example the one defined in [8] ) to be used for expressing security properties, such as secrecy and integrity, while the spi-calculus is provided with an operational  ...  Model checking of security protocols The wide diffusion of Internet as a commercial medium makes the guarantee of security a necessity for every distributed protocol running over it.  ... 
doi:10.1016/s1571-0661(04)80829-6 fatcat:guoaosvlrjf45d3bxprlwsibja

ACVisualizer: A visualization tool for APi-calculus

Raheel Ahmad, Shahram Rahimi
2008 Multiagent and Grid Systems  
This paper presents ACVisualizer, a visualization software for APi-calculus, which provides such high level support for modeling mobile agent systems.  ...  One such calculus, called APi-calculus (an extension to Pi-calculus), provides support for modeling migration, intelligence, natural grouping and security in agent-based systems [18] .  ...  As noted before a milieu is a new concept introduced in APi-calculus that provides for a natural grouping of processes and hosts and provides features for security.  ... 
doi:10.3233/mgs-2008-4303 fatcat:huyrwoi7pbgt5kbd4cnnxr6mva

Modelling the Security of Smart Cards by Hard and Soft Types for Higher-Order Mobile Embedded Resources

Mikkel Bundgaard, Thomas Hildebrandt, Jens Chr. Godskesen
2007 Electronical Notes in Theoretical Computer Science  
We provide a type system inspired by affine intuitionistic logic for the calculus of Higher-Order Mobile Embedded Resources (Homer), resulting in the first process calculus combining affine linear (non-copyable  ...  We exemplify the use of the calculus by modelling a simplistic e-cash Smart Card system, the security of which depends on the interplay between (linear) mobile hardware, embedded (non-linear) mobile processes  ...  By a concrete e-cash Smart Card system we have exemplified that the calculus captures the difference between mobile computing hardware and embedded mobile software computations, which is crucial for the  ... 
doi:10.1016/j.entcs.2007.09.011 fatcat:2lfoacyso5bblp74q47rfqswne
« Previous Showing results 1 — 15 out of 18,166 results