This paper scratches the surface of the problem of classifying the attacks that a mobile computation can be subjected to in an open network. The discussion is based on a simplied version of the Seal calculus. We show how the impact of these attacks on the semantics of the calculus and on the notion of observational equivalence. 1
We introduce a static analysis framework for detecting instances of security breaches in infinite mo...
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical...
There are four possible security attacks: Attacks from host to host, from agents to hosts, from agen...
This paper scratches the surface of the problem of classifying the attacks that a mobile computation...
The SEAL calculus is a calculus of mobile computations designed for programming secure distributed a...
The Seal calculus is a distributed process calculus in which locations and movement of computational...
In this paper, we introduce the crypto-loc calculus, a calculus for modelling secure mobile computat...
AbstractThe Seal Calculus is a process language for describing mobile computation. Threads and resou...
International audienceWe propose an abstract interpretation-based analysis for automatically detecti...
Abstract. Ambient calculi are a promising formalism for specifying mo-bile computation, which benefi...
We propose an Abstract Interpretation-based context-free analysis for mobile systems written in the ...
AbstractWe propose an Abstract Interpretation-based context-free analysis for mobile systems written...
Process algebraic techniques for distributed systems are increasingly being targeted at identifying ...
AbstractProcess algebraic specifications of distributed systems are increasingly being targeted at i...
Process algebraic specifications of distributed systems are increasingly being targeted at identifyi...
We introduce a static analysis framework for detecting instances of security breaches in infinite mo...
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical...
There are four possible security attacks: Attacks from host to host, from agents to hosts, from agen...
This paper scratches the surface of the problem of classifying the attacks that a mobile computation...
The SEAL calculus is a calculus of mobile computations designed for programming secure distributed a...
The Seal calculus is a distributed process calculus in which locations and movement of computational...
In this paper, we introduce the crypto-loc calculus, a calculus for modelling secure mobile computat...
AbstractThe Seal Calculus is a process language for describing mobile computation. Threads and resou...
International audienceWe propose an abstract interpretation-based analysis for automatically detecti...
Abstract. Ambient calculi are a promising formalism for specifying mo-bile computation, which benefi...
We propose an Abstract Interpretation-based context-free analysis for mobile systems written in the ...
AbstractWe propose an Abstract Interpretation-based context-free analysis for mobile systems written...
Process algebraic techniques for distributed systems are increasingly being targeted at identifying ...
AbstractProcess algebraic specifications of distributed systems are increasingly being targeted at i...
Process algebraic specifications of distributed systems are increasingly being targeted at identifyi...
We introduce a static analysis framework for detecting instances of security breaches in infinite mo...
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical...
There are four possible security attacks: Attacks from host to host, from agents to hosts, from agen...