Abstract. We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography ” of the spi-calculus by taking time into account. This involves defining an operational semantics, defining a control flow analysis (CFA) in the form of a flow logic, and proving semantic correctness. Our first result is that secrecy in the sense of Dolev-Yao can be expressed in terms of the CFA. Our second result is that also non-interference in the sense of Abadi can be expressed in terms of the CFA; unlike Abadi we find the non-interference property to be an extension of the Dolev-Yao property.
AbstractWe model, in a process algebra framework, a variant of the well known Wide Mouthed Frog secu...
In this paper, we consider the information flow security properties named Persistent Stochastic Non-...
AbstractNon Interference [8] has been proposed for modelling and analysing information flow in syste...
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
We introduce the νspi-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
Abstract. We develop a theory of non-interference for a typed version of the pi-calculus where types...
AbstractControl Flow Analysis is a static technique for predicting safe and computable approximation...
We develop a theory of noninterference for a typed version of the \u3c0- calculus where types are us...
AbstractThe spi-calculus is a variant of the polyadic π-calculus that admits symmetric cryptography ...
The information security community has long debated the exact definition of the term ‘security’. Eve...
AbstractThe security π-calculus is a typed version of the asynchronous π-calculus in which the types...
AbstractThe security π-calculus is a typed version of the asynchronous π-calculus in which the types...
We develop a typed process calculus for security protocols in which types convey secrecy properties....
We model, in a process algebra framework, a variant of the well known Wide Mouthed Frog security pro...
AbstractWe model, in a process algebra framework, a variant of the well known Wide Mouthed Frog secu...
In this paper, we consider the information flow security properties named Persistent Stochastic Non-...
AbstractNon Interference [8] has been proposed for modelling and analysing information flow in syste...
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
We introduce the νspi-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
Abstract. We develop a theory of non-interference for a typed version of the pi-calculus where types...
AbstractControl Flow Analysis is a static technique for predicting safe and computable approximation...
We develop a theory of noninterference for a typed version of the \u3c0- calculus where types are us...
AbstractThe spi-calculus is a variant of the polyadic π-calculus that admits symmetric cryptography ...
The information security community has long debated the exact definition of the term ‘security’. Eve...
AbstractThe security π-calculus is a typed version of the asynchronous π-calculus in which the types...
AbstractThe security π-calculus is a typed version of the asynchronous π-calculus in which the types...
We develop a typed process calculus for security protocols in which types convey secrecy properties....
We model, in a process algebra framework, a variant of the well known Wide Mouthed Frog security pro...
AbstractWe model, in a process algebra framework, a variant of the well known Wide Mouthed Frog secu...
In this paper, we consider the information flow security properties named Persistent Stochastic Non-...
AbstractNon Interference [8] has been proposed for modelling and analysing information flow in syste...