AbstractControl Flow Analysis is a static technique for predicting safe and computable approximations to the set of values that the objects of a program may assume during its execution. We present an analysis for the π-calculus that shows how names will be bound to actual channels at run time. The result of our analysis establishes a super-set of the set of channels to which a given name may be bound and of the set of channels that may be sent along a given channel. Besides a set of rules that permits one to validate a given solution, we also offer a constructive procedure that builds solutions in low polynomial time. Applications of our analysis include establishing two simple security properties of processes. One example is that P has no ...
We propose an extension of the asynchronous π-calculus in which a variety of security properties may...
We introduce the νspi-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
AbstractControl Flow Analysis is a static technique for predicting safe and computable approximation...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
We study a variant of the no read-up/no write-down security property of Bell and LaPadula for proces...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
Abstract. We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptogra...
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
Static analysis [NNH99] is technique used to compute information about the run-time behaviour of a ...
We develop a theory of noninterference for a typed version of the \u3c0- calculus where types are us...
AbstractThe security π-calculus is a typed version of the asynchronous π-calculus in which the types...
Unwinding conditions provide a general framework for the definition of security properties. They bas...
International audienceWe present a general model allowing static analysis based on abstract interpre...
We propose an extension of the asynchronous π-calculus in which a variety of security properties may...
We introduce the νspi-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
AbstractControl Flow Analysis is a static technique for predicting safe and computable approximation...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
We study a variant of the no read-up/no write-down security property of Bell and LaPadula for proces...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
Abstract. We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptogra...
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
Static analysis [NNH99] is technique used to compute information about the run-time behaviour of a ...
We develop a theory of noninterference for a typed version of the \u3c0- calculus where types are us...
AbstractThe security π-calculus is a typed version of the asynchronous π-calculus in which the types...
Unwinding conditions provide a general framework for the definition of security properties. They bas...
International audienceWe present a general model allowing static analysis based on abstract interpre...
We propose an extension of the asynchronous π-calculus in which a variety of security properties may...
We introduce the νspi-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...