Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising that the literature lacks a comprehensive account of a formal link between the two disciplines. This paper develops such a link between a language-based specification of security and a process-algebraic framework for security properties. Encoding imperative programs into a CCS-like process calculus, we show that timing-sensitive security for these programs exactly corresponds to the well understood process-algebraic security property of persistent bisimulation-based nondeducibility on compositions (P_BNDC). This rigorous connection opens up possibilities for cross-...
AbstractThe security π-calculus is a typed version of the asynchronous π-calculus in which the types...
In the design process of distributed systems we may have to replace abstract specifications of compo...
We study and further develop two language-based techniques for analyzing security protocols. One is ...
Language-based and process calculi-based information security are well developed fields of computer ...
Process calculi are expressive specification languages for concurrency. They have been very successf...
Several information flow security definitions, proposed in the literature, are generalized and adapt...
textabstractProcess calculi are expressive specification languages for concurrency. They have been v...
Abstract. We study and further develop two language-based techniques for analyzing security pro-toco...
SOS meta-theory has been very successful in defining meta-theorems using which one can prove useful ...
AbstractSOS meta-theory has been very successful in defining meta-theorems using which one can prove...
Due to technological advances such as the Internet and mobile computing, Security has become a serio...
We study and further develop two language-based techniques for analyzing security protocols. One is ...
We study a security property for processes in dynamic contexts, i.e., contexts that can be reconfigu...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
We consider a calculus for multiparty sessions enriched with security levels for messages. We propos...
AbstractThe security π-calculus is a typed version of the asynchronous π-calculus in which the types...
In the design process of distributed systems we may have to replace abstract specifications of compo...
We study and further develop two language-based techniques for analyzing security protocols. One is ...
Language-based and process calculi-based information security are well developed fields of computer ...
Process calculi are expressive specification languages for concurrency. They have been very successf...
Several information flow security definitions, proposed in the literature, are generalized and adapt...
textabstractProcess calculi are expressive specification languages for concurrency. They have been v...
Abstract. We study and further develop two language-based techniques for analyzing security pro-toco...
SOS meta-theory has been very successful in defining meta-theorems using which one can prove useful ...
AbstractSOS meta-theory has been very successful in defining meta-theorems using which one can prove...
Due to technological advances such as the Internet and mobile computing, Security has become a serio...
We study and further develop two language-based techniques for analyzing security protocols. One is ...
We study a security property for processes in dynamic contexts, i.e., contexts that can be reconfigu...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
We consider a calculus for multiparty sessions enriched with security levels for messages. We propos...
AbstractThe security π-calculus is a typed version of the asynchronous π-calculus in which the types...
In the design process of distributed systems we may have to replace abstract specifications of compo...
We study and further develop two language-based techniques for analyzing security protocols. One is ...