A static approach is proposed to study secure composition of services. We extend the lambda-calculus with primitives for selecting and invoking services that respect given security requirements. Security-critical code is enclosed in policy framings with a possibly nested, local scope. Policy framings enforce safety and liveness properties. The actual run-time behaviour of services is over-approximated by a type and effect system. Types are standard, and effects include the actions with possible security concerns - as well as information about which services may be invoked at run-time. An approximation is model-checked to verify policy framings within their scopes. This allows for removing any run-time execution monitor, and for determining...
We outline a methodology for designing and composing services in a secure manner. In particular,...
A distributed calculus is proposed for describing networks of services. We model service interactio...
A distributed calculus is proposed for describing networks of services. We model service interactio...
A static approach is proposed to study secure composition of services. We extend the lambda-calculus...
A static approach is proposed to study secure composition of services. We extend the $\lambda$-calc...
A static approach is proposed to study secure composition of services. We extend the $\lambda$-calc...
A static approach is proposed to study secure composition of services. We extend the λ-calculus with...
A static approach is proposed to study secure composition of services. We extend the λ-calculus with...
A static approach is proposed to study secure composition of software. We extend the $\lambda$-calc...
A static approach is proposed to study secure composition of software. We extend the $\lambda$-calc...
A static approach is proposed to study secure composition of software. We extend the λ calculus with...
We present a framework for designing and composing services in a secure manner. Services can enforce...
Abstract—We outline a methodology for designing and composing services in a secure manner. In partic...
We use a distributed, enriched λ-calculus for describing networks of services. Both services and the...
A distributed calculus is proposed for describing networks of services. We model service interaction...
We outline a methodology for designing and composing services in a secure manner. In particular,...
A distributed calculus is proposed for describing networks of services. We model service interactio...
A distributed calculus is proposed for describing networks of services. We model service interactio...
A static approach is proposed to study secure composition of services. We extend the lambda-calculus...
A static approach is proposed to study secure composition of services. We extend the $\lambda$-calc...
A static approach is proposed to study secure composition of services. We extend the $\lambda$-calc...
A static approach is proposed to study secure composition of services. We extend the λ-calculus with...
A static approach is proposed to study secure composition of services. We extend the λ-calculus with...
A static approach is proposed to study secure composition of software. We extend the $\lambda$-calc...
A static approach is proposed to study secure composition of software. We extend the $\lambda$-calc...
A static approach is proposed to study secure composition of software. We extend the λ calculus with...
We present a framework for designing and composing services in a secure manner. Services can enforce...
Abstract—We outline a methodology for designing and composing services in a secure manner. In partic...
We use a distributed, enriched λ-calculus for describing networks of services. Both services and the...
A distributed calculus is proposed for describing networks of services. We model service interaction...
We outline a methodology for designing and composing services in a secure manner. In particular,...
A distributed calculus is proposed for describing networks of services. We model service interactio...
A distributed calculus is proposed for describing networks of services. We model service interactio...