Due to technological advances such as the Internet and mobile computing, Security has become a serious challenge involving several disciplines of Computer Science. In recent years, there has been a growing interest in the analysis of security protocols and one promising approach is the development of formalisms that model communicating processes, in particular Process Calculi. The results are so far encouraging although most remains to be done
This paper formalises the security of programmable secure computation focusing on simplifying securi...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
(utcc) process calculus; a generalisation of Timed Concurrent Constraint Programming. The utcc calcu...
Due to technological advances such as the Internet and mobile computing, Security has become a serio...
Motivation. Due to technological advances such as the Internet and mobile comput-ing, Security has b...
Language-based and process calculi-based information security are well developed fields of computer ...
Process calculi are expressive specification languages for concurrency. They have been very successf...
textabstractProcess calculi are expressive specification languages for concurrency. They have been v...
We explore the applicability of the programming method of Feijen and van Gasteren to the domain of s...
Timed Concurrent Constraint Programming (tcc) is a declarative model for concurrency offering a logi...
AbstractWe show how to formulate and analyse some security notions in the context of declarative pro...
Abstract. We present a general unwinding framework for the definition of information flow security p...
Recently there has been much interest towards using formal methods in the analysis of security proto...
This paper formalises the security of programmable secure computation focusing on simplifying securi...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
(utcc) process calculus; a generalisation of Timed Concurrent Constraint Programming. The utcc calcu...
Due to technological advances such as the Internet and mobile computing, Security has become a serio...
Motivation. Due to technological advances such as the Internet and mobile comput-ing, Security has b...
Language-based and process calculi-based information security are well developed fields of computer ...
Process calculi are expressive specification languages for concurrency. They have been very successf...
textabstractProcess calculi are expressive specification languages for concurrency. They have been v...
We explore the applicability of the programming method of Feijen and van Gasteren to the domain of s...
Timed Concurrent Constraint Programming (tcc) is a declarative model for concurrency offering a logi...
AbstractWe show how to formulate and analyse some security notions in the context of declarative pro...
Abstract. We present a general unwinding framework for the definition of information flow security p...
Recently there has been much interest towards using formal methods in the analysis of security proto...
This paper formalises the security of programmable secure computation focusing on simplifying securi...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
(utcc) process calculus; a generalisation of Timed Concurrent Constraint Programming. The utcc calcu...