Control Flow Analysis for the pi-calculus
暂无分享,去创建一个
Flemming Nielson | Hanne Riis Nielson | Pierpaolo Degano | Chiara Bodei | F. Nielson | H. R. Nielson | P. Degano | C. Bodei
[1] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[2] Peter Sewell. Global / Local Subtyping for a Distributed-calculus , 1997 .
[3] Roberto Gorrieri,et al. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties , 1997, IEEE Trans. Software Eng..
[4] Olin Shivers,et al. Control flow analysis in scheme , 1988, PLDI '88.
[5] Robin Milner,et al. Modal Logics for Mobile Processes , 1991, Theor. Comput. Sci..
[6] Martín Abadi,et al. Secrecy by Typing inSecurity Protocols , 1997, TACS.
[7] Rocco De Nicola,et al. Coordinating Mobile Agents via Blackboards and Access Rights , 1997, COORDINATION.
[8] Flemming Nielson,et al. Systematic realisation of control flow analyses for CML , 1997, ICFP '97.
[9] B. Pierce,et al. Typing and subtyping for mobile processes , 1993, [1993] Proceedings Eighth Annual IEEE Symposium on Logic in Computer Science.
[10] Arnaud Venet,et al. Abstract Interpretation of the pi-Calculus , 1996, LOMAPS.
[11] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[12] James Riely,et al. A typed language for distributed mobile processes (extended abstract) , 1998, POPL '98.
[13] Martín Abadi,et al. Secrecy by typing in security protocols , 1999, JACM.
[14] Riccardo Focardi,et al. Comparing two information flow security properties , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[15] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[16] Jens Palsberg,et al. Object-oriented type systems , 1994, Wiley professional computing.
[17] Matthew Hennessy. A Typed Language for Distributed Mobile Processes , 1998 .
[18] Cosimo Laneve,et al. Implicit Typing à la ML for the Join-Calculus , 1997, CONCUR.
[19] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[20] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[21] Roberto M. Amadio,et al. An Asynchronous Model of Locality, Failure and Process Mobility , 1997, COORDINATION.