Information Flow vs. Resource Access in the Asynchronous Pi-Calculus (Extended Abstract)
- 1 January 2000
- book chapter
- Published by Springer Nature
- p. 415-427
- https://doi.org/10.1007/3-540-45022-x_35
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Secure Information Flow as Typed Process BehaviourPublished by Springer Nature ,2000
- Static Analysis of Processes for No Read-Up and No Write-DownPublished by Springer Nature ,1999
- The SLam calculusPublished by Association for Computing Machinery (ACM) ,1998
- Control flow analysis for the π-calculusPublished by Springer Nature ,1998
- Secrecy by typing in security protocolsPublished by Springer Nature ,1997
- A calculus of mobile agentsPublished by Springer Nature ,1996
- Modal logics for mobile processesTheoretical Computer Science, 1993
- Testing equivalences for processesTheoretical Computer Science, 1984
- An Axiomatic Approach to Information Flow in ProgramsACM Transactions on Programming Languages and Systems, 1980
- Certification of programs for secure information flowCommunications of the ACM, 1977