Theoretical Computer Science
Resource access control in systems of mobile agents
Information and Computation
PI-Calculus: A Theory of Mobile Processes
PI-Calculus: A Theory of Mobile Processes
Information flow vs. resource access in the asynchronous pi-calculus
ACM Transactions on Programming Languages and Systems (TOPLAS)
Types for the ambient calculus
Information and Computation - IFIP TCS2000
Lattice-Based Access Control Models
Computer
Ubql: a distributed query language to program distributed query systems
Ubql: a distributed query language to program distributed query systems
Formalising Java RMI with explicit code mobility
OOPSLA '05 Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Theoretical Computer Science - Applied semantics: Selected topics
Information and Computation
A mobility calculus with local and dependent types
Processes, Terms and Cycles
Language-based information-flow security
IEEE Journal on Selected Areas in Communications
XPi: A typed process calculus for XML messaging
Science of Computer Programming
Calculi, types and applications
Theoretical Computer Science
Security types for dynamic web data
Theoretical Computer Science
Hi-index | 0.00 |
We describe a type system for the Xdπ calculus, introduced in [8]. An Xdπ-network is a network of locations, where each location consists of both a data tree (which contains scripts and pointers to nodes in trees at different locations) and a process, for modelling process interaction, process migration and interaction between processes and data. Our type system is based on types for locations, trees and processes, expressing security levels. The type system enjoys type preservation under reduction (subject reduction). In consequence of subject reduction we prove the following security properties. In a well-typed Xdπ-network, data in a location are accessible only to processes in locations of equal or higher security level. Moreover, processes originating in a location can only go to locations of equal or less security level, with the exception of movements which are returns to the "source" location.