The type and effect discipline
Information and Computation
Integrating functional and imperative programming
LFP '86 Proceedings of the 1986 ACM conference on LISP and functional programming
Web services: beyond component-based computing
Communications of the ACM
Language Primitives and Type Discipline for Structured Communication-Based Programming
ESOP '98 Proceedings of the 7th European Symposium on Programming: Programming Languages and Systems
Correct System Design, Recent Insight and Advances, (to Hans Langmaack on the occasion of his retirement from his professorship at the University of Kiel)
Semantic Matching of Web Services Capabilities
ISWC '02 Proceedings of the First International Semantic Web Conference on The Semantic Web
On the Decidability of Model Checking for Several µ-calculi and Petri Nets
CAAP '94 Proceedings of the 19th International Colloquium on Trees in Algebra and Programming
Types and Effects for Asymmetric Cryptographic Protocols
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Secure composition of untrusted code: box π, wrappers, and causality types
Journal of Computer Security - CSFW13
A Semantic Model for Authentication Protocols
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Introduction: Service-oriented computing
Communications of the ACM - Service-oriented computing
Communications of the ACM - Service-oriented computing
Service -Oriented Computing: Concepts, Characteristics and Directions
WISE '03 Proceedings of the Fourth International Conference on Web Information Systems Engineering
A semantics for web services authentication
Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Web Services Are Not Distributed Objects
IEEE Internet Computing
Enforcing Secure Service Composition
CSFW '05 Proceedings of the 18th IEEE workshop on Computer Security Foundations
Secure sessions for web services
SWS '04 Proceedings of the 2004 workshop on Secure web service
Types and Effects for Secure Service Orchestration
CSFW '06 Proceedings of the 19th IEEE workshop on Computer Security Foundations
Web Services: Concepts, Architectures and Applications
Web Services: Concepts, Architectures and Applications
Towards semi-automated workflow-based aggregation of web services
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
History-based access control with local policies
FOSSACS'05 Proceedings of the 8th international conference on Foundations of Software Science and Computation Structures
Enhancing web services description and discovery to facilitate composition
SWSWPC'04 Proceedings of the First international conference on Semantic Web Services and Web Process Composition
Ad hoc composition of user tasks in pervasive computing environments
SC'05 Proceedings of the 4th international conference on Software Composition
Barbed Model--Driven Software Development: A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
Service Discovery and Negotiation With COWS
Electronic Notes in Theoretical Computer Science (ENTCS)
Regulating data exchange in service oriented applications
FSEN'07 Proceedings of the 2007 international conference on Fundamentals of software engineering
SENSORIA process calculi for service-oriented computing
TGC'06 Proceedings of the 2nd international conference on Trustworthy global computing
Synthesis of web services orchestrators in a timed setting
WS-FM'07 Proceedings of the 4th international conference on Web services and formal methods
Semantic-Based development of service-oriented systems
FORTE'06 Proceedings of the 26th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
Compositional verification of application-level security properties
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Hi-index | 0.00 |
We use a distributed, enriched λ-calculus for describing networks of services. Both services and their clients can protect themselves, by imposing security constraints on each other's behaviour. Then, service interaction results in a call-by-property mechanism, that matches the client requests with service's. A static approach is also described, that determines how to compose services while guaranteeing that their execution is always secure, without resorting to any dynamic check.