Process Algebra and Security

  • Authors:
  • Steve Schneider

  • Affiliations:
  • -

  • Venue:
  • CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
  • Year:
  • 2001

Quantified Score

Hi-index 0.01

Visualization

Abstract

Over the past decade, techniques from concurrency theory have been applied to problem areas in security, sometimes with extremely successful results. This talk discusses the contribution made by concurrency theory to the analysis of security protocols, and to the eharaeterisation of non-interference properties.