A flexible architecture for performance experiments with the pi-Calculus and its extensions
Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques
Formal approaches to location management in mobile communications
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
Hi-index | 0.00 |
In order to search and analysis the threat model of active network, we hope to present a kind of strict and mathematic model analysis for active network security.We use the \pi-calculusto analyze the security relation of active network components and respectively present calculus model for active node, active code/packet, EE, and user. The threat system calculus model is also proposed and proved that it is congruence. Finally, the conclusion is presented in this paper