Typed processes in untyped contexts

作者: Michele Bugliesi , Marco Giunti

DOI: 10.1007/11580850_3

关键词: Computer securityComputer scienceSubject reductionControl (linguistics)

摘要: The use of types to control the behavior processes in pi-calculus is a long known and well established technique.

参考文章(7)
Roberto M. Amadio, Ilaria Castellani, Davide Sangiorgi, On bisimulations of the asynchronous p-calculus international conference on concurrency theory. ,vol. 195, pp. 291- 324 ,(1998) , 10.1016/S0304-3975(97)00223-5
Matthew Hennessy, Robin Milner, On Observing Nondeterminism and Concurrency international colloquium on automata, languages and programming. pp. 299- 309 ,(1980) , 10.1007/3-540-10003-2_79
Martín Abadi, Cédric Fournet, Mobile values, new names, and secure communication Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '01. ,vol. 36, pp. 104- 115 ,(2001) , 10.1145/360204.360213
MATTHEW HENNESSY, JULIAN RATHKE, Typed behavioural equivalences for processes in the presence of subtyping Mathematical Structures in Computer Science. ,vol. 14, pp. 651- 684 ,(2004) , 10.1017/S0960129504004281
Martı́n Abadi, Cédric Fournet, Georges Gonthier, Secure implementation of channel abstractions Information & Computation. ,vol. 174, pp. 37- 83 ,(2002) , 10.1006/INCO.2002.3086
Martín Abadi, Protection in Programming-Language Translations international colloquium on automata languages and programming. pp. 868- 883 ,(1998) , 10.1007/3-540-48749-2_2
Benjamin Pierce, Davide Sangiorgi, Typing and subtyping for mobile processes Mathematical Structures in Computer Science. ,vol. 6, pp. 409- 453 ,(1996) , 10.1017/S096012950007002X