Information flow vs. resource access in the asynchronous pi-calculus

作者: Matthew Hennessy , James Riely

DOI: 10.1145/570886.570890

关键词:

摘要: We propose an extension of the asynchronous π-calculus in which a variety security properties may be captured using types. These are input/output types for I/O capabilities assigned specific levels. The main innovation is uniform typing system that, by varying slightly allowed set types, captures different notions security.We first define that ensures processes running at level σ cannot access resources with higher than σ. notion control guaranteed this formalized terms Type Safety Theorem.We then show restricting our prohibits implicit information flow from high-level to low-level processes. prove behavior can not influenced changes behavior. This as noninterference theorem respect testing.

参考文章(29)
Robin Milner, Communication and Concurrency ,(1989)
Ilaria Castellani, Matthew Hennessy, Testing Theories for Asynchronous Languages foundations of software technology and theoretical computer science. pp. 90- 101 ,(1998) , 10.1007/978-3-540-49382-2_9
Cédric Fournet, Georges Gonthier, Jean-Jacques Levy, Luc Maranget, Didier Rémy, A Calculus of Mobile Agents international conference on concurrency theory. pp. 406- 421 ,(1996) , 10.1007/3-540-61604-7_67
Benjamin C. Pierce, David N. Turner, Pict: a programming language based on the Pi-Calculus Proof, language, and interaction. pp. 455- 494 ,(2000)
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson, Static Analysis of Processes for No and Read-Up nad No Write-Down foundations of software science and computation structure. ,vol. 1578, pp. 120- 134 ,(1999) , 10.1007/3-540-49019-1_9
Kohei Honda, Mario Tokoro, On Asynchronous Communication Semantics european conference on object-oriented programming. pp. 21- 51 ,(1991) , 10.1007/3-540-55613-3_2
Riccardo Focardi, Roberto Gorrieri, A Classification of Security Properties for Process Algebras Journal of Computer Security. ,vol. 3, pp. 5- 33 ,(1995) , 10.3233/JCS-1994/1995-3103
Martín Abadi, Secrecy by Typing inSecurity Protocols international symposium on theoretical aspects of computer software. pp. 611- 638 ,(1997) , 10.1007/BFB0014571
J. A. Goguen, J. Meseguer, Security Policies and Security Models ieee symposium on security and privacy. pp. 11- 11 ,(1982) , 10.1109/SP.1982.10014
Martín Abadi, Secrecy by typing in security protocols Journal of the ACM. ,vol. 46, pp. 749- 786 ,(1999) , 10.1145/324133.324266