The rest of the paper is organized as follow: section 2 describes background knowledge and related work for calculus (or Pi calculus); Section 3 presents calculus model of active network security, and analysis this calculus model, then final section concludes the paper.In order to search and analysis the threat model of active network, we hope to present a kind of strict and mathematic model analysis for active network security.We use the -calculus to analyze the security relation of active network components and respectively present calculus model for active node, active code/packet, EE, and user. The threat system calculus model is also proposed and proved that it is congruence. Finally, the conclusion is presented in this paper
BackgroundThe pi calculus [12][13] [14] is a small but extremely expressive Programming language. It is the original example of a nominal calculus, and is the archetype for many others. It was originally designed to be a foundation for Concurrent computation, in the same way as the -calculus is a foundation for Sequential computation. First published in the same year as Needham's lecture
KEY WORDS-calculus, active network, threat model, calculus model