2008 21st IEEE Computer Security Foundations Symposium 2008
DOI: 10.1109/csf.2008.17
|View full text |Cite
|
Sign up to set email alerts
|

Language Based Secure Communication

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
20
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 15 publications
(21 citation statements)
references
References 19 publications
1
20
0
Order By: Relevance
“…The present paper continues on the line of work initiated in [7,6], by introducing a type system to provide static security guarantees for the high-level abstractions for distributed messaging proposed in those papers.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The present paper continues on the line of work initiated in [7,6], by introducing a type system to provide static security guarantees for the high-level abstractions for distributed messaging proposed in those papers.…”
Section: Discussionmentioning
confidence: 99%
“…The label shows the view of the output available to an observer, while the cached copy holds both the internal and the external view of the payload. If the output is plain, the two views coincide; if it is secret, the external view is a tupleñ of fresh names: as discussed in [7], this corresponds to assume an implementation of a secret output in terms of randomized encryption. The (Open) rules implement the scope extrusion mechanisms: notice that channel names are always extruded in an output.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To help reasoning about the security properties, the specification of security protocols with high-level programming abstractions, suited for security analysis and automated verification, has been advocated by the formal methods for security research community [4], [5]. This was also one of the reasons for developing tools for the verification of security protocols in the symbolic model [6], [7], [8], and for the automatic generation of security protocols implementations [9], [10], [11].…”
Section: Introductionmentioning
confidence: 99%
“…Dilloway and Lowe present a hierarchy of secure channels and discuss their relative strengths [17]. Bugliesi and Focardi devise secure channel abstractions in a process algebraic setting and reason about the relative power of a low-level adversary [18]. Armando et al model different channel types using set-rewriting and linear temporal logic [19].…”
Section: Introductionmentioning
confidence: 99%