2011
DOI: 10.1007/978-3-642-25379-9_4
|View full text |Cite
|
Sign up to set email alerts
|

Proof-Carrying Code in a Session-Typed Process Calculus

Abstract: Abstract. Dependent session types allow us to describe not only properties of the I/O behavior of processes but also of the exchanged data. In this paper we show how to exploit dependent session types to express proof-carrying communication. We further introduce two modal operators into the type theory to provide detailed control about how much information is communicated: one based on traditional proof irrelevance and one integrating digital signatures.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 26 publications
(24 citation statements)
references
References 20 publications
0
24
0
Order By: Relevance
“…rule (T∃L)) implies inputing a type and then using the session as A, agnostic to what the actual received type can be. Note that in the presence of polymorphism the identity rule (Tid) (not present in [6,7], but used in [26,21,20]) is necessary, since it is the only way of typing a session with a type variable.…”
Section: Fig 1 π-Calculus Labeled Transition Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…rule (T∃L)) implies inputing a type and then using the session as A, agnostic to what the actual received type can be. Note that in the presence of polymorphism the identity rule (Tid) (not present in [6,7], but used in [26,21,20]) is necessary, since it is the only way of typing a session with a type variable.…”
Section: Fig 1 π-Calculus Labeled Transition Systemmentioning
confidence: 99%
“…In the remainder of this introduction, we briefly describe the logical interpretation of [6] and illustrate the potential of our model of polymorphic sessions with an example. Our ongoing research program on logical foundations for session-based concurrency [6,26,21,7,20,8] builds upon an interpretation of intuitionistic linear logical propositions as session types, sequent proofs as π-calculus processes [25], and cut elimination as process communication. In the resulting Curry-Howard correspondence, well-typed processes enjoy strong forms of type preservation and global progress [6,7], and are strongly normalizing [20].…”
Section: Introductionmentioning
confidence: 99%
“…To overcome this issue, we propose the adoption of value dependent multiparty session types, which refine multiparty session types by adding type dependencies to specifications of exchanged data (extending the work of [12,17] for the binary setting).…”
Section: Multiparty Session Typesmentioning
confidence: 99%
“…While a wide range of works on binary and multiparty session types exist in the literature [3,4,9,10], the two that are most related to this work consist of the logically-motivated value dependent binary session types of [2,12,17] and the assertion-based extensions of multiparty session types [1].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation