2016
DOI: 10.1007/s00165-016-0381-3
|View full text |Cite
|
Sign up to set email alerts
|

Self-adaptation and secure information flow in multiparty communications

Abstract: Abstract. We present a comprehensive model of structured communications in which self-adaptation and security concerns are jointly addressed. More specifically, we propose a model of multiparty, self-adaptive communications with access control and secure information flow guarantees. In our model, multiparty protocols (choreographies) are described as global types; security violations occur when process implementations of protocol participants attempt to read or write messages of inappropriate security levels w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 23 publications
(21 citation statements)
references
References 48 publications
0
21
0
Order By: Relevance
“…Expressiveness issues of multiparty session types (MPST) have received some attention, but efforts have primarily been geared towards adding more advanced features (e.g., time [5,36], security [7,8,9,13], and parametrisation [14,20,39]); in contrast, restrictions on the usage of core features like choice and interleaving have remained, even though they limit MPST's applicability in practice (e.g., our Tic-Tac-Toe specification cannot be expressed; Fig. 5).…”
Section: Related Workmentioning
confidence: 99%
“…Expressiveness issues of multiparty session types (MPST) have received some attention, but efforts have primarily been geared towards adding more advanced features (e.g., time [5,36], security [7,8,9,13], and parametrisation [14,20,39]); in contrast, restrictions on the usage of core features like choice and interleaving have remained, even though they limit MPST's applicability in practice (e.g., our Tic-Tac-Toe specification cannot be expressed; Fig. 5).…”
Section: Related Workmentioning
confidence: 99%
“…Figure 9 reports a very simple system for decreeing wellformedness. It is inspired by the type system for processes defined in [4]; clearly, more sophisticated systems, such as variants of those in [19,13], can be considered. We rely on two judgments:…”
Section: B2 Appendix To § 43mentioning
confidence: 99%
“…Works addressing adaptation for multiparty communications include [14], [15], [16], [17] and [18]. In the paper [14] global and session types are used to guarantee deadlockfreedom in a calculus of multiparty sessions with asynchronous communications.…”
Section: Related Work and Conclusionmentioning
confidence: 99%
“…The adaptive system is composed by interacting participants deployed on different locations, each executing its own code. The calculus of [17] is inspired by [4], the main difference being that security violations trigger adaptation mechanisms that prevent violations to occur and/or to propagate their effect in the systems. An event based approach is proposed in [18].…”
Section: Related Work and Conclusionmentioning
confidence: 99%