WG2: Security

Members

Ilaria Castellani (chair)

Hugo Vieira (vice-chair)

Bogdan Aman, Viviana Bono, Michele Boreale, Luís Caires, Sara Capecchi, Marco Carbone, Gabriel Ciobanu, Mario Coppo, Pierre-Malo Deniélou, Mariangiola Dezani-Ciancaglini, Cinzia Di Giusto, Tihana Galinac Grbac, Simon Gay, Silvia Ghilezan, Hans Hüttel, Jelena Ivetic, Svetlana Jaksic, James Leifer, Luigi Liquori, Aleksandra Mileva, Luca Padovani, Jovanka Pantovic, Jorge Perez, Simona Ranauskaite, Davide Sangiorgi, João Seco, Vaclovas Sirius, Peter Thiemann, Bernardo Toninho, Betti Venneri

Email List

The email list for WG2 is betty-security@dcs.gla.ac.uk. Messages are only accepted from subscribers, so you have to make sure that you are sending from your subscribed address.

The administrative web site for the email list allows the WG chair to update the list of subscribers, and allows individual subscribers to change their options.

State of the art report

(Current) References

bibtex

  • [AB10] Lucia Acciai and Michele Boreale. Spatial and Behavioral Types in the π-Calculus. Inf. Comput., 208(10):1118–1153, 2010.
  • [AB12] Lucia Acciai and Michele Boreale. Deciding Safety Properties in Infinite-State π-Calculus via Behavioural Types. Inf. Comput., 212:92–117, 2012.
  • [BCCDC11] Viviana Bono, Sara Capecchi, Ilaria Castellani, and Mariangiola Dezani-Ciancaglini. A Reputation System for Multirole Sessions. In Roberto Bruni and Vladimiro Sassone, editors, Trustworthy Global Computing - 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers, volume 7173 of Lecture Notes in Computer Science, pages 1–24. Springer, 2011.
  • [BCD+09] Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, and James J. Leifer. Cryptographic Protocol Synthesis and Verification for Multiparty Sessions. In Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009, pages 124–140. IEEE Computer Society, 2009.
  • [BCFG07] Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, and Andrew D. Gordon. Secure Sessions for Web Services. ACM Trans. Inf. Syst. Secur., 10(2), 2007.
  • [BCG05] Eduardo Bonelli, Adriana B. Compagnoni, and Elsa L. Gunter. Correspondence Assertions for Process Synchronization in Concurrent Communications. J. Funct. Program., 15(2):219–247, 2005.
  • [BCVV12] Pedro Baltazar, Luís Caires, Vasco Thudichum Vasconcelos, and Hugo Torres Vieira. A Type System for Flexible Role Assignment in Multiparty Communicating Systems. In Catuscia Palamidessi and Mark Ryan, editors, Trustworthy Global Computing, 7th International Symposium, TGC 2012, Newcastle upon Tyne, Uk, September 7-8, 2012, Revised Selected Papers, Lecture Notes in Computer Science. Springer, 2013. To appear.
  • [BMV12] Pedro Baltazar, Dimitris Mostrous, and Vasco Thudichum Vasconcelos. Linearly refined session types. In Sandra Alves and Ian Mackie, editors, Proceedings 2nd International Workshop on Linearity, volume 101 of EPTCS, pages 38–49, 2012.
  • [Cai08] Luís Caires. Spatial-behavioral types for concurrency and resource control in distributed systems. Theor. Comput. Sci., 402(2-3):120–141, 2008.
  • [CCDC11] Sara Capecchi, Ilaria Castellani, and Mariangiola Dezani-Ciancaglini. Information Flow Safety in Multiparty Sessions. In Bas Luttik and Frank Valencia, editors, Proceedings 18th International Workshop on Expressiveness in Concurrency, volume 64 of EPTCS, pages 16–30, 2011.
  • [CCDC13] Sara Capecchi, Ilaria Castellani, and Mariangiola Dezani-Ciancaglini. Typing Access Control and Secure Information Flow in Sessions. Inf. Comput., 2013. To appear.
  • [CCDCR10] Sara Capecchi, Ilaria Castellani, Mariangiola Dezani-Ciancaglini, and Tamara Rezk. Session Types for Access and Information Flow Control. In Paul Gastin and François Laroussinie, editors, CONCUR 2010 - Concurrency Theory, 21th International Conference, CONCUR 2010, Paris, France, August 31-September 3, 2010. Proceedings, volume 6269 of Lecture Notes in Computer Science, pages 237–252. Springer, 2010.
  • [CD07] Ricardo Corin and Pierre-Malo Deniélou. A protocol compiler for secure sessions in ml. In Gilles Barthe and Cédric Fournet, editors, Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers, volume 4912 of Lecture Notes in Computer Science, pages 276–293. Springer, 2007.
  • [CDF+07] Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, and James J. Leifer. Secure Implementations for Typed Session Abstractions. In 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pages 170–186. IEEE Computer Society, 2007.
  • [CDF+08] Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, and James J. Leifer. A Secure Compiler for Session Abstractions. Journal of Computer Security, 16(5):573–636, 2008.
  • [CG13] Marco Carbone and Joshua D. Guttman. Sessions and separability in security protocols. In David A. Basin and John C. Mitchell, editors, Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, volume 7796 of Lecture Notes in Computer Science, pages 267–286. Springer, 2013.
  • [CS13] Luís Caires and João Costa Seco. The type discipline of behavioral separation. In Roberto Giacobazzi and Radhia Cousot, editors, The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL ’13, Rome, Italy - January 23 - 25, 2013, pages 275–286. ACM, 2013.
  • [DCGJP10] Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Svetlana Jaksic, and Jovanka Pantovic. Types for Role-Based Access Control of Dynamic Web Data. In Julio Mariño, editor, Functional and Constraint Logic Programming - 19th International Workshop, WFLP 2010, Madrid, Spain, January 17, 2010. Revised Selected Papers, volume 6559 of Lecture Notes in Computer Science, pages 1–29. Springer, 2010.
  • [DCGPV08] Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Jovanka Pantovic, and Daniele Varacca. Security Types for Dynamic Web Data. Theor. Comput. Sci., 402(2-3):156–171, 2008.
  • [DCHS12] Mariangiola Dezani-Ciancaglini, Ross Horne, and Vladimiro Sassone. Tracing where and who provenance in linked data: A calculus. Theor. Comput. Sci., 464:113–129, 2012.
  • [DKSH11] Morten Dahl, Naoki Kobayashi, Yunde Sun, and Hans Huttel. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols. In Tevfik Bultan and Pao-Ann Hsiung, editors, Automated Technology for Verification and Analysis, 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14, 2011. Proceedings, volume 6996 of Lecture Notes in Computer Science, pages 75–89. Springer, 2011.
  • [FV13] Juliana Franco and Vasco Thudichum Vasconcelos. A concurrent programming language with refined session types. In Simon Gay, editor, 2nd International Workshop on Behavioural Types, BEAT 2, Madrid, Spain, September 23-24, 2013, Pre- proceedings, pages 33–42. University Complutense of Madrid, 2013.
  • [GJ03] Andrew D. Gordon and Alan Jeffrey. Typing correspondence assertions for communication protocols. Theor. Comput. Sci., 300(1-3):379–409, 2003.
  • [GJPDC12] Silvia Ghilezan, Svetlana Jaksic, Jovanka Pantovic, and Mariangiola Dezani-Ciancaglini. Types and Roles for Web Security. Transactions on Advanced Research, 8(2):16–21, 2012.
  • [HBT12] Phillip Heidegger, Annette Bieniusa, and Peter Thiemann. Access Permission Contracts for Scripting Languages. In John Field and Michael Hicks, editors, Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, Philadelphia, Pennsylvania, USA, January 22-28, 2012, pages 111–122. ACM, 2012.
  • [HR00] Matthew Hennessy and James Riely. Information flow vs. resource access in the asynchronous pi-calculus. In Ugo Montanari, José D. P. Rolim, and Emo Welzl, editors, Automata, Languages and Programming, 27th International Colloquium, ICALP 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings, volume 1853 of Lecture Notes in Computer Science, pages 415–427. Springer, 2000.
  • [HY05] Kohei Honda and Nobuko Yoshida. Noninterference through flow analysis. J. Funct. Program., 15(2):293–349, 2005.
  • [HY07] Kohei Honda and Nobuko Yoshida. A uniform type structure for secure information flow. ACM Trans. Program. Lang. Syst., 29(6), 2007.
  • [Jak12] Svetlana Jaksic. Input/Output Types for Dynamic Web Data. In Theoretical Computer Science, 13th Italian Conference, ICTCS 2012, Varese, Italy, September 19-21, 2012, Proceedings, 2012.
  • [Kob05] Naoki Kobayashi. Type-based information flow analysis for the pi-calculus. Acta Inf., 42(4-5):291–347, 2005.
  • [Kol08] Marija Kolundzija. Security Types for Sessions and Pipelines. In Roberto Bruni and Karsten Wolf, editors, Web Services and Formal Methods, 5th International Workshop, WS-FM 2008, Milan, Italy, September 4-5, 2008, Revised Selected Papers, volume 5387 of Lecture Notes in Computer Science, pages 175–190. Springer, 2008.
  • [KP13] Dimitrios Kouzapas and Anna Philippou. A typing system for privacy. In Simon Gay, editor, 2nd International Workshop on Behavioural Types, BEAT 2, Madrid, Spain, September 23-24, 2013, Pre-proceedings, pages 51–60. University Complutense of Madrid, 2013.
  • [LPT07] Alessandro Lapadula, Rosario Pugliese, and Francesco Tiezzi. Regulating data exchange in service oriented applications. In Farhad Arbab and Marjan Sirjani, editors, International Symposium on Fundamentals of Software Engineering, International Symposium, FSEN 2007, Tehran, Iran, April 17-19, 2007, Proceedings, volume 4767 of Lecture Notes in Computer Science, pages 223–239. Springer, 2007.
  • [PCF09] Jérémy Planul, Ricardo Corin, and Cédric Fournet. Secure Enforcement for Global Process Specifications. In Mario Bravetti and Gianluigi Zavattaro, editors, CONCUR 2009 - Concurrency Theory, 20th International Conference, CONCUR 2009, Bologna, Italy, September 1-4, 2009. Proceedings, volume 5710 of Lecture Notes in Computer Science, pages 511–526. Springer, 2009.
  • [PCT11] Frank Pfenning, Luís Caires, and Bernardo Toninho. Proof-Carrying Code in a Session-Typed Process Calculus. In Jean-Pierre Jouannaud and Zhong Shao, editors, Certified Programs and Proofs - First International Conference, CPP 2011, Kent-ing, Taiwan, December 7-9, 2011. Proceedings, volume 7086 of Lecture Notes in Computer Science, pages 21–36. Springer, 2011.
  • [YHB07] Nobuko Yoshida, Kohei Honda, and Martin Berger. Linearity and bisimulation. J. Log. Algebr. Program., 72(2):207–238, 2007.

(Authors in WG2 [BCD+09, DKSH11, HBT12, CCDCR10, CCDC11, BCCDC11, CCDC13, BCVV12, CDF+08, CDF+07, PCT11, CS13, DCGJP10, DCGPV08, Jak12, GJPDC12, AB12, AB10, CG13, HY05, HY07, YHB07, Cai08, BMV12, FV13, CD07, DCHS12] and others [BCFG07, BCG05, Kol08, PCF09, LPT07, Kob05, HR00, KP13, GJ03])

 
wg2-security.txt · Last modified: 2013/10/08 16:15 by hugo
 
Except where otherwise noted, content on this wiki is licensed under the following license:CC Attribution-Share Alike 3.0 Unported
Recent changes RSS feed Donate Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki