Differences

This shows you the differences between two versions of the page.

wg2-security [2013/09/25 17:45]
hugo [State of the art report]
wg2-security [2013/10/08 16:15] (current)
hugo [(Current) References]
Line 37: Line 37:
  
   * [BCVV12] Pedro Baltazar, Luís Caires, Vasco Thudichum Vasconcelos, and Hugo Torres Vieira. A Type System for Flexible Role Assignment in Multiparty Communicating Systems. In Catuscia Palamidessi and Mark Ryan, editors, Trustworthy Global Computing, 7th International Symposium, TGC 2012, Newcastle upon Tyne, Uk, September 7-8, 2012, Revised Selected Papers, Lecture Notes in Computer Science. Springer, 2013. To appear.    * [BCVV12] Pedro Baltazar, Luís Caires, Vasco Thudichum Vasconcelos, and Hugo Torres Vieira. A Type System for Flexible Role Assignment in Multiparty Communicating Systems. In Catuscia Palamidessi and Mark Ryan, editors, Trustworthy Global Computing, 7th International Symposium, TGC 2012, Newcastle upon Tyne, Uk, September 7-8, 2012, Revised Selected Papers, Lecture Notes in Computer Science. Springer, 2013. To appear. 
 +
 +  * [BMV12] Pedro Baltazar, Dimitris Mostrous, and Vasco Thudichum Vasconcelos. Linearly refined session types. In Sandra Alves and Ian Mackie, editors, Proceedings 2nd International Workshop on Linearity, volume 101 of EPTCS, pages 38–49, 2012.
 +
 +  * [Cai08] Luís Caires. Spatial-behavioral types for concurrency and resource control in distributed systems. Theor. Comput. Sci., 402(2-3):120–141, 2008.
  
   * [CCDC11] Sara Capecchi, Ilaria Castellani, and Mariangiola Dezani-Ciancaglini. Information Flow Safety in Multiparty Sessions. In Bas Luttik and Frank Valencia, editors, Proceedings 18th International Workshop on Expressiveness in Concurrency, volume 64 of EPTCS, pages 16–30, 2011.    * [CCDC11] Sara Capecchi, Ilaria Castellani, and Mariangiola Dezani-Ciancaglini. Information Flow Safety in Multiparty Sessions. In Bas Luttik and Frank Valencia, editors, Proceedings 18th International Workshop on Expressiveness in Concurrency, volume 64 of EPTCS, pages 16–30, 2011. 
Line 43: Line 47:
  
   * [CCDCR10] Sara Capecchi, Ilaria Castellani, Mariangiola Dezani-Ciancaglini, and Tamara Rezk. Session Types for Access and Information Flow Control. In Paul Gastin and François Laroussinie, editors, CONCUR 2010 - Concurrency Theory, 21th International Conference, CONCUR 2010, Paris, France, August 31-September 3, 2010. Proceedings, volume 6269 of Lecture Notes in Computer Science, pages 237–252. Springer, 2010.    * [CCDCR10] Sara Capecchi, Ilaria Castellani, Mariangiola Dezani-Ciancaglini, and Tamara Rezk. Session Types for Access and Information Flow Control. In Paul Gastin and François Laroussinie, editors, CONCUR 2010 - Concurrency Theory, 21th International Conference, CONCUR 2010, Paris, France, August 31-September 3, 2010. Proceedings, volume 6269 of Lecture Notes in Computer Science, pages 237–252. Springer, 2010. 
 +
 +  * [CD07] Ricardo Corin and Pierre-Malo Deniélou. A protocol compiler for secure sessions in ml. In Gilles Barthe and Cédric Fournet, editors, Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers, volume 4912 of Lecture Notes in Computer Science, pages 276–293. Springer, 2007.
  
   * [CDF+07] Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, and James J. Leifer. Secure Implementations for Typed Session Abstractions. In 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pages 170–186. IEEE Computer Society, 2007.    * [CDF+07] Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, and James J. Leifer. Secure Implementations for Typed Session Abstractions. In 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pages 170–186. IEEE Computer Society, 2007. 
Line 55: Line 61:
  
   * [DCGPV08] Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Jovanka Pantovic, and Daniele Varacca. Security Types for Dynamic Web Data. Theor. Comput. Sci., 402(2-3):156–171, 2008.    * [DCGPV08] Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Jovanka Pantovic, and Daniele Varacca. Security Types for Dynamic Web Data. Theor. Comput. Sci., 402(2-3):156–171, 2008. 
 +
 +  * [DCHS12] Mariangiola Dezani-Ciancaglini, Ross Horne, and Vladimiro Sassone. Tracing where and who provenance in linked data: A calculus. Theor. Comput. Sci., 464:113–129, 2012.
  
   * [DKSH11] Morten Dahl, Naoki Kobayashi, Yunde Sun, and Hans Huttel. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols. In Tevfik Bultan and Pao-Ann Hsiung, editors, Automated Technology for Verification and Analysis, 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14, 2011. Proceedings, volume 6996 of Lecture Notes in Computer Science, pages 75–89. Springer, 2011.    * [DKSH11] Morten Dahl, Naoki Kobayashi, Yunde Sun, and Hans Huttel. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols. In Tevfik Bultan and Pao-Ann Hsiung, editors, Automated Technology for Verification and Analysis, 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14, 2011. Proceedings, volume 6996 of Lecture Notes in Computer Science, pages 75–89. Springer, 2011. 
 +
 +  * [FV13] Juliana Franco and Vasco Thudichum Vasconcelos. A concurrent programming language with refined session types. In Simon Gay, editor, 2nd International Workshop on Behavioural Types, BEAT 2, Madrid, Spain, September 23-24, 2013, Pre- proceedings, pages 33–42. University Complutense of Madrid, 2013.
 +
 +  * [GJ03] Andrew D. Gordon and Alan Jeffrey. Typing correspondence assertions for communication protocols. Theor. Comput. Sci., 300(1-3):379–409, 2003.
  
   * [GJPDC12] Silvia Ghilezan, Svetlana Jaksic, Jovanka Pantovic, and Mariangiola Dezani-Ciancaglini. Types and Roles for Web Security. Transactions on Advanced Research, 8(2):16–21, 2012.    * [GJPDC12] Silvia Ghilezan, Svetlana Jaksic, Jovanka Pantovic, and Mariangiola Dezani-Ciancaglini. Types and Roles for Web Security. Transactions on Advanced Research, 8(2):16–21, 2012. 
  
   * [HBT12] Phillip Heidegger, Annette Bieniusa, and Peter Thiemann. Access Permission Contracts for Scripting Languages. In John Field and Michael Hicks, editors, Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, Philadelphia, Pennsylvania, USA, January 22-28, 2012, pages 111–122. ACM, 2012.    * [HBT12] Phillip Heidegger, Annette Bieniusa, and Peter Thiemann. Access Permission Contracts for Scripting Languages. In John Field and Michael Hicks, editors, Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, Philadelphia, Pennsylvania, USA, January 22-28, 2012, pages 111–122. ACM, 2012. 
 + 
 +  * [HR00] Matthew Hennessy and James Riely. Information flow vs. resource access in the asynchronous pi-calculus. In Ugo Montanari, José D. P. Rolim, and Emo Welzl, editors, Automata, Languages and Programming, 27th International Colloquium, ICALP 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings, volume 1853 of Lecture Notes in Computer Science, pages 415–427. Springer, 2000.
 + 
 +  * [HY05] Kohei Honda and Nobuko Yoshida. Noninterference through flow analysis. J. Funct. Program., 15(2):293–349, 2005.
 + 
 +  * [HY07] Kohei Honda and Nobuko Yoshida. A uniform type structure for secure information flow. ACM Trans. Program. Lang. Syst., 29(6), 2007.
  
   * [Jak12] Svetlana Jaksic. Input/Output Types for Dynamic Web Data. In Theoretical Computer Science, 13th Italian Conference, ICTCS 2012, Varese, Italy, September 19-21, 2012, Proceedings, 2012.    * [Jak12] Svetlana Jaksic. Input/Output Types for Dynamic Web Data. In Theoretical Computer Science, 13th Italian Conference, ICTCS 2012, Varese, Italy, September 19-21, 2012, Proceedings, 2012. 
 +
 +  * [Kob05] Naoki Kobayashi. Type-based information flow analysis for the pi-calculus. Acta Inf., 42(4-5):291–347, 2005.
  
   * [Kol08] Marija Kolundzija. Security Types for Sessions and Pipelines. In Roberto Bruni and Karsten Wolf, editors, Web Services and Formal Methods, 5th International Workshop, WS-FM 2008, Milan, Italy, September 4-5, 2008, Revised Selected Papers, volume 5387 of Lecture Notes in Computer Science, pages 175–190. Springer, 2008.    * [Kol08] Marija Kolundzija. Security Types for Sessions and Pipelines. In Roberto Bruni and Karsten Wolf, editors, Web Services and Formal Methods, 5th International Workshop, WS-FM 2008, Milan, Italy, September 4-5, 2008, Revised Selected Papers, volume 5387 of Lecture Notes in Computer Science, pages 175–190. Springer, 2008. 
 + 
 +  * [KP13] Dimitrios Kouzapas and Anna Philippou. A typing system for privacy. In Simon Gay, editor, 2nd International Workshop on Behavioural Types, BEAT 2, Madrid, Spain, September 23-24, 2013, Pre-proceedings, pages 51–60. University Complutense of Madrid, 2013.
  
   * [LPT07] Alessandro Lapadula, Rosario Pugliese, and Francesco Tiezzi. Regulating data exchange in service oriented applications. In Farhad Arbab and Marjan Sirjani, editors, International Symposium on Fundamentals of Software Engineering, International Symposium, FSEN 2007, Tehran, Iran, April 17-19, 2007, Proceedings, volume 4767 of Lecture Notes in Computer Science, pages 223–239. Springer, 2007.    * [LPT07] Alessandro Lapadula, Rosario Pugliese, and Francesco Tiezzi. Regulating data exchange in service oriented applications. In Farhad Arbab and Marjan Sirjani, editors, International Symposium on Fundamentals of Software Engineering, International Symposium, FSEN 2007, Tehran, Iran, April 17-19, 2007, Proceedings, volume 4767 of Lecture Notes in Computer Science, pages 223–239. Springer, 2007. 
Line 72: Line 94:
   * [PCT11] Frank Pfenning, Luís Caires, and Bernardo Toninho. Proof-Carrying Code in a Session-Typed Process Calculus. In Jean-Pierre Jouannaud and Zhong Shao, editors, Certified Programs and Proofs - First International Conference, CPP 2011, Kent-ing, Taiwan, December 7-9, 2011. Proceedings, volume 7086 of Lecture Notes in Computer Science, pages 21–36. Springer, 2011.    * [PCT11] Frank Pfenning, Luís Caires, and Bernardo Toninho. Proof-Carrying Code in a Session-Typed Process Calculus. In Jean-Pierre Jouannaud and Zhong Shao, editors, Certified Programs and Proofs - First International Conference, CPP 2011, Kent-ing, Taiwan, December 7-9, 2011. Proceedings, volume 7086 of Lecture Notes in Computer Science, pages 21–36. Springer, 2011. 
  
-(Authors in WG2 [BCD+09, DKSH11, HBT12, CCDCR10, CCDC11, BCCDC11, CCDC13, BCVV12, CDF+08, CDF+07, PCT11, CS13, DCGJP10, DCGPV08, Jak12, GJPDC12, AB12, AB10, CG13] and others [BCFG07, BCG05, Kol08, PCF09, LPT07])+  * [YHB07] Nobuko Yoshida, Kohei Honda, and Martin Berger. Linearity and bisimulation. J. Log. Algebr. Program., 72(2):207–238, 2007. 
 + 
 +(Authors in WG2 [BCD+09, DKSH11, HBT12, CCDCR10, CCDC11, BCCDC11, CCDC13, BCVV12, CDF+08, CDF+07, PCT11, CS13, DCGJP10, DCGPV08, Jak12, GJPDC12, AB12, AB10, CG13, HY05, HY07, YHB07, Cai08, BMV12, FV13, CD07, DCHS12] and others [BCFG07, BCG05, Kol08, PCF09, LPT07, Kob05, HR00, KP13, GJ03])
 
wg2-security.txt · Last modified: 2013/10/08 16:15 by hugo
 
Except where otherwise noted, content on this wiki is licensed under the following license:CC Attribution-Share Alike 3.0 Unported
Recent changes RSS feed Donate Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki