Confidentiality analysis of mobile systems

17Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We propose an abstract interpretation-based analysis for automatically detecting all potential interactions between the agents of a part of a mobile system, without much knowledge about the rest of it. We restrict our study to mobile systems written in the η-calculus, and introduce a non-standard semantics which restores the link between channels and the processes that have created them. This semantics also allows to describe the interaction between a system and an unknown context. It is, to the best of our knowledge, the first analysis for this problem. We then abstract this non-standard semantics into an approximated one so as to automatically obtain a non-uniform description of the communication topology of mobile systems which compute in hostile contexts. © Springer-Verlag Berlin Heidelberg 2000.

Cite

CITATION STYLE

APA

Feret, J. (2000). Confidentiality analysis of mobile systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1824 LNCS, pp. 135–154). Springer Verlag. https://doi.org/10.1007/978-3-540-45099-3_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free