Abstract
In this paper, we introduce the crypto-loc calculus, a calculus for modelling secure mobile computations that combine the concepts of locations, cryptography, and code mobility. All these concepts exist in mobile systems, for example, Java applets run within sandboxes or downloaded under an SSL connection. We use observational equivalence of processes as a powerful means of defining security properties, and characterize observational equivalence in terms of a labelled bisimilarity relation, which makes its proof much easier.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abadi, M.: Security Protocols and their Properties. In: Foundations of Secure Computation. NATO Science Series, pp. 39–60. IOS Press, Amsterdam (2000); Volume for the 20th International Summer School on Foundations of Secure Computation, held in Marktoberdorf, Germany (1999)
Abadi, M., Blanchet, B.: Computer-Assisted Verification of a Protocol for Certified Email. In: Cousot, R. (ed.) SAS 2003. LNCS, vol. 2694, pp. 316–335. Springer, Heidelberg (2003)
Abadi, M., Fournet, C.: Mobile Values, New Names, and Secure Communication. In: 28th ACM Symposium on Principles of Programming Languages (POPL 2001), pp. 104–115. ACM, New York (2001)
Abadi, M., Fournet, C., Gonthier, G.: Secure Implementation of Channel Abstractions. Information and Computation 174(1), 37–83 (2002)
Abadi, M., Glew, N., Horne, B., Pinkas, B.: Certified Email with a Light On-line Trusted Third Party: Design and Implementation. In: Proceedings of the Eleventh International World Wide Web Conference, pp. 387–395. ACM, New York (2002)
Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation 148(1), 1–70 (1999)
Bella, G., Longo, C., Paulson, L.C.: Verifying Second-Level Security Protocols. In: Basin, D., Wolff, B. (eds.) TPHOLs 2003. LNCS, vol. 2758, pp. 352–366. Springer, Heidelberg (2003) (to appear)
Bettini, L., Nicola, R.D.: Translating Strong Mobility into Weak Mobility. In: Picco, G.P. (ed.) MA 2001. LNCS, vol. 2240, pp. 182–197. Springer, Heidelberg (2001)
Bugliesi, M., Castagna, G.: Secure Safe Ambients. In: 28th ACM Symposium on Principles of Programming Languages (POPL 2001), pp. 222–235. ACM, New York (2001)
Bugliesi, M., Castagna, G., Crafa, S.: Boxed Ambients. In: Kobayashi, N., Pierce, B.C. (eds.) TACS 2001. LNCS, vol. 2215, pp. 38–63. Springer, Heidelberg (2001)
Bugliesi, M., Crafa, S., Prelić, A., Sassone, V.: Secrecy in Untrusted Networks. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol. 2719, pp. 969–983. Springer, Heidelberg (2003)
Cardelli, L., Gordon, A.D.: Mobile Ambients. In: Nivat, M. (ed.) FOSSACS 1998. LNCS, vol. 1378, pp. 140–155. Springer, Heidelberg (1998)
Fournet, C., Gonthier, G.: The Reflexive Chemical Abstract Machine and the Join-Calculus. In: 23rd ACM Symposium on Principles of Programming Languages (POPL 1996), January 1996, pp. 372–385 (1996)
Fournet, C., Gonthier, G.: A hierarchy of equivalences for asynchronous calculi. In: Larsen, K.G., Skyum, S., Winskel, G. (eds.) ICALP 1998. LNCS, vol. 1443, pp. 844–855. Springer, Heidelberg (1998)
Fournet, C., Gonthier, G., Lévy, J.-J., Maranget, L., Rémy, D.: A Calculus of Mobile Agents. In: Sassone, V., Montanari, U. (eds.) CONCUR 1996. LNCS, vol. 1119, pp. 406–421. Springer, Heidelberg (1996)
Levi, F., Sangiorgi, D.: Controlling Interference in Ambients. In: 27th ACM Symposium on Principles of Programming Languages (POPL 2000), pp. 352–364. ACM, New York (2000)
Riely, J., Hennessy, M.: A Typed Language for Distributed Mobile Processes. In: 25th ACM Symposium on Principles of Programming Languages (POPL 1998), pp. 378–390. ACM, New York (1998)
Sangiorgi, D.: Expressing Mobility in Process Algebras: First-Order and Higher- Order Paradigms. PhD thesis, University of Edinburgh (1992)
Sewell, P.: Global/Local Subtyping and Capability Inference for a Distributed π-calculus. In: Larsen, K.G., Skyum, S., Winskel, G. (eds.) ICALP 1998. LNCS, vol. 1443, pp. 695–706. Springer, Heidelberg (1998)
Vitek, J., Gastagna, G.: Seal: A Framework for Secure Mobile Computations. In: Bal, H.E., Cardelli, L., Belkhouche, B. (eds.) ICCL-WS 1998. LNCS, vol. 1686, pp. 47–77. Springer, Heidelberg (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Blanchet, B., Aziz, B. (2003). A Calculus for Secure Mobility. In: Saraswat, V.A. (eds) Advances in Computing Science – ASIAN 2003. Progamming Languages and Distributed Computation Programming Languages and Distributed Computation. ASIAN 2003. Lecture Notes in Computer Science, vol 2896. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40965-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-40965-6_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20632-3
Online ISBN: 978-3-540-40965-6
eBook Packages: Springer Book Archive