首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   0篇
综合类   2篇
  2007年   2篇
排序方式: 共有2条查询结果,搜索用时 15 毫秒
1
1.
Security is an essential aspect for mobile systems. Usually, mobile system modeling and its security policies specification are realized in different techniques. So when constructed a mobile system using formal methods it is difficult to verify if the system comply with any given security policies. A method was introduced to express security automata which specifying enforceable security policies as processes in an extended π-calculus. In this extended π-calculus, an exception termination process was introduced, called bad. Any input which violating a security automaton will correspond to a step of transformation of the process that specifying the security automaton to exception termination process. Our method shows that any security automata which specifying enforceable security policies would decide a process in the extended π-calculus.  相似文献   
2.
An extended π calculus was introduced to deal with secure movement and intercommunication between agents. The system extends Nomadic-π with objective migration primitive and confined region which serves as annotation labels of agents and channels. The confined region labels were used to uniquely identify the constraints on the migration and communication of agents, with the labels, the agents could be confined in a secure subsystem and the inter-agent communication could be confined between agents located on trusted sites during computation. The operational semantics for the calculus was given out, and a type system which enforces security properties called confined migration and confined communication was developed.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号