Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2896))

Included in the following conference series:

Abstract

In this paper, we introduce the crypto-loc calculus, a calculus for modelling secure mobile computations that combine the concepts of locations, cryptography, and code mobility. All these concepts exist in mobile systems, for example, Java applets run within sandboxes or downloaded under an SSL connection. We use observational equivalence of processes as a powerful means of defining security properties, and characterize observational equivalence in terms of a labelled bisimilarity relation, which makes its proof much easier.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M.: Security Protocols and their Properties. In: Foundations of Secure Computation. NATO Science Series, pp. 39–60. IOS Press, Amsterdam (2000); Volume for the 20th International Summer School on Foundations of Secure Computation, held in Marktoberdorf, Germany (1999)

    Google Scholar 

  2. Abadi, M., Blanchet, B.: Computer-Assisted Verification of a Protocol for Certified Email. In: Cousot, R. (ed.) SAS 2003. LNCS, vol. 2694, pp. 316–335. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Abadi, M., Fournet, C.: Mobile Values, New Names, and Secure Communication. In: 28th ACM Symposium on Principles of Programming Languages (POPL 2001), pp. 104–115. ACM, New York (2001)

    Chapter  Google Scholar 

  4. Abadi, M., Fournet, C., Gonthier, G.: Secure Implementation of Channel Abstractions. Information and Computation 174(1), 37–83 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  5. Abadi, M., Glew, N., Horne, B., Pinkas, B.: Certified Email with a Light On-line Trusted Third Party: Design and Implementation. In: Proceedings of the Eleventh International World Wide Web Conference, pp. 387–395. ACM, New York (2002)

    Chapter  Google Scholar 

  6. Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation 148(1), 1–70 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  7. Bella, G., Longo, C., Paulson, L.C.: Verifying Second-Level Security Protocols. In: Basin, D., Wolff, B. (eds.) TPHOLs 2003. LNCS, vol. 2758, pp. 352–366. Springer, Heidelberg (2003) (to appear)

    Chapter  Google Scholar 

  8. Bettini, L., Nicola, R.D.: Translating Strong Mobility into Weak Mobility. In: Picco, G.P. (ed.) MA 2001. LNCS, vol. 2240, pp. 182–197. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Bugliesi, M., Castagna, G.: Secure Safe Ambients. In: 28th ACM Symposium on Principles of Programming Languages (POPL 2001), pp. 222–235. ACM, New York (2001)

    Chapter  Google Scholar 

  10. Bugliesi, M., Castagna, G., Crafa, S.: Boxed Ambients. In: Kobayashi, N., Pierce, B.C. (eds.) TACS 2001. LNCS, vol. 2215, pp. 38–63. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  11. Bugliesi, M., Crafa, S., Prelić, A., Sassone, V.: Secrecy in Untrusted Networks. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol. 2719, pp. 969–983. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Cardelli, L., Gordon, A.D.: Mobile Ambients. In: Nivat, M. (ed.) FOSSACS 1998. LNCS, vol. 1378, pp. 140–155. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  13. Fournet, C., Gonthier, G.: The Reflexive Chemical Abstract Machine and the Join-Calculus. In: 23rd ACM Symposium on Principles of Programming Languages (POPL 1996), January 1996, pp. 372–385 (1996)

    Google Scholar 

  14. Fournet, C., Gonthier, G.: A hierarchy of equivalences for asynchronous calculi. In: Larsen, K.G., Skyum, S., Winskel, G. (eds.) ICALP 1998. LNCS, vol. 1443, pp. 844–855. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  15. Fournet, C., Gonthier, G., Lévy, J.-J., Maranget, L., Rémy, D.: A Calculus of Mobile Agents. In: Sassone, V., Montanari, U. (eds.) CONCUR 1996. LNCS, vol. 1119, pp. 406–421. Springer, Heidelberg (1996)

    Google Scholar 

  16. Levi, F., Sangiorgi, D.: Controlling Interference in Ambients. In: 27th ACM Symposium on Principles of Programming Languages (POPL 2000), pp. 352–364. ACM, New York (2000)

    Chapter  Google Scholar 

  17. Riely, J., Hennessy, M.: A Typed Language for Distributed Mobile Processes. In: 25th ACM Symposium on Principles of Programming Languages (POPL 1998), pp. 378–390. ACM, New York (1998)

    Chapter  Google Scholar 

  18. Sangiorgi, D.: Expressing Mobility in Process Algebras: First-Order and Higher- Order Paradigms. PhD thesis, University of Edinburgh (1992)

    Google Scholar 

  19. Sewell, P.: Global/Local Subtyping and Capability Inference for a Distributed π-calculus. In: Larsen, K.G., Skyum, S., Winskel, G. (eds.) ICALP 1998. LNCS, vol. 1443, pp. 695–706. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  20. Vitek, J., Gastagna, G.: Seal: A Framework for Secure Mobile Computations. In: Bal, H.E., Cardelli, L., Belkhouche, B. (eds.) ICCL-WS 1998. LNCS, vol. 1686, pp. 47–77. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Blanchet, B., Aziz, B. (2003). A Calculus for Secure Mobility. In: Saraswat, V.A. (eds) Advances in Computing Science – ASIAN 2003. Progamming Languages and Distributed Computation Programming Languages and Distributed Computation. ASIAN 2003. Lecture Notes in Computer Science, vol 2896. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40965-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-40965-6_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20632-3

  • Online ISBN: 978-3-540-40965-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics