Abstract
In this paper we consider service oriented architectures where many components interact with one another using a wireless network. We are interested in questions like: ldr Can I be sure that I do not get unsolicited information from some service? - unless I give my permission? ldr Can I be sure that information I send to some service never is leaked to another service? - unless I give my permission? We shall develop a static program analysis for the pi- calculus and show how it can be used to give privacy guarantees like the ones requested above. The analysis records the explicit information flow of the system and keeps track of, not only the potential configurations of the system, but also the order in which they may be encountered.
Original language | English |
---|---|
Title of host publication | Proceedings of Computer Security Foundations Symposium, CFS 2007 |
Publisher | IEEE Computer Society Press |
Publication date | 2007 |
ISBN (Print) | 0-7695-2819-8 |
DOIs | |
Publication status | Published - 2007 |
Event | 20th IEEE Computer Security Foundations Symposium - Venice, Italy Duration: 6 Jul 2007 → 8 Jul 2007 |
Conference
Conference | 20th IEEE Computer Security Foundations Symposium |
---|---|
Country/Territory | Italy |
City | Venice |
Period | 06/07/2007 → 08/07/2007 |