Applying pi-Calculus to Practice: An Example of a Unified Security Mechanism
DOI:
https://doi.org/10.7146/brics.v10i39.21807Abstract
The Pi-calculus has been developed to reason about behavioural equivalence. Different notions of equivalence are defined in terms of process interactions, as well as the context of processes. There are various extensions of the Pi-calculus, such as the SPI calculus, which has primitives to facilitate security protocol design.Another area of computer security is access control research, which includes problems of access control models, policies and access control mechanism. The design of a unified framework for access control requires that all policies are supported and different access control models are instantiated correctly.
In this paper we will utilise the Pi calculus to reason about access control policies and mechanism. An equivalence of different policy implementations, as well as access control mechanism will be shown. Finally some experiences regarding the use of Pi-calculus are presented.
Downloads
Published
2003-11-06
How to Cite
Abendroth, J. (2003). Applying pi-Calculus to Practice: An Example of a Unified Security Mechanism. BRICS Report Series, 10(39). https://doi.org/10.7146/brics.v10i39.21807
Issue
Section
Articles
License
Articles published in DAIMI PB are licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.