2017
DOI: 10.1145/3127586
|View full text |Cite
|
Sign up to set email alerts
|

The Applied Pi Calculus

Abstract: We study the interaction of the programming construct "new," which generates statically scoped names, with communication via messages on channels. This interaction is crucial in security protocols, which are the main motivating examples for our work; it also appears in other programming-language contexts. We define the applied pi calculus, a simple, general extension of the pi calculus in which values can be formed from names via the application of built-in functions, subject to equations, and be sent as messa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
39
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 95 publications
(39 citation statements)
references
References 125 publications
0
39
0
Order By: Relevance
“…We consider a "low-level" version of the applied pi-calculus [1] in which composite terms are allowed but only the transmission of simple data is possible: Only names n, constants represented by functions f 0 with arity 0 and functions that evaluate to values of base types can be transmitted. We use the notation M to represent the sequence M 1 , .…”
Section: Applied Pi-calculusmentioning
confidence: 99%
See 3 more Smart Citations
“…We consider a "low-level" version of the applied pi-calculus [1] in which composite terms are allowed but only the transmission of simple data is possible: Only names n, constants represented by functions f 0 with arity 0 and functions that evaluate to values of base types can be transmitted. We use the notation M to represent the sequence M 1 , .…”
Section: Applied Pi-calculusmentioning
confidence: 99%
“…We always assume that our processes are specified relative to a family of parameterized agent definitions that are on the form N( x) def = A and that every agent variable N occurring in a process has a corresponding definition. The formation rules for processes P and extended processes A can be seen below in (1). Note that we distinguish between variables ranged over by x, y .…”
Section: Applied Pi-calculusmentioning
confidence: 99%
See 2 more Smart Citations
“…The notion of Non-Interference for deterministic systems has been introduced in [17] and it has been extended to non-deterministic systems. Non-Interference has been then studied in different settings such as programming languages [16,30,31], trace models [22,25], cryptographic protocols [1,6,13], process calculi [7,8,12,19,29], probabilistic models [2,10], timed models [14,18], and stochastic models [2].…”
Section: Introductionmentioning
confidence: 99%