2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS) 2015
DOI: 10.1109/iceccs.2015.33
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Session Logic for Communication Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(16 citation statements)
references
References 26 publications
0
15
1
Order By: Relevance
“…end where is free, which means the value of must be known at the point the protocol is created. While the previous examples could also have been type-checked and verified using the formalisms of Bocchi et al [2010] and Craciun et al [2015] the following stateful example cannot:…”
Section: Dependent Separation Protocolsmentioning
confidence: 99%
See 3 more Smart Citations
“…end where is free, which means the value of must be known at the point the protocol is created. While the previous examples could also have been type-checked and verified using the formalisms of Bocchi et al [2010] and Craciun et al [2015] the following stateful example cannot:…”
Section: Dependent Separation Protocolsmentioning
confidence: 99%
“…The type system by Bocchi et al [2010] cannot verify this program because it does not support mutable state, while Actris can verify the program because it is a separation logic. The logic by Craciun et al [2015] cannot verify this program because it does not support dependent protocols. Dependent protocols are crucial hereÐthey make it possible to delay picking the location ℓ used in the protocol until the send operation is performed.…”
Section: Dependent Separation Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…The refined protocol is then automatically projected onto a per party specification, followed by a per channel endpoint basis. Using such a modular approach where we provide a specification for each channel endpoint adds natural support for delegation, where a channel (as well as its specification) could be delegated to a third party in the style of binary session logic [14]. These communication specifications are made available in the program abstract state using a combination of ghost assertions and release lemmas (detailed in the subsequent).…”
Section: Verification Of C-like Programsmentioning
confidence: 99%