Self-applicable partial evaluation for the pi-calculus

Author(s):  
Marc Gengler ◽  
Matthieu Martel
1997 ◽  
Vol 32 (12) ◽  
pp. 36-46 ◽  
Author(s):  
Marc Gengler ◽  
Matthieu Martel

2014 ◽  
Vol 36 (6) ◽  
pp. 1261-1266
Author(s):  
Xiang-Ning LI ◽  
Ke-Gang HAO ◽  
Xiao-Qun GUO
Keyword(s):  

Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


1990 ◽  
Vol 19 (3) ◽  
pp. 24-29 ◽  
Author(s):  
Li Lei ◽  
G.-H. Moll ◽  
J. Kouloumdjian

Sign in / Sign up

Export Citation Format

Share Document