We give details of a formal analysis of the MUTE system for anonymous file-sharing. We build pi-calculus models of a node that is innocent of sharing files, a node that is guilty of file-sharing and of the network environment. We then test to see if an attacker can distinguish between …
read moreOther presentations
Q Automata: Modelling the Resource Usage of Concurrent Components
This is mainly a practice talk for a presentation I will give at the FOCLASA workshop the week after next, with the follow abstract:
We introduce Q-automata to model quality aspects of component-based software. We propose Q-algebras as a general framework that allows us to combine and choose between quality …
read moreType-based access control: for distributed systems, for components and under attack
This talk will cover some of my previous work that may now be applicable to the Trust4all project. I will start with an overview of some type-based information flow work, including the "decentralised label model" of Myers and Liskov and the JIF programming language. I will then show how local …
read more
Page 1 / 1