EPSRC Reference: |
GR/R33465/02 |
Title: |
Foundations for Safe Mobile Software: Processes, Types and Semantics |
Principal Investigator: |
Yoshida, Professor N |
Other Investigators: |
|
Researcher Co-Investigators: |
|
Project Partners: |
|
Department: |
Computing |
Organisation: |
Imperial College London |
Scheme: |
Standard Research (Pre-FEC) |
Starts: |
01 October 2002 |
Ends: |
31 December 2004 |
Value (£): |
30,770
|
EPSRC Research Topic Classifications: |
Fundamentals of Computing |
|
|
EPSRC Industrial Sector Classifications: |
Communications |
No relevance to Underpinning Sectors |
|
Related Grants: |
|
Panel History: |
|
Summary on Grant Application Form |
The recent explosion of activity on the Internet, the World Wide Web and Mobile Applications is calling for formal foundations of safe mobile software. In this world, software or code is transferred from one domain to another and upon receipt, a host initialises parameters and then execute it locally. Security, i.e., integrity of resources and privacy of data, is the key issue for the safe development of network and mobile applications in the presence of such dangerous program mobility. The aim of this project is to develop a theoretical foundation for access control of local resources for integrity and secrecy (information flow analysis) for privacy of data based on typed concurrent processes; more specifically, to apply the field of semantics of concurrent processes and type-based approaches to security by extending the new typing system for the higher-order pi-calculus recently put forward by myself and co-authors. In this typing system, code can be represented as interacting processes, which are assigned different types depending on their intended use. This is in contrast to previous work on typing processes where all processes are typed by a unique constant type, hence it is difficult to ensure host security by static type checking. Our fine-grained typing facilitates the management of access rights and provides host protection from potentially malicious behaviour. We will also apply the typed behavioural semantics of processes to reason about the safety of mobile code.
|
Key Findings |
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
|
Potential use in non-academic contexts |
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
|
Impacts |
Description |
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk |
Summary |
|
Date Materialised |
|
|
Sectors submitted by the Researcher |
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
|
Project URL: |
|
Further Information: |
|
Organisation Website: |
http://www.imperial.ac.uk |