A Step Towards Checking Security in IoT

Conference object, Article, Preprint English OPEN
Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio;
  • Publisher: Open Publishing Association
  • Journal: Electronic Proceedings in Theoretical Computer Science (issn: 2075-2180)
  • Publisher copyright policies & self-archiving
  • Related identifiers: doi: 10.4204/EPTCS.223.9
  • Subject: Computer Science - Programming Languages | Mathematics | Electronic computers. Computer science | D.2.4 | F.3.2 | IoT, Process Algebras, Control Flow Analysis, Security properties | QA1-939 | QA75.5-76.95 | Computer Science - Cryptography and Security

The Internet of Things (IoT) is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigati... View more
  • References (21)
    21 references, page 1 of 3

    [1] M. Abadi (1999): Secrecy by Typing In Security protocols. Journal of the ACM 5(46), pp. 18-36, doi:10.1145/324133.324266.

    [2] D.E. Bell & L.J. LaPadula (1976): Secure Computer Systems: Unified Exposition and Multics Interpretation. Technical Report ESD-TR-75-306, Mitre C.

    [3] C. Bodei (2000): Security Issues in Process Calculi. Ph.D. thesis, Dipartimento di Informatica, Universita` di Pisa. TD-2/00, March, 2000.

    [4] C. Bodei, L. Brodo & R. Focardi (2015): Static Evidences for Attack Reconstruction. In: Programming Languages with Applications to Biology and Security, LNCS 9465, Springer, pp. 162-182, doi:10.1007/978- 3-319-25527-9.

    [5] C. Bodei, M. Buchholtz, P. Degano, F. Nielson & H. Riis Nielson (2005): Static validation of security protocols. Journal of Computer Security 13(3), pp. 347-390, doi:10.3233/JCS-2005-13302.

    [6] C. Bodei, P. Degano, G-L. Ferrari & L. Galletta (2016): Where do your IoT ingredients come from? In: Procs. of Coordination 2016, LNCS 9686, Springer, pp. 35-50, doi:10.1007/978-3-319-39519-7.

    [7] C. Bodei, P. Degano, F. Nielson & H. Riis Nielson (2001): Static analysis for the p-calculus with applications to security. Information and Computation 168, pp. 68-92, doi:10.1006/inco.2000.3020.

    [8] M. Buchholtz, H. Riis Nielson & Flemming F. Nielson (2004): A calculus for control flow analysis of security protocols. International Journal of Information Security 2(3), pp. 145-167, doi:10.1007/s10207-004-0036-x.

    [9] N. Carriero & D. Gelernter (2001): A Computational Model of Everything. Commun. ACM 44(11), pp. 77-81, doi:10.1145/384150.384165.

    [10] D.E Denning (1982): Cryptography and Data Security. Addison-Wesley, Reading Mass.

  • Metrics