Published: 24th August 2014
DOI: 10.4204/EPTCS.162
ISSN: 2075-2180

EPTCS 162

Proceedings Third Workshop on
Behavioural Types
Rome, Italy, 1st September 2014

Edited by: Marco Carbone

Preface
Invited Presentation: Towards a Computational Model for the Internet of Things
Vladimiro Sassone
Dynamic Role Authorization in Multiparty Conversations
Silvia Ghilezan, Svetlana Jakšić , Jovanka Pantović, Jorge A. Pérez and Hugo Torres Vieira
1
Self-Adaptation and Secure Information Flow in Multiparty Structured Communications: A Unified Perspective
Ilaria Castellani, Mariangiola Dezani-Ciancaglini and Jorge A. Pérez
9
Timed Runtime Monitoring for Multiparty Conversations
Rumyana Neykova, Laura Bocchi and Nobuko Yoshida
19
Recursive Session Types Revisited
Ornela Dardha
27
Compliance for reversible client/server interactions
Franco Barbanera, Mariangiola Dezani-Ciancaglini and Ugo de' Liguoro
35

Preface

This volume contains the proceedings of BEAT 2014, the third Workshop on Behavioural Types. The workshop took place in Rome, Italy, on the 1st of September 2014, as a satellite event of CONCUR 2014, the 25th International Conference on Concurrency Theory.

The aim of this workshop is to bring together researchers in all aspects of behavioural type theory and its applications, in order to share results, consolidate the community, and discover opportunities for new collaborations and future directions. Previous editions of BEAT were held as satellite workshops of POPL 2013 and SEFM 2013.

The workshop received 14 submissions, three of which were withdrawn prior to the submission deadline and one was a proposal for presentation of research that has already been published. The Program Committee, after a careful and thorough reviewing process, selected six submissions for presentation at the workshop, five of which are included in these proceedings. Each submission followed a standard reviewing process (three reviews, anonymous referees). One paper received an additional fourth review.

In addition to the contributed papers, the workshop featured an invited talk by Vladimiro Sassone, University of Southampton, UK. The title of the talk is Towards a Computational Model for the Internet of Things and its abstract appears in these proceedings. This invited talk was shared with the workshop EXPRESS/SOS 2014.

I would like to thank all the authors who submitted papers for consideration and the invited speaker, Vladimiro Sassone. I am extremely grateful to the members of the Program Committee and the thorough discussions during the selection process. A particular acknowledgement goes to Adrian Francalanza who played the role of co-chair, by managing those submissions for which the chair was in conflict with. The EasyChair system was used for supporting the review process.

29th of July, 2014 Marco Carbone

Program Committee


Towards a Computational Model for the Internet of Things

Vladimiro Sassone (University of Southampton)

We describe the foundations of a computational model of the Internet of Things (IoT), designed from scratch with the intention of developing a framework for the analysis of cyber security in the IoT.

The proposal is based on identifying the key components of a generic object as consisting of: a processing module; a sensing/actuation module; a communications module; and an energy module. The approach is mathematical in its reliance on formal definitions and its attempt to prove security properties conclusively. Our overall ambition is to build a universal model able to capture all the relevant aspects of the IoT in a simple, modular, flexible, computational framework. To the best of our knowledge, this would be the first such model for the IoT.

This talk reports our first steps towards these objectives, and tries to illustrate with selected examples the potentiality of the approach. We shall describe IoT entities and their basic functions; sensing and actuation in the IoT; communication; and cyber security.

Much more work is required to complete our overall research programme. Firstly, on the basis of the formal understanding of the IoT afforded by the present work, we need to formulate an comprehensive attacker model and, on the top of that, to develop a risk model for the generic IoT entity. This will allow us to deploy an hopefully realistic quantitative analysis taking into account specific risks associated with specific devices.