References

  1. Luca Cardelli, Giorgio Ghelli & Andrew D. Gordon (2005): Secrecy and group creation. Inf. Comput. 196(2), pp. 127–155, doi:10.1016/j.ic.2004.08.003.
  2. Silvia Crafa & Sabina Rossi (2007): Controlling information release in the pi-calculus. Inf. Comput. 205(8), pp. 1235–1273, doi:10.1016/j.ic.2007.01.001.
  3. Cédric Fournet & Georges Gonthier (1996): The Reflexive CHAM and the Join-Calculus. In: Hans-Juergen Boehm & Guy L. Steele Jr.: Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Papers Presented at the Symposium, St. Petersburg Beach, Florida, USA, January 21-24, 1996. ACM Press, pp. 372–385, doi:10.1145/237721.237805.
  4. Simon J. Gay & Malcolm Hole (2005): Subtyping for session types in the pi calculus. Acta Inf. 42(2-3), pp. 191–225, doi:10.1007/s00236-005-0177-z.
  5. Marco Giunti, Catuscia Palamidessi & Frank D. Valencia (2012): Hide and New in the Pi-Calculus. In: Bas Luttik & Michel A. Reniers: Proceedings Combined 19th International Workshop on Expressiveness in Concurrency and 9th Workshop on Structured Operational Semantics, EXPRESS/SOS 2012, Newcastle upon Tyne, UK, September 3, 2012., EPTCS 89, pp. 65–79, doi:10.4204/EPTCS.89.6.
  6. Daniele Gorla (2010): Towards a unified approach to encodability and separation results for process calculi. Inf. Comput. 208(9), pp. 1031–1053, doi:10.1016/j.ic.2010.05.002.
  7. Matthew Hennessy (2005): The security pi-calculus and non-interference. J. Log. Algebr. Program. 63(1), pp. 3–34, doi:10.1016/j.jlap.2004.01.003.
  8. Kohei Honda & Mario Tokoro (1991): An Object Calculus for Asynchronous Communication. In: Pierre America: ECOOP'91 European Conference on Object-Oriented Programming, Geneva, Switzerland, July 15-19, 1991, Proceedings, Lecture Notes in Computer Science 512. Springer, pp. 133–147, doi:10.1007/BFb0057019.
  9. Kohei Honda, Vasco Thudichum Vasconcelos & Makoto Kubo (1998): Language Primitives and Type Discipline for Structured Communication-Based Programming. In: Chris Hankin: Programming Languages and Systems - ESOP'98, 7th European Symposium on Programming, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'98, Lisbon, Portugal, March 28 - April 4, 1998, Proceedings, Lecture Notes in Computer Science 1381. Springer, pp. 122–138, doi:10.1007/BFb0053567.
  10. Dimitrios Kouzapas & Anna Philippou (2017): Privacy by typing in the π-calculus. Logical Methods in Computer Science 13(4), pp. 1–42, doi:10.23638/LMCS-13(4:27)2017.
  11. Massimo Merro & Davide Sangiorgi (2004): On asynchrony in name-passing calculi. Mathematical Structures in Computer Science 14(5), pp. 715–767, doi:10.1017/S0960129504004323.
  12. Robin Milner (1980): A Calculus of Communicating Systems. Lecture Notes in Computer Science 92. Springer, doi:10.1007/3-540-10235-3.
  13. Robin Milner (1992): The Polyadic Pi-calculus (Abstract). In: Rance Cleaveland: CONCUR '92, Third International Conference on Concurrency Theory, Stony Brook, NY, USA, August 24-27, 1992, Proceedings, Lecture Notes in Computer Science 630. Springer, pp. 1, doi:10.1007/BFb0084778.
  14. Davide Sangiorgi (1996): pi-Calculus, Internal Mobility, and Agent-Passing Calculi. Theor. Comput. Sci. 167(1&2), pp. 235–274, doi:10.1016/0304-3975(96)00075-8.
  15. Davide Sangiorgi & David Walker (2001): The Pi-Calculus - a theory of mobile processes. Cambridge University Press.
  16. Daniel J Solove (2005): A taxonomy of privacy. U. Pa. L. Rev. 154, pp. 477, doi:10.2307/40041279.
  17. Michael Carl Tschantz & Jeannette M. Wing (2009): Formal Methods for Privacy. In: Ana Cavalcanti & Dennis Dams: FM 2009: Formal Methods, Second World Congress, Eindhoven, The Netherlands, November 2-6, 2009. Proceedings, Lecture Notes in Computer Science 5850. Springer, pp. 1–15, doi:10.1007/978-3-642-05089-3_1.
  18. Vasco T. Vasconcelos (2012): Fundamentals of session types. Inf. Comput. 217, pp. 52–70, doi:10.1016/j.ic.2012.05.002.
  19. José-Luis Vivas & Nobuko Yoshida (2002): Dynamic Channel Screening in the Higher Order pi-Calculus. Electr. Notes Theor. Comput. Sci. 66(3), pp. 170–184, doi:10.1016/S1571-0661(04)80421-3.
  20. Alan F Westin (2003): Social and political dimensions of privacy. Journal of social issues 59(2), pp. 431–453, doi:10.1111/1540-4560.00072.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org