Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
In this paper, we present a mathematical model for the composition of software components, at a semantic modelling level. We describe a mathematical concept of a single software c...
Ensuring dependability and security of Peer-toPeer (P2P) systems is an intricate task due to the autonomous and volatile nature of peers and the decentralization that characterize...
Theofrastos Koulouris, George Spanoudakis, Theocha...
Calculi with explicit substitutions (ES) are widely used in different areas of computer science. Complex systems with ES were developed these last 15 years to capture the good comp...
We present an extension of the πI-calculus with formal sums of terms. The study of the properties of this sum reveals that its neutral element can be used to make assumptions abo...