通信情報システム専攻 専門科目 並列分散システム論 (2013年度冬学期)

日時 火曜日3限(13:00〜14:30)
場所 総合研究7号館1階 情報2
オフィスアワー:火曜日 15:00〜18:00 (総合研究7号館224)
(その他の時間は要アポイントメント)

講義内容(シラバスより)

お知らせ

講義スケジュールと配布資料

回数date講義内容(予定)/配布資料
1 10/1
2 10/8 配布資料1 配布資料2
3 10/22 配布資料3
4 10/29 配布資料4
5 11/5 配布資料5
6 11/12 配布資料5(改訂版)
7 11/19 配布資料6
8 11/26
9 12/3 Hennessy and Riely. Resource Access Control in Systems of Mobile Agents. について
10 12/10 Cardell and Gordon. Mobile Ambients. について
11 12/17 Sangiorgi and Valente. A Distributed Abstract Machine for Safe Ambients. について
12 1/7 Abadi and Gordon. A calculus for cryptographic protocols: The Spi calculus. について
13 1/14 Kobayashi, Suenaga, and Wischik. Resource Usage Analysis for the pi-Calculus. について
14 1/21 Gordon and Jeffrey. Authenticity by typing for security protocols. について
15 1/28

参考図書・論文

  1. Robin Milner. Communicating and Mobile Systems: The π-Calculus. Cambridge University Press, 1999.

分散計算のモデル

  1. Matthew Hennessy and James Riely. Resource access control in systems of mobile agents (extended abstract). Electronic Notes in Theoretical Computer Science, 16(3), 1998.
  2. Matthew Hennessy and James Riely. Resource access control in systems of mobile agents. Information and Computation, 173:82-120, 2002.
  3. Luca Cardelli and Andrew D. Gordon. Mobile ambients. In Proc. of FoSSaCS, volume 1378 of Springer LNCS, pages 140-155, 1998.
  4. Luca Cardelli and Andrew D. Gordon. Mobile ambients. Theoretical Computer Science, 240(1):177-213, 2000.
  5. Davide Sangiorgi, Andrea Valente. A Distributed Abstract Machine for Safe Ambients. In Proc. of ICALP, volume 2076 of Springel LNCS, pages 408-420, 2001.
  6. Paola Giannini, Davide Sangiorgi, and Andrea Valente. Safe Ambients: Abstract Machine and Distributed Implementation. Science of Computer Programming, 59(3):209-249, 2006.
  7. Daniel Hirschkoff, Damien Pous, and Davide Sangiorgi. A Correct Abstract Machine for Safe Ambients. In. Proc. of COORDINATION, pages 17-32, 2005.
  8. Daniel Hirschkoff, Damien Pous, and Davide Sangiorgi. An Efficient Abstract Machine for Safe Ambients. Journal of Logic and Algebraic Programming, 71(2):114-149, 2007.

暗号プロトコル・セキュリティ

  1. Matín Abadi and Andrew D. Gordon. Reasoning about cryptographic protocols in the Spi calculus. In Proc. of CONCUR, volume 1243 of Springer LNCS, pages 59-73, 1997.
  2. Matín Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The Spi calculus. In Proc. of ACM Conference on Computer and Communications Security pages 36-47, 1997.
  3. AndrewD. Gordon and Alan Jeffrey. Authenticity by typing for security protocols. In Proc. of IEEE Computer Security Foundations Workshop, pages 145-159, 2001.

型システム

  1. Naoki Kobayashi, Kohei Suenaga, and Lucian Wischik. Resource Usage Analysis for the pi-Calculus. In Proc. of International Conference on Verification, Model Checking, and Abstract Interpretation, pages 298-312, 2006.

igarashi@kuis.kyoto-u.ac.jp
Last update on $Date:: 2013-07-30 12:13:49 +0900 $