Secrecy of Signals by Typing in Signal Transduction

  • Min Zhang
  • Guoqiang Li
  • Yuxi Fu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4222)


We discuss secrecy of signals in signal transduction. As we have developed a basic concurrent language with interferencial coefficients, -calculus, to describe aberrance in biological models, a typing system for -calculus is proposed for achieving secrecy of signals in signal transduction. We show that this typing system guarantees that, if signal transduction typechecks, then it does not leak aberrance of signals.


Signal Transduction Typing System Process Algebra Reaction Rule Japan Advance Institute 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Milner, R., Parrow, J., Walker, D.: A Calculus of Mobile Processes, parts I and II. Information and Computation, 1–77 (1992)Google Scholar
  2. 2.
    Priami, C., Regev, A., Silverman, W., Shapiro, E.: Application of a stochastic name passing calculus to representation and simulation of molecular processes. Information Processing Letters 80, 25–31 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Regev, A.: Representation and simulation of molecular pathways in the stochastic pi calculus. In: Proceedings of the 2nd workshop on Computation of Biochemical Pathways and Genetic Networks (2001)Google Scholar
  4. 4.
    Regev, A., Silverman, W., Shapiro, E.: Representing biomolecular processes with computer process algebra: pi calculus programs of signal transduction pathways (2000),
  5. 5.
    Regev, A., Silverman, W., Shapiro, E.: Representation and simulation of biochemical processes using the pi calculus process algebra. In: Proceedings of the Pacific Symposium of Biocomputing, vol. 6, pp. 459–470 (2001)Google Scholar
  6. 6.
    Sangiorgi, D., Walker, D.: The pi calculus: a Theory of Mobile Process. Cambridge University Press, Cambridge (2001)Google Scholar
  7. 7.
    Abadi, M.: Secrecy by Typing in Security Protocals. In: Ito, T., Abadi, M. (eds.) TACS 1997. LNCS, vol. 1281, pp. 611–638. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  8. 8.
    Zhang, M., Li, G., Fu, Y., et al.: Representation of the Signal Transduction with Aberrance Using Ipi Calculus. In: Zhang, J., He, J.-H., Fu, Y. (eds.) CIS 2004. LNCS, vol. 3314, pp. 477–485. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Zhang, M., Li, G., Fu, Y., et al.: Typing Aberrance in Signal Transduction. In: Wang, L., Chen, K., Ong, Y.S. (eds.) ICNC 2005. LNCS, vol. 3612, pp. 668–677. Springer, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Min Zhang
    • 1
  • Guoqiang Li
    • 2
  • Yuxi Fu
    • 1
  1. 1.BASICS, Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina
  2. 2.Japan Advanced Institute of Science and TechnologyNomi, IshikawaJapan

Personalised recommendations