메뉴 건너뛰기




Volumn 28, Issue 1, 2002, Pages 101-127

Security boundaries in mobile ambients

Author keywords

Mobile ambients; Security; Static analysis

Indexed keywords

COMPUTATION THEORY; INFORMATION THEORY; SECURITY OF DATA; INFORMATION ANALYSIS; MOBILE TELECOMMUNICATION SYSTEMS; SYSTEMS SCIENCE;

EID: 0036555708     PISSN: 00960551     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0096-0551(02)00009-7     Document Type: Article
Times cited : (21)

References (20)
  • 2
    • 0011837296 scopus 로고    scopus 로고
    • Information flow security in mobile ambients
    • Proceedings of International Workshop on Concurrency and Coordination (ConCoord '01), Amsterdam: Elsevier, July 6-8
    • Cortesi A., Focardi R. Information flow security in mobile ambients. In: Proceedings of International Workshop on Concurrency and Coordination (ConCoord '01), Electronic Notes on Theoretical Computer Science, ENTCS, vol. 54. Amsterdam: Elsevier, July 6-8, 2001.
    • (2001) Electronic Notes on Theoretical Computer Science, ENTCS , vol.54
    • Cortesi, A.1    Focardi, R.2
  • 3
    • 84947919695 scopus 로고    scopus 로고
    • Mobile ambients
    • Nivat M., editor. Proceedings of Foundations of Software Science and Computation Structures (FoSSaCS) Berlin, Germany, Springer, March
    • Cardelli L., Gordon A.D. Mobile ambients. In: Nivat M, editor. Proceedings of Foundations of Software Science and Computation Structures (FoSSaCS), Lecture Notes in Computer Science, vol. 1378, Berlin, Germany, Springer, March 1998, p. 140-55.
    • (1998) Lecture Notes in Computer Science , vol.1378 , pp. 140-155
    • Cardelli, L.1    Gordon, A.D.2
  • 4
    • 84937705299 scopus 로고    scopus 로고
    • Static analysis of processes for no read-up and no write-down
    • Proceedings of FoSSaCS '99. Berlin: Springer
    • Bodei C., Degano P., Nielson F., Nielson H.R. Static analysis of processes for No read-up and No write-down. In: Proceedings of FoSSaCS '99, Lecture Notes in Computer Science, No. 1578. Berlin: Springer, 1999. p. 120-34.
    • (1999) Lecture Notes in Computer Science , vol.1578 , pp. 120-134
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.R.4
  • 6
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • Focardi R., Gorrieri R. A classification of security properties for process algebras. Journal of Computer Security. 3(1):1995;5-33.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 7
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi R., Gorrieri R. The compositional security checker. a tool for the verification of information flow security properties IEEE Transactions on Software Engineering. 23(9):1997;550-571.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 8
    • 84974577536 scopus 로고    scopus 로고
    • Information flow vs. resource access in the asynchronous pi-calculus
    • Montanari U., Rolim J., Welzl E., editors. Proceedings of the International Colloquium on Automata Languages and Programming, Berlin, Geneva: Springer, August
    • Hennessy M., Riely J. Information flow vs. resource access in the asynchronous pi-calculus. In: Montanari U, Rolim J, Welzl E, editors. Proceedings of the International Colloquium on Automata Languages and Programming, Lecture Notes in Computer Science, vol. 1853. Berlin, Geneva: Springer, August 2000, p. 415-27.
    • (2000) Lecture Notes in Computer Science , vol.1853 , pp. 415-427
    • Hennessy, M.1    Riely, J.2
  • 10
    • 84978997669 scopus 로고    scopus 로고
    • Boxed ambients
    • Proceedings of the Fourth International Conference on Theoretical Aspects of Computer Science (TACS '01) Berlin: Springer
    • Bugliesi M., Castagna G., Crafa S. Boxed ambients. In: Proceedings of the Fourth International Conference on Theoretical Aspects of Computer Science (TACS '01), Lecture Notes in Computer Science, vol. 2215. Berlin: Springer, 2000. p. 38-63.
    • (2000) Lecture Notes in Computer Science , vol.2215 , pp. 38-63
    • Bugliesi, M.1    Castagna, G.2    Crafa, S.3
  • 12
    • 84957649493 scopus 로고    scopus 로고
    • Abstract interpretation of mobile ambients
    • A. Cortesi, & G. File'. Proceedings of Static Analysis Symposium (SAS '99) Berlin: Springer
    • Hansen R.R., Jensen J.G., Nielson F., Nielson H.R. Abstract interpretation of mobile ambients. Cortesi A., File' G. Proceedings of Static Analysis Symposium (SAS '99). Lecture Notes in Computer Science. No. 1694:1999;134-148 Springer, Berlin.
    • (1999) Lecture Notes in Computer Science , vol.1694 , pp. 134-148
    • Hansen, R.R.1    Jensen, J.G.2    Nielson, F.3    Nielson, H.R.4
  • 14
    • 84945976575 scopus 로고    scopus 로고
    • Control flow analysis for the π -calculus
    • Proceedings of CONCUR '98, Berlin: Springer
    • Bodei C., Degano P., Nielson F., Nielson H.R. Control flow analysis for the π -calculus. In: Proceedings of CONCUR '98, Lecture Notes in Computer Science, No. 1466. Berlin: Springer, 1998. p. 84-98.
    • (1998) Lecture Notes in Computer Science , vol.1466 , pp. 84-98
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.R.4
  • 15
    • 84879087677 scopus 로고    scopus 로고
    • Ambient groups and mobility types
    • Van Leeuwen J., Watanabe O., Hagiya M., Mosses P.D., Ito T., editors. Theoretical computer science: exploring new frontiers of theoretical informatics. Proceedings of the International IFIP Conference TCS 2000 (Sendai, Japan), New York, Berlin: IFIP, Springer, August
    • Cardelli L., Ghelli G., Gordon A.D. Ambient groups and mobility types. In: Van Leeuwen J., Watanabe O., Hagiya M., Mosses P.D., Ito T., editors. Theoretical computer science: exploring new frontiers of theoretical informatics. Proceedings of the International IFIP Conference TCS 2000 (Sendai, Japan), Lecture Notes in Computer Science, vol. 1872. New York, Berlin: IFIP, Springer, August 2000. p. 333-47.
    • (2000) Lecture Notes in Computer Science , vol.1872 , pp. 333-347
    • Cardelli, L.1    Ghelli, G.2    Gordon, A.D.3
  • 16
    • 84957803043 scopus 로고    scopus 로고
    • Security types for mobile safe ambients
    • He J, Sato M, editors. Proceedings of Advances in Computing Science - ASIAN '00 (Sixth Asian Computing Science Conference, Penang, Malaysia), Berlin, Springer, December
    • Dezani-Ciancaglini M., Salvo I. Security types for mobile safe ambients. In: He J., Sato M., editors. Proceedings of Advances in Computing Science - ASIAN '00 (Sixth Asian Computing Science Conference, Penang, Malaysia), Lecture Notes in Computer Science, vol. 1961, Berlin, Springer, December 2000, p. 215-36.
    • (2000) Lecture Notes in Computer Science , vol.1961 , pp. 215-236
    • Dezani-Ciancaglini, M.1    Salvo, I.2
  • 17
    • 84957807650 scopus 로고    scopus 로고
    • Safe ambients: Control flow analysis and security
    • He J., Sato M., editors. Proceedings of Advances in Computing Science - ASIAN '00 (Sixth Asian Computing Science Conference, Penang, Malaysia), Berlin, Springer, December
    • Degano P., Levi F., Bodei C. Safe ambients: control flow analysis and security. In: He J, Sato M, editors. Proceedings of Advances in Computing Science - ASIAN '00 (Sixth Asian Computing Science Conference, Penang, Malaysia), Lecture Notes in Computer Science, vol. 1961, Berlin, Springer, December 2000, p. 199-214.
    • (2000) Lecture Notes in Computer Science , vol.1961 , pp. 199-214
    • Degano, P.1    Levi, F.2    Bodei, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.