메뉴 건너뛰기




Volumn 78, Issue 8, 2009, Pages 665-689

Dynamic management of capabilities in a network aware coordination language

Author keywords

Capability based access control; Mobility control; Process distribution and mobility; Resource usage

Indexed keywords

ACCESS CONTROL MODELS; ACCESS CONTROL POLICIES; CAPABILITY-BASED ACCESS CONTROL; CONTROLLING PROCESS; COORDINATION LANGUAGE; DYNAMIC MANAGEMENT; DYNAMIC MODIFICATIONS; MOBILITY CONTROL; MODELING NETWORKS; PROCESS DISTRIBUTION AND MOBILITY; REALISTIC SCENARIO; RESOURCE USAGE; RUN-TIME ERRORS; STATIC AND DYNAMIC;

EID: 70349448576     PISSN: 15678326     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jlap.2008.12.001     Document Type: Article
Times cited : (17)

References (63)
  • 4
    • 33746364838 scopus 로고    scopus 로고
    • Cryptographically sound implementations for communicating processes
    • Bugliesi M., Preneel B., Sassone V., and Wegener I. (Eds), Springer
    • Adão P., and Fournet C. Cryptographically sound implementations for communicating processes. In: Bugliesi M., Preneel B., Sassone V., and Wegener I. (Eds). ICALP (2), Lecture Notes in Computer Sciences, vol. 4052 (2006), Springer 83-94
    • (2006) ICALP (2), Lecture Notes in Computer Sciences, vol. 4052 , pp. 83-94
    • Adão, P.1    Fournet, C.2
  • 11
    • 1342347429 scopus 로고    scopus 로고
    • Access control for mobile agents: the calculus of boxed ambients
    • Bugliesi M., Castagna G., and Crafa S. Access control for mobile agents: the calculus of boxed ambients. ACM Trans. Program. Lang. Syst. 26 1 (2004) 57-124
    • (2004) ACM Trans. Program. Lang. Syst. , vol.26 , Issue.1 , pp. 57-124
    • Bugliesi, M.1    Castagna, G.2    Crafa, S.3
  • 12
    • 34548278382 scopus 로고    scopus 로고
    • Secure implementations of typed channel abstractions
    • Hofmann M., and Felleisen M. (Eds), ACM
    • Bugliesi M., and Giunti M. Secure implementations of typed channel abstractions. In: Hofmann M., and Felleisen M. (Eds). POPL (2007), ACM 251-262
    • (2007) POPL , pp. 251-262
    • Bugliesi, M.1    Giunti, M.2
  • 14
    • 0001525319 scopus 로고    scopus 로고
    • L. Cardelli, A.D. Gordon, Mobile ambients, Theoret. Comput. Sci. 240(1) (2000) 177-213, an extended abstract in: Proceedings of FoSSaCS'98, Lecture Notes in Computer Science, 1378, Springer, 1998, pp. 140-155.
    • L. Cardelli, A.D. Gordon, Mobile ambients, Theoret. Comput. Sci. 240(1) (2000) 177-213, an extended abstract in: Proceedings of FoSSaCS'98, Lecture Notes in Computer Science, vol. 1378, Springer, 1998, pp. 140-155.
  • 16
    • 33749574802 scopus 로고    scopus 로고
    • Dynamic access control in a concurrent object calculus
    • Proceedings of CONCUR, Springer
    • Chaudhuri A. Dynamic access control in a concurrent object calculus. Proceedings of CONCUR. LNCS vol. 4137 (2006), Springer 263-278
    • (2006) LNCS , vol.4137 , pp. 263-278
    • Chaudhuri, A.1
  • 18
    • 4944253990 scopus 로고    scopus 로고
    • Owned policies for information security
    • IEEE Computer Society
    • Chen H., and Chong S. Owned policies for information security. Proceedings of CSFW (2004), IEEE Computer Society 126-138
    • (2004) Proceedings of CSFW , pp. 126-138
    • Chen, H.1    Chong, S.2
  • 26
    • 84957807650 scopus 로고    scopus 로고
    • Safe ambients: control flow analysis and security
    • ASIAN Computing Science Conference - ASIAN'00, Springer
    • Degano P., Levi F., and Bodei C. Safe ambients: control flow analysis and security. ASIAN Computing Science Conference - ASIAN'00. LNCS vol. 1961 (2000), Springer 199-214
    • (2000) LNCS , vol.1961 , pp. 199-214
    • Degano, P.1    Levi, F.2    Bodei, C.3
  • 28
    • 33748752036 scopus 로고    scopus 로고
    • Secure shared data-space coordination languages: a process algebraic surveys
    • Focardi R., Lucchi R., and Zavattaro G. Secure shared data-space coordination languages: a process algebraic surveys. Sci. Comput. Program. 63 1 (2006) 3-15
    • (2006) Sci. Comput. Program. , vol.63 , Issue.1 , pp. 3-15
    • Focardi, R.1    Lucchi, R.2    Zavattaro, G.3
  • 29
    • 84955565479 scopus 로고    scopus 로고
    • A calculus of mobile agents
    • Proceedings of 7th Int. Conf. on Concurrency Theory (CONCUR'96). Montanari U., and Sassone V. (Eds), Springer-Verlag
    • Fournet C., Gonthier G., Levy J.J., Maranget L., and Remy D. A calculus of mobile agents. In: Montanari U., and Sassone V. (Eds). Proceedings of 7th Int. Conf. on Concurrency Theory (CONCUR'96). LNCS vol. 1119 (1996), Springer-Verlag 406-421
    • (1996) LNCS , vol.1119 , pp. 406-421
    • Fournet, C.1    Gonthier, G.2    Levy, J.J.3    Maranget, L.4    Remy, D.5
  • 32
    • 84976747936 scopus 로고
    • Multiple tuple spaces in Linda
    • J.G. Goos Ed, Proceedings, PARLE'89
    • D. Gelernter, Multiple tuple spaces in Linda, in: J.G. Goos (Ed.), Proceedings, PARLE'89, LNCS, vol. 365, 1989, pp. 20-27.
    • (1989) LNCS , vol.365 , pp. 20-27
    • Gelernter, D.1
  • 34
    • 35048840264 scopus 로고    scopus 로고
    • Enforcing security policies via types
    • Proceedings of Security in Pervasive Computing (SPC'03), Springer-Verlag
    • Gorla D., and Pugliese R. Enforcing security policies via types. Proceedings of Security in Pervasive Computing (SPC'03). LNCS vol. 2802 (2003), Springer-Verlag 88-103
    • (2003) LNCS , vol.2802 , pp. 88-103
    • Gorla, D.1    Pugliese, R.2
  • 35
    • 35248866884 scopus 로고    scopus 로고
    • Resource access and mobility control with dynamic privileges acquisition
    • Proceedings of ICALP'03, Springer-Verlag
    • Gorla D., and Pugliese R. Resource access and mobility control with dynamic privileges acquisition. Proceedings of ICALP'03. LNCS vol. 2719 (2003), Springer-Verlag 119-132
    • (2003) LNCS , vol.2719 , pp. 119-132
    • Gorla, D.1    Pugliese, R.2
  • 36
    • 33748748928 scopus 로고    scopus 로고
    • Supporting secure coordination in spaces
    • Gorrieri R., Lucchi R., and Zavattaro G. Supporting secure coordination in spaces. Fundam. Inf. 73 4 (2006) 479-506
    • (2006) Fundam. Inf. , vol.73 , Issue.4 , pp. 479-506
    • Gorrieri, R.1    Lucchi, R.2    Zavattaro, G.3
  • 37
    • 70349440017 scopus 로고    scopus 로고
    • Non-functional capability-based access control in the java environment
    • 8th Int. Conf. on Object-Oriented Information Systems, Springer
    • Hagimont D., and Palma N.D. Non-functional capability-based access control in the java environment. 8th Int. Conf. on Object-Oriented Information Systems. LNCS vol. 2425 (2002), Springer 323-335
    • (2002) LNCS , vol.2425 , pp. 323-335
    • Hagimont, D.1    Palma, N.D.2
  • 40
    • 0038893943 scopus 로고    scopus 로고
    • Information flow vs. resource access in the asynchronous pi-calculus
    • Hennessy M., and Riely J. Information flow vs. resource access in the asynchronous pi-calculus. ACM Trans. Program. Lang. Syst. 24 5 (2002) 566-591
    • (2002) ACM Trans. Program. Lang. Syst. , vol.24 , Issue.5 , pp. 566-591
    • Hennessy, M.1    Riely, J.2
  • 41
    • 0037170503 scopus 로고    scopus 로고
    • Resource access control in systems of mobile agents
    • Hennessy M., and Riely J. Resource access control in systems of mobile agents. Inform. Comput. 173 (2002) 82-120
    • (2002) Inform. Comput. , vol.173 , pp. 82-120
    • Hennessy, M.1    Riely, J.2
  • 42
    • 24644473737 scopus 로고    scopus 로고
    • Foundations of web transactions
    • Proceedings of FoSSaCS'05, Springer
    • Laneve C., and Zavattaro G. Foundations of web transactions. Proceedings of FoSSaCS'05. LNCS vol. 3441 (2005), Springer 282-298
    • (2005) LNCS , vol.3441 , pp. 282-298
    • Laneve, C.1    Zavattaro, G.2
  • 44
    • 33745389061 scopus 로고    scopus 로고
    • A bisimulation-based semantic theory of safe ambients
    • Merro M., and Hennessy M. A bisimulation-based semantic theory of safe ambients. ACM Trans. Program. Lang. Syst. 28 2 (2006) 290-330
    • (2006) ACM Trans. Program. Lang. Syst. , vol.28 , Issue.2 , pp. 290-330
    • Merro, M.1    Hennessy, M.2
  • 45
    • 33646166700 scopus 로고    scopus 로고
    • Capability myths demolished
    • Technical Report SRL2003-02, Systems Research Laboratory
    • M. Miller, K. Yee, J. Shapiro, Capability myths demolished, Technical Report SRL2003-02, Systems Research Laboratory, 2003.
    • (2003)
    • Miller, M.1    Yee, K.2    Shapiro, J.3
  • 46
  • 48
    • 18444411911 scopus 로고    scopus 로고
    • Shape analysis for mobile ambients
    • Nielson H.R., and Nielson F. Shape analysis for mobile ambients. Nord. J. Comput. 8 2 (2001) 233-275
    • (2001) Nord. J. Comput. , vol.8 , Issue.2 , pp. 233-275
    • Nielson, H.R.1    Nielson, F.2
  • 49
    • 0041593714 scopus 로고    scopus 로고
    • Coordination for internet application development
    • Special Issue on Coordination Mechanisms and Patterns for Web Agents.
    • Omicini A., and Zambonelli F. Coordination for internet application development. Autonom. Agents Multi-Agent Syst. 2 3 (1999) 251-269 Special Issue on Coordination Mechanisms and Patterns for Web Agents.
    • (1999) Autonom. Agents Multi-Agent Syst. , vol.2 , Issue.3 , pp. 251-269
    • Omicini, A.1    Zambonelli, F.2
  • 51
    • 1942504253 scopus 로고    scopus 로고
    • Trust and partial typing in open systems of mobile agents
    • Riely J., and Hennessy M. Trust and partial typing in open systems of mobile agents. J. Autom. Reason. 31 3-4 (2003) 335-370
    • (2003) J. Autom. Reason. , vol.31 , Issue.3-4 , pp. 335-370
    • Riely, J.1    Hennessy, M.2
  • 52
    • 0000361680 scopus 로고    scopus 로고
    • WCL: a web co-ordination language
    • Rowstron A. WCL: a web co-ordination language. World Wide Web J. 1 3 (1998) 167-179
    • (1998) World Wide Web J. , vol.1 , Issue.3 , pp. 167-179
    • Rowstron, A.1
  • 55
    • 35048880192 scopus 로고    scopus 로고
    • Dynamic dependency monitoring to secure information flow
    • IEEE Computer Society
    • Shroff P., Smith S.F., and Thober M. Dynamic dependency monitoring to secure information flow. Proceedings of CSF (2007), IEEE Computer Society 203-217
    • (2007) Proceedings of CSF , pp. 203-217
    • Shroff, P.1    Smith, S.F.2    Thober, M.3
  • 57
    • 33947711323 scopus 로고    scopus 로고
    • Managing policy updates in security-typed languages
    • IEEE Computer Society
    • Swamy N., Hicks M., Tse S., and Zdancewic S. Managing policy updates in security-typed languages. Proceedings of CSFW (2006), IEEE Computer Society 202-216
    • (2006) Proceedings of CSFW , pp. 202-216
    • Swamy, N.1    Hicks, M.2    Tse, S.3    Zdancewic, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.