AbstractA multilevel security policy is considered in the scenario of mobile systems, and modeled within “pure” Mobile Ambients calculus, in which no communication channels are present and the only possible actions are represented by the moves performed by mobile processes. The information flow property of interest is defined in terms of the possibility for a confidential ambient/data to move outside a security boundary. Then, a very simple syntactic property is given that is sufficient to imply the absence of unwanted information flows
AbstractIn this paper, we present a refinement of a Control Flow Analysis aimed at studying informat...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
AbstractA multilevel security policy is considered in the scenario of mobile systems, and modeled wi...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
A new notion of security boundary is introduced to model multilevel security policies in the scenari...
AbstractA variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multil...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
AbstractA variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supportin...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow...
AbstractIn this paper, we present a refinement of a Control Flow Analysis aimed at studying informat...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
AbstractA multilevel security policy is considered in the scenario of mobile systems, and modeled wi...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
A new notion of security boundary is introduced to model multilevel security policies in the scenari...
AbstractA variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multil...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
AbstractA variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supportin...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow...
AbstractIn this paper, we present a refinement of a Control Flow Analysis aimed at studying informat...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in...