In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow security in the the calculus of Mobile Ambients. The improvements are achieved by making the analysis be flow-sensitive: the analysis is able to keep track of temporal dependencies of capabilities application when computing a safe approximation of the run-time topology of Mobile Ambient processes
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
AbstractA variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multil...
AbstractA multilevel security policy is considered in the scenario of mobile systems, and modeled wi...
In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow...
AbstractIn this paper, we present a refinement of a Control Flow Analysis aimed at studying informat...
We present a Control Flow Analysis (CFA) for the Safe Ambients, a variant of the calculus of Mobile ...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
AbstractA variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supportin...
A new notion of security boundary is introduced to model multilevel security policies in the scenari...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
AbstractA variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multil...
AbstractA multilevel security policy is considered in the scenario of mobile systems, and modeled wi...
In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow...
AbstractIn this paper, we present a refinement of a Control Flow Analysis aimed at studying informat...
We present a Control Flow Analysis (CFA) for the Safe Ambients, a variant of the calculus of Mobile ...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
AbstractA variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supportin...
A new notion of security boundary is introduced to model multilevel security policies in the scenari...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
AbstractA variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multil...
AbstractA multilevel security policy is considered in the scenario of mobile systems, and modeled wi...