AbstractIn this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow security in the the calculus of Mobile Ambients. The improvements are achieved by making the analysis be flow-sensitive: the analysis is able to keep track of temporal dependencies of capabilities application when computing a safe approximation of the run-time topology of Mobile Ambient processes
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
A new notion of security boundary is introduced to model multilevel security policies in the scenari...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow...
AbstractIn this paper, we present a refinement of a Control Flow Analysis aimed at studying informat...
AbstractA multilevel security policy is considered in the scenario of mobile systems, and modeled wi...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
AbstractA variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multil...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
AbstractA variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supportin...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
We present a Control Flow Analysis (CFA) for the Safe Ambients, a variant of the calculus of Mobile ...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
A new notion of security boundary is introduced to model multilevel security policies in the scenari...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow...
AbstractIn this paper, we present a refinement of a Control Flow Analysis aimed at studying informat...
AbstractA multilevel security policy is considered in the scenario of mobile systems, and modeled wi...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
AbstractA variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multil...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
AbstractA variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supportin...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
We present a Control Flow Analysis (CFA) for the Safe Ambients, a variant of the calculus of Mobile ...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
A new notion of security boundary is introduced to model multilevel security policies in the scenari...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...