AbstractA multilevel security policy is considered in the scenario of mobile systems, and modeled within “pure” Mobile Ambients calculus, in which no communication channels are present and the only possible actions are represented by the moves performed by mobile processes. The information flow property of interest is defined in terms of the possibility for a confidential ambient/data to move outside a security boundary. Then, a very simple syntactic property is given that is sufficient to imply the absence of unwanted information flows
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
Information flow security in a multilevel system aims at guaranteeing that no high level information...
In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow...
AbstractA multilevel security policy is considered in the scenario of mobile systems, and modeled wi...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
AbstractA variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multil...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
AbstractIn this paper, we present a refinement of a Control Flow Analysis aimed at studying informat...
A new notion of security boundary is introduced to model multilevel security policies in the scenari...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
AbstractA variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supportin...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
Information flow security in a multilevel system aims at guaranteeing that no high level information...
In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow...
AbstractA multilevel security policy is considered in the scenario of mobile systems, and modeled wi...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
AbstractA variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multil...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pu...
AbstractIn this paper, we present a refinement of a Control Flow Analysis aimed at studying informat...
A new notion of security boundary is introduced to model multilevel security policies in the scenari...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
AbstractA variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supportin...
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the mo...
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel sec...
Information flow security in a multilevel system aims at guaranteeing that no high level information...
In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow...