{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T09:02:48Z","timestamp":1750496568903},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540309116"},{"type":"electronic","value":"9783540324256"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11601548_20","type":"book-chapter","created":{"date-parts":[[2005,12,10]],"date-time":"2005-12-10T05:39:45Z","timestamp":1134193185000},"page":"404-444","source":"Crossref","is-referenced-by-count":4,"title":["A Mobility Calculus with Local and Dependent Types"],"prefix":"10.1007","author":[{"given":"Mario","family":"Coppo","sequence":"first","affiliation":[]},{"given":"Federico","family":"Cozzi","sequence":"additional","affiliation":[]},{"given":"Mariangiola","family":"Dezani-Ciancaglini","sequence":"additional","affiliation":[]},{"given":"Elio","family":"Giovannetti","sequence":"additional","affiliation":[]},{"given":"Rosario","family":"Pugliese","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/3-540-45309-1_14","volume-title":"Programming Languages and Systems","author":"T. Amtoft","year":"2001","unstructured":"Amtoft, T., Kfoury, A.J., Pericas-Geertsen, S.M.: What are Polymorphically-Typed Ambients? In: Sands, D. (ed.) ESOP 2001. LNCS, vol.\u00a02028, pp. 206\u2013220. Springer, Heidelberg (2001)"},{"key":"20_CR2","series-title":"ENTCS","volume-title":"Proc. of TOSCA 2001","author":"F. Barbanera","year":"2002","unstructured":"Barbanera, F., Dezani-Ciancaglini, M., Salvo, I., Sassone, V.: A type inference algorithm for secure ambients. In: Lenisa, M., Miculan, M. (eds.) Proc. of TOSCA 2001. ENTCS, vol.\u00a062. Elsevier Science, Amsterdam (2002)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-40042-4_4","volume-title":"Global Computing. Programming Environments, Languages, Security, and Analysis of Systems","author":"L. Bettini","year":"2003","unstructured":"Bettini, L., Bono, V., Nicola, R.D., Ferrari, G., Gorla, D., Loreti, M., Moggi, E., Pugliese, R., Tuosto, E., Venneri, B.: The KLAIM Project: Theory and Practice. In: Priami, C. (ed.) GC 2003. LNCS, vol.\u00a02874, pp. 88\u2013151. Springer, Heidelberg (2003)"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28629-5_7","volume-title":"Mathematical Foundations of Computer Science 2004","author":"E. Bonelli","year":"2004","unstructured":"Bonelli, E., Compagnoni, A., Dezani-Ciancaglini, M., Garralda, P.: Boxed Ambients with Communication Interfaces. In: Fiala, J., Koubek, V., Kratochv\u00edl, J. (eds.) MFCS 2004. LNCS, vol.\u00a03153, pp. 119\u2013148. Springer, Heidelberg (2004)"},{"key":"20_CR5","unstructured":"Boudol, G.: A Parametric Model of Migration and Mobility, Release 1. Mikado Deliverable D1.2.1 (2003), available at, http:\/\/mikado.di.fc.ul.pt\/repository\/D1.2.1.pdf"},{"issue":"1","key":"20_CR6","first-page":"61","volume":"28","author":"M. Bugliesi","year":"2002","unstructured":"Bugliesi, M., Castagna, G.: Behavioral Typing for Safe Ambients. Computer Languages\u00a028(1), 61\u201399 (2002)","journal-title":"Computer Languages"},{"issue":"1","key":"20_CR7","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/963778.963781","volume":"26","author":"M. Bugliesi","year":"2004","unstructured":"Bugliesi, M., Castagna, G., Crafa, S.: Access Control for Mobile Agents: The Calculus of Boxed Ambients. ACM Transactions on Programming Languages and Systems\u00a026(1), 57\u2013124 (2004)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"1","key":"20_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.ic.2005.06.002","volume":"202","author":"M. Bugliesi","year":"2005","unstructured":"Bugliesi, M., Crafa, S., Merro, M., Sassone, V.: Communication and Mobility Control in Boxed Ambients. Information and Computation\u00a0202(1), 39\u201386 (2005)","journal-title":"Information and Computation"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-48749-2_4","volume-title":"Secure Internet Programming","author":"L. Cardelli","year":"1999","unstructured":"Cardelli, L.: Abstractions for Mobile Computation. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 51\u201394. Springer, Heidelberg (1999)"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-48523-6_20","volume-title":"Automata, Languages and Programming","author":"L. Cardelli","year":"1999","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Mobility Types for Mobile Ambients. In: Wiedermann, J., Van Emde Boas, P., Nielsen, M. (eds.) ICALP 1999. LNCS, vol.\u00a01644, pp. 230\u2013239. Springer, Heidelberg (1999)"},{"issue":"2","key":"20_CR11","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/S0890-5401(01)93121-9","volume":"177","author":"L. Cardelli","year":"2002","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Types for the Ambient Calculus. Information and Computation\u00a0177(2), 160\u2013194 (2002)","journal-title":"Information and Computation"},{"issue":"1","key":"20_CR12","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0304-3975(99)00231-5","volume":"240","author":"L. Cardelli","year":"2000","unstructured":"Cardelli, L., Gordon, A.D.: Mobile Ambients. Theoretical Computer Science\u00a0240(1), 177\u2013213 (2000); Special Issue on Coordination, Daniel Le M\u00e9tayer Editor","journal-title":"Theoretical Computer Science"},{"issue":"1","key":"20_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ic.2004.11.005","volume":"201","author":"G. Castagna","year":"2005","unstructured":"Castagna, G., Vitek, J., Nardelli, F.Z.: The Seal Calculus. Information and Computation\u00a0201(1), 1\u201354 (2005)","journal-title":"Information and Computation"},{"key":"20_CR14","first-page":"583","volume-title":"Proc. of TCS 2004","author":"M. Coppo","year":"2004","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Giovannetti, E., Pugliese, R.: Dynamic and Local Typing for Mobile Ambients. In: Proc. of TCS 2004, pp. 583\u2013596. Kluwer, Dordrecht (2004)"},{"key":"20_CR15","series-title":"ENTCS","volume-title":"Proc. of CATS 2003","author":"M. Coppo","year":"2003","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Giovannetti, E., Salvo, I.: M3: Mobility Types for Mobile Processes in Mobile Ambients. In: Harland, J. (ed.) Proc. of CATS 2003. ENTCS, vol.\u00a078. Elsevier, Amsterdam (2003)"},{"key":"20_CR16","series-title":"Studies in Logic and the Foundations of Mathematics","volume-title":"Combinatory Logic","author":"H.B. Curry","year":"1958","unstructured":"Curry, H.B., Feys, R.: Combinatory Logic. Studies in Logic and the Foundations of Mathematics, vol.\u00a0I. North-Holland, Amsterdam (1958)"},{"issue":"5","key":"20_CR17","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/32.685256","volume":"24","author":"R. Nicola De","year":"1998","unstructured":"De Nicola, R., Ferrari, G., Pugliese, R.: Klaim: a Kernel Language for Agents Interaction and Mobility. IEEE Transactions on Software Engineering\u00a024(5), 315\u2013330 (1998)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1007\/11523468_99","volume-title":"Automata, Languages and Programming","author":"R. De Nicola","year":"2005","unstructured":"De Nicola, R., Gorla, D., Pugliese, R.: Basic observables for a calculus for global computing. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol.\u00a03580, pp. 1226\u20131238. Springer, Heidelberg (2005)"},{"key":"20_CR19","series-title":"ENTCS","volume-title":"Proc. of F-WAN","author":"G. Ferrari","year":"2002","unstructured":"Ferrari, G., Moggi, E., Pugliese, R.: Guardians for Ambient-based Monitoring. In: Sassone, V. (ed.) Proc. of F-WAN. ENTCS, vol.\u00a066. Elsevier, Amsterdam (2002)"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/11539452_29","volume-title":"CONCUR 2005 \u2013 Concurrency Theory","author":"A. Francalanza","year":"2005","unstructured":"Francalanza, A., Hennessy, M.: A theory of system behaviour in the presence of node and link failures. In: Abadi, M., de Alfaro, L. (eds.) CONCUR 2005. LNCS, vol.\u00a03653, pp. 368\u2013382. Springer, Heidelberg (2005)"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-540-40042-4_5","volume-title":"Global Computing. Programming Environments, Languages, Security, and Analysis of Systems","author":"E. Giovannetti","year":"2003","unstructured":"Giovannetti, E.: Ambient Calculi with Types: a Tutorial. In: Priami, C. (ed.) GC 2003. LNCS, vol.\u00a02874, pp. 151\u2013191. Springer, Heidelberg (2003)"},{"key":"20_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/BFb0014053","volume-title":"Typed Lambda Calculi and Applications","author":"H. Goguen","year":"1995","unstructured":"Goguen, H.: Typed Operational Semantics. In: Dezani-Ciancaglini, M., Plotkin, G. (eds.) TLCA 1995. LNCS, vol.\u00a0902, pp. 186\u2013200. Springer, Heidelberg (1995)"},{"key":"20_CR23","series-title":"ENTCS","volume-title":"Proc. of FGUC 2004","author":"D. Gorla","year":"2004","unstructured":"Gorla, D., Hennessy, M., Sassone, V.: Security Policies as Membranes in Systems for Global Computing. In: Rathke, J. (ed.) Proc. of FGUC 2004. ENTCS. Elsevier, Amsterdam (2004)"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-45061-0_11","volume-title":"Automata, Languages and Programming","author":"D. Gorla","year":"2003","unstructured":"Gorla, D., Pugliese, R.: Resource Acces and Mobility Control with Dynamic Privileges Acquisition. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol.\u00a02719, pp. 119\u2013132. Springer, Heidelberg (2003)"},{"key":"20_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-540-24727-2_18","volume-title":"Foundations of Software Science and Computation Structures","author":"M. Hennessy","year":"2004","unstructured":"Hennessy, M., Rathke, J., Yoshida, N.: SafeDpi: A language for controlling mobile code (extended abstract). In: Walukiewicz, I. (ed.) FOSSACS 2004. LNCS, vol.\u00a02987, pp. 241\u2013256. Springer, Heidelberg (2004)"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/3-540-48749-2_5","volume-title":"Secure Internet Programming","author":"M. Hennessy","year":"1999","unstructured":"Hennessy, M., Riely, J.: Type-Safe Execution of Mobile Agents in Anonymous Networks. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 95\u2013115. Springer, Heidelberg (1999)"},{"key":"20_CR27","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1006\/inco.2001.3089","volume":"173","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Resource Access Control in Systems of Mobile Agents. Information and Computation\u00a0173, 82\u2013120 (2002)","journal-title":"Information and Computation"},{"issue":"3-4","key":"20_CR28","first-page":"335","volume":"31","author":"M. Hennessy","year":"2003","unstructured":"Hennessy, M., Riely, J.: Trust and Partial Typing in Open Systems of Mobile Agents. Journal of Automated Reasoning\u00a031(3-4), 335\u2013370 (2003)","journal-title":"Journal of Automated Reasoning"},{"issue":"1","key":"20_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/596980.596981","volume":"25","author":"F. Levi","year":"2003","unstructured":"Levi, F., Sangiorgi, D.: Controlling Interference in Ambients. Transactions on Programming Languages and Systems\u00a025(1), 1\u201369 (2003)","journal-title":"Transactions on Programming Languages and Systems"},{"key":"20_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-540-24725-8_13","volume-title":"Programming Languages and Systems","author":"C. Lhoussaine","year":"2004","unstructured":"Lhoussaine, C., Sassone, V.: A Dependently Typed Ambient Calculus. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol.\u00a02986, pp. 171\u2013187. Springer, Heidelberg (2004)"},{"key":"20_CR31","first-page":"71","volume-title":"Proc. of POPL 2002","author":"M. Merro","year":"2002","unstructured":"Merro, M., Hennessy, M.: Bisimulation Congruences in Safe Ambients. In: Jones, N.D., Leroy, X. (eds.) Proc. of POPL 2002, pp. 71\u201380. ACM Press, New York (2002)"},{"key":"20_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/3-540-45694-5_21","volume-title":"CONCUR 2002 - Concurrency Theory","author":"M. Merro","year":"2002","unstructured":"Merro, M., Sassone, V.: Typing and Subtyping Mobility in Boxed Ambients. In: Brim, L., Jan\u010dar, P., K\u0159et\u00ednsk\u00fd, M., Kucera, A. (eds.) CONCUR 2002. LNCS, vol.\u00a02421, pp. 304\u2013320. Springer, Heidelberg (2002)"},{"key":"20_CR33","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1145\/263699.263712","volume-title":"Proc. of POPL 1997","author":"G.C. Necula","year":"1997","unstructured":"Necula, G.C.: Proof-Carrying Code. In: Jones, N.D. (ed.) Proc. of POPL 1997, pp. 106\u2013119. ACM Press, New York (1997)"},{"key":"20_CR34","volume-title":"Types and Programming Languages","author":"B.C. Pierce","year":"2002","unstructured":"Pierce, B.C.: Types and Programming Languages. MIT Press, Cambridge (2002)"},{"issue":"5","key":"20_CR35","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1017\/S096012950007002X","volume":"6","author":"B.C. Pierce","year":"1996","unstructured":"Pierce, B.C., Sangiorgi, D.: Typing and Subtyping for Mobile Processes. Mathematical Structures in Computer Science\u00a06(5), 409\u2013454 (1996); An extract appeared in Proc. of LICS 1993, pp. 376\u2013385 (1993)","journal-title":"Mathematical Structures in Computer Science"},{"key":"20_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/3-540-46432-8_25","volume-title":"Foundation of Software Science and Computation Structures","author":"P. Zimmer","year":"2000","unstructured":"Zimmer, P.: Subtyping and typing algorithms for mobile ambients. In: Tiuryn, J. (ed.) FOSSACS 2000. LNCS, vol.\u00a01784, pp. 375\u2013390. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Processes, Terms and Cycles: Steps on the Road to Infinity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11601548_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T13:25:36Z","timestamp":1586611536000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11601548_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540309116","9783540324256"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/11601548_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}