{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:01:12Z","timestamp":1725494472452},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405238"},{"type":"electronic","value":"9783540376194"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-37619-4_39","type":"book-chapter","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T23:51:13Z","timestamp":1194393073000},"page":"391-404","source":"Crossref","is-referenced-by-count":0,"title":["Formalizing Active Networks Security with Seal-Calculus"],"prefix":"10.1007","author":[{"given":"Xiaojuan","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Tao","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,24]]},"reference":[{"key":"39_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R. Milner","year":"1992","unstructured":"R. Milner, J Parrow, and D. Walker. A calculus of mobile processes, Parts I and II. Journal of Information and Computation, 100:1\u201377, Sept.1992.","journal-title":"Journal of Information and Computation"},{"key":"39_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1007\/3-540-61604-7_67","volume-title":"Proceedings of CONCUR\u201996","author":"C. Fournet","year":"1996","unstructured":"C. Fournet, G. Gonthier, J. Levy, L. Marnaget, and D. Remy, A calculus of Mobile Agents, Proceedings of CONCUR\u201996, LNCS, Vol.1119, pp. 406\u2013421, Springer, 1996."},{"key":"39_CR3","first-page":"140","volume":"1378","author":"L. Cardelli","year":"1998","unstructured":"L. Cardelli and A.D. Gordon, Mobile Ambients, Foundations of software Science and Computation Structures, LNCS, Vol.1378, pp. 140\u2013155,1998.","journal-title":"LNCS"},{"key":"39_CR4","unstructured":"Jan Viteck and Giuseppe Castsgna. A calculus of secure mobile computations. In Proceedings of the IEEE Workshop on Internet Programming Languages, (WIPL). Chicago, I11.1998."},{"key":"39_CR5","unstructured":"Konstantinos Psounis. Active networks: Application, security, safety and architectures. IEEE Communication Surveys. http:\/\/www.comsoc.org.pubs\/surveys. First Quarter, 1999"},{"issue":"10","key":"39_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/35.722141","volume":"36","author":"D. S. Alexander","year":"1998","unstructured":"D. Scott Alexander, william A. Arbaugh, Angelos D. Keromytis, and Jonathan M. Smith. Safety and Security of Programmable Network Infrastructures. IEEE Communications Magazine, 36(10):84\u201392, 1998.","journal-title":"IEEE Communications Magazine"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"AN Security Working Group, \u201cSecurity architecture for active nets\u201d, July 1998, available online at ftp:\/\/ftp.tislabs.com\/pub\/activenets\/ secrarch2.ps.","DOI":"10.1016\/S1353-4858(98)90022-8"},{"key":"39_CR8","unstructured":"J. Moore. Mobile code Security Techniques. Technical Reportms-CIS-98-28, University of Pennsylvania, May 1998."},{"key":"39_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47959-7_3","volume-title":"Internet Programming Languages","author":"J. Vitek","year":"1999","unstructured":"J. Vitek and G. Castagna. Seal: A framework for secure mobile computation. In Internet Programming Languages, number 1686 in Lecture Notes in Computer Science. Springer, 1999."},{"key":"39_CR10","unstructured":"G. Castagna and J. Vitek. Confinement and commitment for the seal calculus. Nov. 1998."},{"key":"39_CR11","unstructured":"D Scott Alexander, Michael Hicks, Angelos D. Keromytis, A Taxonomy of Active Code. http:\/\/citeseer.nj.nec.com\/alexander99taxonomy.html"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Schwartz, A. Jackson, T. Strayer, W. Zhou, R. Rockwell, and C. Partridge. Smart packets for active networks. In Proceedings of the 1999 IEEE 2nd Conference on Open Architectures and Network Programming(OPENARCH\u201999), March 1999","DOI":"10.1109\/OPNARC.1999.758557"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Michael Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter and Scott Nettles. PLAN: A packer language for active networks. In Proceedings of the 1998 ACM SIGPLAN International Conference on Functional Programming (ICFP\u201998), September 1998","DOI":"10.1145\/289423.289431"},{"key":"39_CR14","unstructured":"David J. Wetherall, John Guttag, and David L, Tennenhouse. ANTS: A toolkit for building and dynamically deploying network protocols. In Proceedings of the 1998 IEEEConference on Open Architecture and Network Programming (OPENARCH\u201998), April 1998"},{"key":"39_CR15","unstructured":"Scott Alexander. ALIEN: A generalized computing model of active network. PHD thesis University of Pennsylvania, 1998"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Scott Alexander, William A. Arbaugh, Michael W. Hicks, Pankaj Kakkar, Angelos D. Keromytis, Jonathan T. Moore, Carl A. Gunter, Scott M. Nettles, and Jonathan M. Smith. The SwitchWare active network architecture, IEEE Network, special issue on Active and Programmable Networks, May\/June 1998","DOI":"10.1109\/65.690959"},{"key":"39_CR17","unstructured":"Jonathan T. Moore. Safe and Efficient Active Packets. Technical Report MS-CIS-99-24, Department of Computer and Information Science, University of Pennsylvania, October 1999"},{"key":"39_CR18","unstructured":"Ian Wakeman. Et al., Designing a programming language for active networks. http:\/\/www.cogs.susx.ac.uk\/projects\/safetynet. Submitted to Hipparch special issue of Network and ISDN System, January 1999"}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Processing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-37619-4_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T22:12:48Z","timestamp":1588025568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-37619-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405238","9783540376194"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-37619-4_39","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}