{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:26:46Z","timestamp":1761611206154},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540678236"},{"type":"electronic","value":"9783540449294"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44929-9_25","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T09:20:53Z","timestamp":1178356853000},"page":"333-347","source":"Crossref","is-referenced-by-count":43,"title":["Ambient Groups and Mobility Types"],"prefix":"10.1007","author":[{"given":"Luca","family":"Cardelli","sequence":"first","affiliation":[]},{"given":"Giorgio","family":"Ghelli","sequence":"additional","affiliation":[]},{"given":"Andrew D.","family":"Gordon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,24]]},"reference":[{"key":"25_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1007\/BFb0014571","volume-title":"Proceedings TACS\u201997","author":"M. Abadi","year":"1997","unstructured":"M. Abadi. Secrecy by typing in security protocols. In Proceedings TACS\u201997, LNCS 1281, pages 611\u2013638. Springer, 1997."},{"key":"25_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/BFb0055617","volume-title":"Proceedings Concur\u201998","author":"C. Bodei","year":"1998","unstructured":"C. Bodei, P. Degano, F. Nielson, and H. Nielson. Control flow analysis for the \u03c0-calculus. In Proceedings Concur\u201998, LNCS 1466, pages 84\u201398. Springer, 1998."},{"key":"25_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/BFb0053547","volume-title":"Proceedings FoS-SaCS\u2019\u201998","author":"L. Cardelli","year":"1998","unstructured":"L. Cardelli and A. D. Gordon. Mobile ambients. In Proceedings FoS-SaCS\u2019\u201998, LNCS 1378, pages 140\u2013155. Springer, 1998. Accepted for publication in Theoretical Computer Science."},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"L. Cardelli and A. D. Gordon. Types for mobile ambients. In Proceedings POPL\u201999, pages 79\u201392. ACM, 1999.","DOI":"10.1145\/292540.292550"},{"key":"25_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1007\/3-540-48523-6_20","volume-title":"Proceedings ICALP\u201999","author":"L. Cardelli","year":"1999","unstructured":"L. Cardelli, G. Ghelli, and A. D. Gordon. Mobility types for mobile ambients. In Proceedings ICALP\u201999, LNCS 1644, pages 230\u2013239. Springer, 1999."},{"key":"25_CR6","unstructured":"L. Cardelli, G. Ghelli, and A. D. Gordon. Types for the ambient calculus. Microsoft Research Technical Report, to appear."},{"key":"25_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/3-540-49019-1_15","volume-title":"Proceedings FoSSaCS\u201999","author":"A. D. Gordon","year":"1999","unstructured":"A. D. Gordon and L. Cardelli. Equational properties of mobile ambients. In Proceedings FoSSaCS\u201999, LNCS 1578, pages 212\u2013226. Springer, 1999."},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"F. Levi and D. Sangiorgi. Controlling interference in ambients. In Proceedings POPL\u201900, pages 352\u2013364. ACM, 2000.","DOI":"10.1145\/325694.325741"},{"key":"25_CR9","unstructured":"R. Milner. Communicating and Mobile Systems: the \u03c0-Calculus. CUP, 1999."},{"key":"25_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1007\/3-540-48320-9_32","volume-title":"Proceedings Concur\u201999","author":"F. Nielson","year":"1999","unstructured":"F. Nielson, H.R. Nielson, R.R. Hansen, and J.G. Jensen. Validating firewalls in mobile ambients. In Proceedings Concur\u201999, LNCS 1664, pages 463\u2013477. Springer, 1999."},{"issue":"2","key":"25_CR11","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1006\/inco.1996.2613","volume":"132","author":"M. Tofte","year":"1997","unstructured":"M. Tofte and J.-P. Talpin. Region-based memory management. Information and Computation, 132(2):109\u2013176, 1997. Preliminary version in Proceedings POPL\u201994.","journal-title":"Information and Computation"}],"container-title":["Lecture Notes in Computer Science","Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44929-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T10:03:24Z","timestamp":1550311404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44929-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540678236","9783540449294"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-44929-9_25","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}