{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:32Z","timestamp":1725562412302},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540209553"},{"type":"electronic","value":"9783540246312"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24631-2_6","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T12:34:59Z","timestamp":1280752499000},"page":"207-265","source":"Crossref","is-referenced-by-count":10,"title":["Security for Mobility"],"prefix":"10.1007","author":[{"given":"Hanne Riis","family":"Nielson","sequence":"first","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Mikael","family":"Buchholtz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols \u2013 The Spi calculus. Information and Computation\u00a0148(1), 1\u201370 (1999)","journal-title":"Information and Computation"},{"issue":"2","key":"6_CR2","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/S0167-6423(99)00007-6","volume":"35","author":"A. Aiken","year":"1999","unstructured":"Aiken, A.: Introduction to set constraint-based program analysis. Science of Computer Programming (SCP)\u00a035(2), 79\u2013111 (1999)","journal-title":"Science of Computer Programming (SCP)"},{"doi-asserted-by":"crossref","unstructured":"Bell, D., LaPadula, L.: Secure computer system: Unified exposition and Multics interpretation. Technical Report ESDTR-75-306, MTR-2547, MITRE Corporation (1975)","key":"6_CR3","DOI":"10.21236\/ADA023588"},{"unstructured":"Biba, K.J.: Integrity consideration for secure computer systems. Technical Report ESDTR-76-372, MTR-3153, MITRE Corporation (1977)","key":"6_CR4"},{"unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Polynomialtime validation of protocol narration (2002) (manuscript)","key":"6_CR5"},{"unstructured":"Braghin, C., Cortesi, A., Focardi, R.: Control flow analysis for information flow security in Mobile Ambients. In: Proceedings of NordSec 2001. Technical Report IMM-TR-2001-14. Technical University of Denmark (2001)","key":"6_CR6"},{"unstructured":"Buchholtz, M., Nielson, F., Riis Nielson, H.: Experiments with Succinct Solvers. Technical Report IMM-TR-2002-4, Technical University of Denmark (2002)","key":"6_CR7"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-45500-0_2","volume-title":"Theoretical Aspects of Computer Software","author":"M. Bugliesi","year":"2001","unstructured":"Bugliesi, M., Castagna, G., Crafa, S.: Boxed Ambients. In: Kobayashi, N., Pierce, B.C. (eds.) TACS 2001. LNCS, vol.\u00a02215, pp. 37\u201363. Springer, Heidelberg (2001)"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/3-540-44685-0_8","volume-title":"CONCUR 2001 - Concurrency Theory","author":"M. Bugliesi","year":"2001","unstructured":"Bugliesi, M., Castagna, G., Crafa, S.: Reasoning about security in Mobile Ambients. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol.\u00a02154, pp. 102\u2013120. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems, 18\u201336 (1990)","key":"6_CR10","DOI":"10.1145\/77648.77649"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-48523-6_20","volume-title":"Automata, Languages and Programming","author":"L. Cardelli","year":"1999","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Mobility types for Mobile Ambients. In: Wiedermann, J., Van Emde Boas, P., Nielsen, M. (eds.) ICALP 1999. LNCS, vol.\u00a01644, pp. 230\u2013239. Springer, Heidelberg (1999)"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/3-540-44929-9_25","volume-title":"Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics","author":"L. Cardelli","year":"2000","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Ambient groups and mobility types. In: Watanabe, O., Hagiya, M., Ito, T., van Leeuwen, J., Mosses, P.D. (eds.) TCS 2000. LNCS, vol.\u00a01872, pp. 333\u2013347. Springer, Heidelberg (2000)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/BFb0053547","volume-title":"Foundations of Software Science and Computation Structures","author":"L. Cardelli","year":"1998","unstructured":"Cardelli, L., Gordon, A.D.: Mobile Ambients. In: Nivat, M. (ed.) FOSSACS 1998. LNCS, vol.\u00a01378, pp. 140\u2013155. Springer, Heidelberg (1998)"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/292540.292550","volume-title":"Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 1999)","author":"L. Cardelli","year":"1999","unstructured":"Cardelli, L., Gordon, A.D.: Types for Mobile Ambients. In: Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 1999), pp. 79\u201392. ACM Press, New York (1999)"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1145\/325694.325742","volume-title":"Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2000)","author":"L. Cardelli","year":"2000","unstructured":"Cardelli, L., Gordon, A.D.: Anytime, anywhere: Modal logics for Mobile Ambients. In: Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2000), pp. 365\u2013377. ACM Press, New York (2000)"},{"issue":"1","key":"6_CR16","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0304-3975(99)00231-5","volume":"240","author":"L. Cardelli","year":"2000","unstructured":"Cardelli, L., Gordon, A.D.: Mobile Ambients. Theoretical Computer Science\u00a0240(1), 177\u2013213 (2000)","journal-title":"Theoretical Computer Science"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/3-540-45927-8_21","volume-title":"Programming Languages and Systems","author":"W. Charatonik","year":"2002","unstructured":"Charatonik, W., Gordon, A.D., Talbot, J.-M.: Finite-control Mobile Ambients. In: Le M\u00e9tayer, D. (ed.) ESOP 2002. LNCS, vol.\u00a02305, pp. 295\u2013313. Springer, Heidelberg (2002)"},{"unstructured":"Clark, J., Jacob, J.: A survey of authentication protocol literature: Version 1.0 (1997), http:\/\/www-users.cs.york.ac.uk\/~jac\/papers\/drareviewps.ps","key":"6_CR18"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1145\/512950.512973","volume-title":"Proceedings of the 4th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 1977)","author":"P. Cousot","year":"1977","unstructured":"Cousot, P., Cousot, R.: Abstract Interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Proceedings of the 4th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 1977), pp. 238\u2013252. ACM Press, New York (1977)"},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1145\/567752.567778","volume-title":"Proceedings of the 6th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 1979)","author":"P. Cousot","year":"1979","unstructured":"Cousot, P., Cousot, R.: Systematic design of program analysis frameworks. In: Proceedings of the 6th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 1979), pp. 269\u2013282. ACM Press, New York (1979)"},{"doi-asserted-by":"crossref","unstructured":"Crafa, S., Bugliesi, M., Castagna, G.: Information flow security for Boxed Ambients. In F-WAN: Foundations of Wide Area Network Computing. Electronic Notes in Theoretical Computer Science, vol.\u00a063 (2002)","key":"6_CR21","DOI":"10.1016\/S1571-0661(04)80417-1"},{"key":"6_CR22","volume-title":"Computer Security","author":"D. Gollmann","year":"1999","unstructured":"Gollmann, D.: Computer Security. Wiley, Chichester (1999)"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/3-540-47764-0_23","volume-title":"Static Analysis","author":"F. Levi","year":"2001","unstructured":"Levi, F., Maffeis, S.: An abstract interpretation framework for analysing Mobile Ambients. In: Cousot, P. (ed.) SAS 2001. LNCS, vol.\u00a02126, pp. 395\u2013411. Springer, Heidelberg (2001)"},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1145\/325694.325741","volume-title":"Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2000)","author":"F. Levi","year":"2000","unstructured":"Levi, F., Sangiorgi, D.: Controlling interference in ambients. In: Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2000), pp. 352\u2013364. ACM Press, New York (2000)"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/3-540-48294-6_21","volume-title":"Static Analysis","author":"D. McAllester","year":"1999","unstructured":"McAllester, D.: On the complexity analysis of static analyses. In: Cortesi, A., Fil\u00e9, G. (eds.) SAS 1999. LNCS, vol.\u00a01694, pp. 312\u2013329. Springer, Heidelberg (1999)"},{"key":"6_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/3-540-45694-5_21","volume-title":"CONCUR 2002 - Concurrency Theory","author":"M. Merro","year":"2002","unstructured":"Merro, M., Sassone, V.: Typing and subtyping mobility in Boxed Ambients. In: Brim, L., Jan\u010dar, P., K\u0159et\u00ednsk\u00fd, M., Kucera, A. (eds.) CONCUR 2002. LNCS, vol.\u00a02421, pp. 304\u2013320. Springer, Heidelberg (2002)"},{"issue":"12","key":"6_CR27","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Nielson, F., Riis Nielson, H.: Flow Logics and operational semantics. Electronic Notes in Theoretical Computer Science\u00a010 (1998)","key":"6_CR28","DOI":"10.1016\/S1571-0661(05)80695-4"},{"key":"6_CR29","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03811-6","volume-title":"Principles of Program Analysis","author":"F. Nielson","year":"1999","unstructured":"Nielson, F., Riis Nielson, H., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (1999)"},{"issue":"2","key":"6_CR30","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/S0304-3975(01)00140-2","volume":"283","author":"F. Nielson","year":"2002","unstructured":"Nielson, F., Riis Nielson, H., Hansen, R.R.: Validating firewalls using flow logics. Theoretical Computer Science\u00a0283(2), 381\u2013418 (2002)","journal-title":"Theoretical Computer Science"},{"key":"6_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/3-540-48320-9_32","volume-title":"CONCUR\u201999. Concurrency Theory","author":"F. Nielson","year":"1999","unstructured":"Nielson, F., Riis Nielson, H., Hansen, R.R., Jensen, J.G.: Validating firewalls in Mobile Ambients. In: Baeten, J.C.M., Mauw, S. (eds.) CONCUR 1999. LNCS, vol.\u00a01664, pp. 463\u2013477. Springer, Heidelberg (1999)"},{"key":"6_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/3-540-45927-8_18","volume-title":"Programming Languages and Systems","author":"F. Nielson","year":"2002","unstructured":"Nielson, F., Riis Nielson, H., Seidl, H.: Automatic complexity analysis. In: Le M\u00e9tayer, D. (ed.) ESOP 2002. LNCS, vol.\u00a02305, pp. 243\u2013261. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Nielson, F., Riis Nielson, H., Seidl, H.: Cryptographic analysis in cubic time. Electronic Notes in Theoretical Computer Science\u00a062 (2002)","key":"6_CR33","DOI":"10.1016\/S1571-0661(04)00316-0"},{"key":"6_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/3-540-45789-5_5","volume-title":"Static Analysis","author":"F. Nielson","year":"2002","unstructured":"Nielson, F., Riis Nielson, H., Seidl, H.: Normalizable Horn clauses, strongly recognizable relations and Spi. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 20\u201335. Springer, Heidelberg (2002)"},{"unstructured":"Nielson, F., Riis Nielson, H., Seidl, H.: Succinct Solvers (2002) (manuscript)","key":"6_CR35"},{"key":"6_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-45309-1_17","volume-title":"Programming Languages and Systems","author":"F. Nielson","year":"2001","unstructured":"Nielson, F., Seidl, H.: Control-flow analysis in cubic time. In: Sands, D. (ed.) ESOP 2001. LNCS, vol.\u00a02028, pp. 252\u2013268. Springer, Heidelberg (2001)"},{"key":"6_CR37","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1145\/325694.325711","volume-title":"Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2000)","author":"H. Riis Nielson","year":"2000","unstructured":"Riis Nielson, H., Nielson, F.: Shape analysis for Mobile Ambients. In: Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2000), pp. 142\u2013154. ACM Press, New York (2000)"},{"key":"6_CR38","first-page":"233","volume":"8","author":"H. Riis Nielson","year":"2001","unstructured":"Riis Nielson, H., Nielson, F.: Shape analysis for Mobile Ambients. Nordic Journal of Computing\u00a08, 233\u2013275 (2001)","journal-title":"Nordic Journal of Computing"},{"key":"6_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-36377-7_11","volume-title":"The Essence of Computation","author":"H. Riis Nielson","year":"2002","unstructured":"Riis Nielson, H., Nielson, F.: Flow Logic: a multi-paradigmatic approach to static analysis. In: Mogensen, T.\u00c6., Schmidt, D.A., Sudborough, I.H. (eds.) The Essence of Computation. LNCS, vol.\u00a02566, pp. 223\u2013244. Springer, Heidelberg (2002)"},{"key":"6_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/3-540-45694-5_20","volume-title":"CONCUR 2002 - Concurrency Theory","author":"D.T. Teller","year":"2002","unstructured":"Teller, D.T., Zimmer, P., Hirschkoff, D.: Using ambients to control resources. In: Brim, L., Jan\u010dar, P., K\u0159et\u00ednsk\u00fd, M., Kucera, A. (eds.) CONCUR 2002. LNCS, vol.\u00a02421, pp. 288\u2013303. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design II"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24631-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:52:40Z","timestamp":1559357560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24631-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209553","9783540246312"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24631-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}