{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:22:19Z","timestamp":1743056539969,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208877"},{"type":"electronic","value":"9783540398813"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39881-3_10","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T22:14:04Z","timestamp":1277331244000},"page":"86-100","source":"Crossref","is-referenced-by-count":5,"title":["Enforcing Security Policies via Types"],"prefix":"10.1007","author":[{"given":"Daniele","family":"Gorla","sequence":"first","affiliation":[]},{"given":"Rosario","family":"Pugliese","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.: A calculus for cryptographic protocols: The spi calculus. Information and Computation\u00a0148(1), 1\u201370 (1999)","journal-title":"Information and Computation"},{"key":"10_CR2","volume-title":"JavaSpaces Principles, Patterns and Practice","author":"K. Arnold","year":"1999","unstructured":"Arnold, K., Freeman, E., Hupfer, S.: JavaSpaces Principles, Patterns and Practice. Addison-Wesley, Reading (1999)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/3-540-45500-0_2","volume-title":"Theoretical Aspects of Computer Software","author":"M. Bugliesi","year":"2001","unstructured":"Bugliesi, M., Castagna, G., Crafa, S.: Boxed ambients. In: Kobayashi, N., Pierce, B.C. (eds.) TACS 2001. LNCS, vol.\u00a02215, pp. 38\u201363. Springer, Heidelberg (2001)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/3-540-44685-0_8","volume-title":"CONCUR 2001 - Concurrency Theory","author":"M. Bugliesi","year":"2001","unstructured":"Bugliesi, M., Castagna, G., Crafa, S.: Reasoning about security in mobile ambients. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol.\u00a02154, pp. 102\u2013120. Springer, Heidelberg (2001)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Busi, N., Gorrieri, R., Lucchi, R., Zavattaro, G.: Secspaces: a data-driven coordination model for environments open to untrusted agents. To appear in FOCLASA 2002, ENTCS (2002)","DOI":"10.1016\/S1571-0661(05)80375-5"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-48523-6_20","volume-title":"Automata, Languages and Programming","author":"L. Cardelli","year":"1999","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Mobility types for mobile ambients. In: Wiedermann, J., Van Emde Boas, P., Nielsen, M. (eds.) ICALP 1999. LNCS, vol.\u00a01644, pp. 230\u2013239. Springer, Heidelberg (1999)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/3-540-44929-9_25","volume-title":"Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics","author":"L. Cardelli","year":"2000","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Ambient groups and mobility types. In: Watanabe, O., Hagiya, M., Ito, T., van Leeuwen, J., Mosses, P.D. (eds.) TCS 2000. LNCS, vol.\u00a01872, pp. 333\u2013347. Springer, Heidelberg (2000)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Types for the ambient calculus. Journal of Information and Computation (2002)","DOI":"10.1006\/inco.2001.3121"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Cardelli, L., Gordon, A.D.: Types for mobile ambients. In: Proceedings of POPL 1999, pp. 79\u201392 (1999)","DOI":"10.1145\/292540.292550"},{"issue":"1","key":"10_CR10","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0304-3975(99)00231-5","volume":"240","author":"L. Cardelli","year":"2000","unstructured":"Cardelli, L., Gordon, A.D.: Mobile ambients. Theoretical Computer Science\u00a0240(1), 177\u2013213 (2000)","journal-title":"Theoretical Computer Science"},{"issue":"4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1145\/63334.63337","volume":"32","author":"N. Carriero","year":"1989","unstructured":"Carriero, N., Gelernter, D.: Linda in context. Communications of the ACM\u00a032(4), 444\u2013458 (1989)","journal-title":"Communications of the ACM"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/3-540-44685-0_7","volume-title":"CONCUR 2001 - Concurrency Theory","author":"G. Castagna","year":"2001","unstructured":"Castagna, G., Ghelli, G., Nardelli, F.Z.: Typing mobility in the seal calculus. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol.\u00a02154, pp. 82\u2013101. Springer, Heidelberg (2001)"},{"issue":"5","key":"10_CR13","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/32.685259","volume":"24","author":"P. Ciancarini","year":"1998","unstructured":"Ciancarini, P., Tolksdorf, R., Vitali, F., Rossi, D., Knoche, A.: Coordinating multiagent applications on the WWW: A reference architecture. IEEE Transactions on Software Engineering\u00a024(5), 362\u2013366 (1998)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"5","key":"10_CR14","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/32.685256","volume":"24","author":"R. De Nicola","year":"1998","unstructured":"De Nicola, R., Ferrari, G., Pugliese, R.: KLAIM: a Kernel Language for Agents Interaction and Mobility. IEEE Transactions on Software Engineering\u00a024(5), 315\u2013330 (1998)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"De Nicola, R., Ferrari, G., Pugliese, R.: Types as Specifications of Access Policies. In: Vitek, J., Jensen, C. (eds.) [35], pp. 117\u2013146","DOI":"10.1007\/3-540-48749-2_6"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0304-3975(99)00232-7","volume":"240","author":"R. De Nicola","year":"2000","unstructured":"De Nicola, R., Ferrari, G., Pugliese, R., Venneri, B.: Types for Access Control. Theoretical Computer Science\u00a0240(1), 215\u2013254 (2000)","journal-title":"Theoretical Computer Science"},{"key":"10_CR17","first-page":"278","volume-title":"Proc. of ISADS 2001","author":"D. Deugo","year":"2001","unstructured":"Deugo, D.: Choosing a Mobile Agent Messaging Model. In: Proc. of ISADS 2001, pp. 278\u2013286. IEEE, Los Alamitos (2001)"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/3-540-44464-5_16","volume-title":"Advances in Computing Science - ASIAN 2000","author":"M. Dezani-Ciancaglini","year":"2000","unstructured":"Dezani-Ciancaglini, M., Salvo, I.: Security types for mobile safe ambients. In: He, J., Sato, M. (eds.) ASIAN 2000. LNCS, vol.\u00a01961, pp. 215\u2013236. Springer, Heidelberg (2000)"},{"issue":"1","key":"10_CR19","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/2363.2433","volume":"7","author":"D. Gelernter","year":"1985","unstructured":"Gelernter, D.: Generative Communication in Linda. ACM Transactions on Programming Languages and Systems\u00a07(1), 80\u2013112 (1985)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10_CR20","volume-title":"Inside Java 2 platform security: architecture, API design, and implementation","author":"L. Gong","year":"1999","unstructured":"Gong, L.: Inside Java 2 platform security: architecture, API design, and implementation. Addison-Wesley, Reading (1999)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Gorla, D., Pugliese, R.: Resource access and mobility control with dynamic privileges acquisition. Research report, Dipartimento di Sistemi e Informatica, Universit\u00e0 di Firenze (2002), Available at \n                      http:\/\/rap.dsi.unifi.it\/~pugliese\/DOWNLOAD\/muklaim-full.pdf","DOI":"10.1007\/3-540-45061-0_11"},{"key":"10_CR22","unstructured":"Gorla, D., Pugliese, R.: Enforcing Security Policies via Types. Research report, Dipartimento di Sistemi e Informatica, Universit\u00e0 di Firenze (2003), Available at \n                      http:\/\/rap.dsi.unifi.it\/~pugliese\/DOWNLOAD\/spc-full.pdf"},{"key":"10_CR23","volume-title":"Securing Java","author":"G.M. Graw","year":"1999","unstructured":"Graw, G.M., Felten, E.: Securing Java. John Wiley and Son, Chichester (1999)"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Hennessy, M., Riely, J.: Type-Safe Execution of Mobile Agents in Anonymous Networks. In: Vitek, J and Jensen, C [35], pp. 95\u2013115","DOI":"10.1007\/3-540-48749-2_5"},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1006\/inco.2001.3089","volume":"173","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Resource Access Control in Systems of Mobile Agents. Information and Computation\u00a0173, 82\u2013120 (2002)","journal-title":"Information and Computation"},{"key":"10_CR26","volume-title":"Proc. of the 14th IEEE Computer Security Foundations Workshop","author":"D. Kirli","year":"2001","unstructured":"Kirli, D.: Confined mobile functions. In: Proc. of the 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"10_CR27","first-page":"352","volume-title":"Proceedings of POPL 2000","author":"F. Levi","year":"2000","unstructured":"Levi, F., Sangiorgi, D.: Controlling interference in ambients. In: Proceedings of POPL 2000, pp. 352\u2013364. ACM Press, New York (2000)"},{"issue":"3","key":"10_CR28","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1023\/A:1010060322135","volume":"2","author":"A. Omicini","year":"1999","unstructured":"Omicini, A., Zambonelli, F.: Coordination for internet application development. Autonomous Agents and Multi-agent Systems\u00a02(3), 251\u2013269 (1999); Special Issue on Coordination Mechanisms and Patterns for Web Agents","journal-title":"Autonomous Agents and Multi-agent Systems"},{"key":"10_CR29","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1145\/302405.302659","volume-title":"Proc. of the 21st Int. Conference on Software Engineering (ICSE 1999)","author":"G. Picco","year":"1999","unstructured":"Picco, G., Murphy, A., Roman, G.-C.: LIME: Linda Meets Mobility. In: Garlan, D. (ed.) Proc. of the 21st Int. Conference on Software Engineering (ICSE 1999), pp. 368\u2013377. ACM Press, New York (1999)"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Riely, J., Hennessy, M.: Trust and partial typing in open systems of mobile agents. In: Proceedings of POPL, pp. 93\u2013104 (1999)","DOI":"10.1145\/292540.292551"},{"issue":"3","key":"10_CR31","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1023\/A:1019263731139","volume":"1","author":"A. Rowstron","year":"1998","unstructured":"Rowstron, A.: WCL: A web co-ordination language. World Wide Web Journal\u00a01(3), 167\u2013179 (1998)","journal-title":"World Wide Web Journal"},{"key":"10_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/3-540-44577-3_6","volume-title":"Informatics","author":"F.B. Schneider","year":"2001","unstructured":"Schneider, F.B., Morrisett, G., Harper, R.: A language-based approach to security. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol.\u00a02000, pp. 86\u2013101. Springer, Heidelberg (2001)"},{"key":"10_CR33","unstructured":"Sun Microsystems. Javaspace specification (1999), available at \n                      http:\/\/java.sun.com\/"},{"key":"10_CR34","unstructured":"Vitek, J., Bryce, C., Oriol, M.: Coordinationg processes with secure spaces. Science of Computer Programming (2002)"},{"key":"10_CR35","series-title":"Lecture Notes in Computer Science","volume-title":"Secure Internet Programming","year":"1999","unstructured":"Vitek, J., Jensen, C. (eds.): Secure Internet Programming. LNCS, vol.\u00a01603. Springer, Heidelberg (1999)"},{"issue":"3","key":"10_CR36","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1147\/sj.373.0454","volume":"37","author":"P. Wyckoff","year":"1998","unstructured":"Wyckoff, P., McLaughry, S., Lehman, T., Ford, D.: TSpaces. IBM Systems Journal\u00a037(3), 454\u2013474 (1998)","journal-title":"IBM Systems Journal"},{"key":"10_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/3-540-48320-9_38","volume-title":"CONCUR\u201999. Concurrency Theory","author":"N. Yoshida","year":"1999","unstructured":"Yoshida, N., Hennessy, M.: Subtyping and locality in distributed higher order processes. In: Baeten, J.C.M., Mauw, S. (eds.) CONCUR 1999. LNCS, vol.\u00a01664, pp. 557\u2013572. Springer, Heidelberg (1999)"},{"key":"10_CR38","first-page":"334","volume-title":"Proceedings of LICS 2000","author":"N. Yoshida","year":"2000","unstructured":"Yoshida, N., Hennessy, M.: Assigning types to processes. In: Proceedings of LICS 2000, pp. 334\u2013348. IEEE Computer Society Press, Los Alamitos (2000)"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39881-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T16:03:11Z","timestamp":1714406591000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-39881-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208877","9783540398813"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39881-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}