{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:13:33Z","timestamp":1725491613459},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744061"},{"type":"electronic","value":"9783540744078"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74407-8_24","type":"book-chapter","created":{"date-parts":[[2007,8,18]],"date-time":"2007-08-18T14:30:48Z","timestamp":1187447448000},"page":"349-363","source":"Crossref","is-referenced-by-count":0,"title":["Mobility Control Via Passports"],"prefix":"10.1007","author":[{"given":"Samuel","family":"Hym","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511611063","volume-title":"A Distributed Pi-calculus","author":"M. Hennessy","year":"2007","unstructured":"Hennessy, M.: A Distributed Pi-calculus. Cambridge University Press, Cambridge (2007)"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1145\/325694.325741","volume-title":"27th Annual Symposium on Principles of Programming Languages (POPL)","author":"F. Levi","year":"2000","unstructured":"Levi, F., Sangiorgi, D.: Controlling interference in ambients. In: 27th Annual Symposium on Principles of Programming Languages (POPL), Boston, MA, pp. 352\u2013364. ACM Press, New York (2000)"},{"issue":"2","key":"24_CR3","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/1119479.1119482","volume":"28","author":"M. Merro","year":"2006","unstructured":"Merro, M., Hennessy, M.: A bisimulation-based semantic theory of Safe Ambients. ACM Transactions on Programming Languages and Systems\u00a028(2), 290\u2013330 (2006)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/3-540-36206-1_8","volume-title":"FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science","author":"M. Bugliesi","year":"2002","unstructured":"Bugliesi, M., Crafa, S., Merro, M., Sassone, V.: Communication interference in mobile boxed ambients. In: Agrawal, M., Seth, A.K. (eds.) FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science. LNCS, vol.\u00a02556, pp. 71\u201384. Springer, Heidelberg (2002)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/3-540-36206-1_9","volume-title":"FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science","author":"G. Castagna","year":"2002","unstructured":"Castagna, G., Nardelli, F.Z.: The Seal calculus revisited: Contextual equivalence and bisimilarity. In: Agrawal, M., Seth, A.K. (eds.) FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science. LNCS, vol.\u00a02556, pp. 85\u201396. Springer, Heidelberg (2002)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-540-31794-4_9","volume-title":"Global Computing","author":"A. Schmitt","year":"2005","unstructured":"Schmitt, A., Stefani, J.-B.: The Kell calculus: A family of higher-order distributed process calculi. In: Priami, C., Quaglia, P. (eds.) GC 2004. LNCS, vol.\u00a03267, pp. 146\u2013178. Springer, Heidelberg (2005)"},{"key":"24_CR7","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/j.tcs.2003.12.024","volume":"322","author":"M. Hennessy","year":"2003","unstructured":"Hennessy, M., Merro, M., Rathke, J.: Towards a behavioural theory of access and mobility control in distributed systems. Theoretical Computer Science\u00a0322, 615\u2013669 (2003)","journal-title":"Theoretical Computer Science"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/3-540-44929-9_25","volume-title":"Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics","author":"L. Cardelli","year":"2000","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Ambient groups and mobility types. In: Watanabe, O., Hagiya, M., Ito, T., van Leeuwen, J., Mosses, P.D. (eds.) TCS 2000. LNCS, vol.\u00a01872, pp. 333\u2013347. Springer, Heidelberg (2000)"},{"issue":"4-5","key":"24_CR9","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s00236-005-0178-y","volume":"42","author":"M. Hennessy","year":"2005","unstructured":"Hennessy, M., Rathke, J., Yoshida, N.: SafeDpi: a language for controlling mobile code. Acta Informatica\u00a042(4-5), 227\u2013290 (2005)","journal-title":"Acta Informatica"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Yoshida, N.: Channel dependent types for higher-order mobile processes (September 2004)","DOI":"10.1145\/964001.964014"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/11580850_7","volume-title":"Trustworthy Global Computing","author":"F. Martins","year":"2005","unstructured":"Martins, F., Vasconcelos, V.T.: History-based access control for distributed processes. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, vol.\u00a03705, pp. 98\u2013115. Springer, Heidelberg (2005)"},{"key":"24_CR12","volume-title":"Thirteenth Annual Symposium on Logic in Computer Science (LICS) (Indiana)","author":"M. Boreale","year":"1998","unstructured":"Boreale, M., Sangiorgi, D.: Bisimulation in name-passing calculi without matching. In: Thirteenth Annual Symposium on Logic in Computer Science (LICS) (Indiana), IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"24_CR13","unstructured":"Hym, S.: Mobility control via passports (preprint 2007), Available on https:\/\/hal.archives-ouvertes.fr\/hal-00140527 , http:\/\/www.pps.jussieu.fr\/~hym\/r\/"},{"key":"24_CR14","unstructured":"Hym, S.: Typage et contr\u00f4le de la mobilit\u00e9. PhD thesis, Universit\u00e9 Paris Diderot \u2013 Paris 7 (December 2006)"},{"key":"24_CR15","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1006\/inco.2001.3089","volume":"173","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. Information and Computation\u00a0173, 82\u2013120 (2002)","journal-title":"Information and Computation"},{"issue":"3","key":"24_CR16","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.tcs.2006.12.017","volume":"373","author":"S. Hym","year":"2007","unstructured":"Hym, S., Hennessy, M.: Adding recursion to Dpi. Theoretical Computer Science\u00a0373(3), 182\u2013212 (2007)","journal-title":"Theoretical Computer Science"},{"key":"24_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/3-540-55719-9_114","volume-title":"Automata, Languages and Programming","author":"R. Milner","year":"1992","unstructured":"Milner, R., Sangiorgi, D.: Barbed bisimulation. In: Kuich, W. (ed.) Automata, Languages and Programming. LNCS, vol.\u00a0623, pp. 685\u2013695. Springer, Heidelberg (1992)"},{"key":"24_CR18","unstructured":"Crary, K., Harper, R., Pfenning, F., Pierce, B.C., Weirich, S., Zdancewic, S.: Manifest security for distributed information. White paper (March 2006)"}],"container-title":["Lecture Notes in Computer Science","CONCUR 2007 \u2013 Concurrency Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74407-8_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:25:03Z","timestamp":1619519103000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74407-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744061","9783540744078"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74407-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}