{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:15:23Z","timestamp":1725495323945},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540769279"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76929-3_27","type":"book-chapter","created":{"date-parts":[[2007,11,17]],"date-time":"2007-11-17T03:01:14Z","timestamp":1195268474000},"page":"282-296","source":"Crossref","is-referenced-by-count":0,"title":["Static vs Dynamic Typing for Access Control in Pi-Calculus"],"prefix":"10.1007","author":[{"given":"Michele","family":"Bugliesi","sequence":"first","affiliation":[]},{"given":"Damiano","family":"Macedonio","sequence":"additional","affiliation":[]},{"given":"Sabina","family":"Rossi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1145\/360204.360213","volume-title":"POPL","author":"M. Abadi","year":"2001","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: POPL, pp. 104\u2013115. ACM Press, New York (2001)"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11580850_3","volume-title":"Trustworthy Global Computing","author":"M. Bugliesi","year":"2005","unstructured":"Bugliesi, M., Giunti, M.: Typed processes in untyped contexts. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, vol.\u00a03705, pp. 19\u201332. Springer, Heidelberg (2005)"},{"key":"27_CR3","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/1190216.1190253","volume-title":"POPL","author":"M. Bugliesi","year":"2007","unstructured":"Bugliesi, M., Giunti, M.: Secure implementations of typed channel abstractions. In: POPL, pp. 251\u2013262. ACM Press, New York (2007)"},{"key":"27_CR4","unstructured":"Bugliesi, M., Macedonio, D., Rossi, S.: Static vs dynamic typing for access control in pi-calculus (extended version). Technical Report CS-2007-5, Dipartimento di informatica, Universit\u00e0 Ca\u2019 Foscari di Venezia (2007), Also available at: http:\/\/www.dsi.unive.it\/~mace\/ASIAN07.pdf"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11601548_20","volume-title":"Processes, Terms and Cycles: Steps on the Road to Infinity","author":"M. Coppo","year":"2005","unstructured":"Coppo, M., Cozzi, F., Dezani-Ciancaglini, M., Giovannetti, E., Pugliese, R.: A mobility calculus with local and dependent types. In: Middeldorp, A., van Oostrom, V., van Raamsdonk, F., de Vrijer, R. (eds.) Processes, Terms and Cycles: Steps on the Road to Infinity. LNCS, vol.\u00a03838, Springer, Heidelberg (2005)"},{"key":"27_CR6","first-page":"577","volume-title":"IFIP TCS","author":"M. Coppo","year":"2004","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Giovannetti, E., Pugliese, R.: Dynamic and local typing for mobile ambients. In: IFIP TCS, pp. 577\u2013590. Kluwer Academic Publishers, Dordrecht (2004)"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-45061-0_11","volume-title":"Automata, Languages and Programming","author":"D. Gorla","year":"2003","unstructured":"Gorla, D., Pugliese, R.: Resource access and mobility control with dynamic privileges acquisition. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol.\u00a02719, pp. 119\u2013132. Springer, Heidelberg (2003)"},{"key":"27_CR8","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511611063","volume-title":"A Distributed Pi-Calculus","author":"M. Hennessy","year":"2007","unstructured":"Hennessy, M.: A Distributed Pi-Calculus. Cambridge University Press, Cambridge (2007)"},{"issue":"5","key":"27_CR9","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1017\/S0960129504004281","volume":"14","author":"M. Hennessy","year":"2004","unstructured":"Hennessy, M., Rathke, J.: Typed behavioural equivalences for processes in the presence of subtyping. Mathematical Structures in Computer Science\u00a014(5), 651\u2013684 (2004)","journal-title":"Mathematical Structures in Computer Science"},{"issue":"1","key":"27_CR10","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1006\/inco.2001.3089","volume":"173","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. Information and Computation\u00a0173(1), 82\u2013120 (2002)","journal-title":"Information and Computation"},{"issue":"1","key":"27_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.2000.2868","volume":"163","author":"U. Nestmann","year":"2000","unstructured":"Nestmann, U., Pierce, B.C.: Decoding choice encodings. Information and Computation\u00a0163(1), 1\u201359 (2000)","journal-title":"Information and Computation"},{"issue":"1","key":"27_CR12","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0304-3975(99)00232-7","volume":"240","author":"R.D. Nicola","year":"2000","unstructured":"Nicola, R.D., Ferrari, G.L., Pugliese, R., Venneri, B.: Types for access control. Theoretical Computer Science\u00a0240(1), 215\u2013254 (2000)","journal-title":"Theoretical Computer Science"},{"issue":"5","key":"27_CR13","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1017\/S096012950007002X","volume":"6","author":"B.C. Pierce","year":"1996","unstructured":"Pierce, B.C., Sangiorgi, D.: Typing and subtyping for mobile processes. Mathematical Structures in Computer Science\u00a06(5), 409\u2013453 (1996)","journal-title":"Mathematical Structures in Computer Science"},{"issue":"3","key":"27_CR14","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1145\/337244.337261","volume":"47","author":"B.C. Pierce","year":"2000","unstructured":"Pierce, B.C., Sangiorgi, D.: Behavioral equivalence in the polymorphic pi-calculus. Journal of the ACM\u00a047(3), 531\u2013584 (2000)","journal-title":"Journal of the ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Science \u2013 ASIAN 2007. Computer and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76929-3_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T19:47:25Z","timestamp":1684093645000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76929-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540769279"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76929-3_27","relation":{},"subject":[]}}