{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T05:35:24Z","timestamp":1733981724891,"version":"3.30.2"},"reference-count":18,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2002,4,1]],"date-time":"2002-04-01T00:00:00Z","timestamp":1017619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Languages, Systems &amp; Structures"],"published-print":{"date-parts":[[2002,4]]},"DOI":"10.1016\/s0096-0551(02)00008-5","type":"journal-article","created":{"date-parts":[[2003,2,4]],"date-time":"2003-02-04T15:48:55Z","timestamp":1044373735000},"page":"61-99","source":"Crossref","is-referenced-by-count":1,"title":["Behavioural typing for safe ambients"],"prefix":"10.1016","volume":"28","author":[{"given":"Michele","family":"Bugliesi","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Castagna","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0096-0551(02)00008-5_BIB1","doi-asserted-by":"crossref","unstructured":"Cardelli L, Gordon A. Mobile Ambients. In: Proceedings of F0SSaCS\u201998, Lecture Notes in Computer Science, No. 1378. Berlin: Springer, 1998. p. 140\u201355.","DOI":"10.1007\/BFb0053547"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB2","doi-asserted-by":"crossref","unstructured":"Levi F, Sangiorgi D. Controlling interference in Ambients. In: POPL \u201900. New York: ACM Press, 2000. p. 352\u201364.","DOI":"10.1145\/325694.325741"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB3","doi-asserted-by":"crossref","unstructured":"Bugliesi M, Castagna G. Secure safe ambients. In: Proceedings of the 28th ACM Symposium on Principles of Programming Languages, London, New York: ACM Press, 2001. p. 222\u201335.","DOI":"10.1145\/360204.360223"},{"year":"1999","series-title":"Inside Java 2 platform security","author":"Li","key":"10.1016\/S0096-0551(02)00008-5_BIB4"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB5","doi-asserted-by":"crossref","unstructured":"Sewell P, Vitek J. Secure composition of untrusted code: wrappers and causality types. In: 13th IEEE Computer Security Foundations Workshop, 2000.","DOI":"10.1109\/CSFW.2000.856943"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB6","unstructured":"Brewer DFC, Nash MJ. The chinese wall security policy. In: Proceedings of IEEE Symposium on Security and Privacy, 1982. p. 206\u201314."},{"issue":"4","key":"10.1016\/S0096-0551(02)00008-5_BIB7","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1145\/356678.356680","article-title":"Fault tolerant operating systems","volume":"8","author":"Denning","year":"1976","journal-title":"ACM Computing Surveys"},{"year":"1997","series-title":"The Java virtual machine specification. Java series","author":"Lindholm","key":"10.1016\/S0096-0551(02)00008-5_BIB8"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB9","doi-asserted-by":"crossref","unstructured":"Necula GC. Proof carrying code. In: 24th Annual ACM Symposium on Principles of Programming Languages. New York: ACM Press, 1997.","DOI":"10.1145\/263699.263712"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB10","doi-asserted-by":"crossref","unstructured":"Cardelli L, Gordon A. Types for Mobile Ambients. In: Proceedings of POPL \u201999. New York: ACM Press, 1999. p. 79\u201392.","DOI":"10.1145\/292540.292550"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB11","doi-asserted-by":"crossref","unstructured":"Cardelli L, Ghelli G, Gordon A. Mobility types for Mobile Ambients. In: Proceedings of ICALP \u201999, Lecture Notes in Computer Science, No. 1644. Berlin: Springer, 1999. p. 230\u20139.","DOI":"10.1007\/3-540-48523-6_20"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB12","doi-asserted-by":"crossref","unstructured":"Amtoft T, Kfoury AJ, Pericas-Geertsen SM. What are polymorphically-typed ambients? In: ESOP 2001, Lecture Notes in Computer Science, vol. 2028. Berlin: Springer, 2001. p. 206\u201320.","DOI":"10.1007\/3-540-45309-1_14"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB13","doi-asserted-by":"crossref","unstructured":"Cardelli L, Ghelli G, Gordon AD. Ambient groups and mobility types. In: International Conference IFIP TCS, Lecture Notes in Computer Science, No. 1872. Berlin: Springer, 2000. p. 333\u201347.","DOI":"10.1007\/3-540-44929-9_25"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB14","doi-asserted-by":"crossref","unstructured":"Nielson F, Riis Nielson H, Hansen RR, Jensen JG. Validating firewalls in mobile ambients. In: Proceedings of CONCUR \u201999, Lecture Notes in Computer Science, No. 1664. Berlin: Springer, 1999. p. 463\u201377.","DOI":"10.1007\/3-540-48320-9_32"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB15","doi-asserted-by":"crossref","unstructured":"Nielson HR, Nielson F. Shape analysis for mobile ambients. In: POPL \u201900. New York: ACM Press, 2000. p. 142\u201354.","DOI":"10.1145\/325694.325711"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB16","doi-asserted-by":"crossref","unstructured":"Feret J. Abstract interpretation-based static analysis of mobile ambients. In: Eighth International Static Analysis Symposium (SAS \u201901), Lecture Notes in Computer Science, No. 2126. Berlin: Springer, 2001.","DOI":"10.1007\/3-540-47764-0_24"},{"key":"10.1016\/S0096-0551(02)00008-5_BIB17","unstructured":"Levi F, Maffeis S. An abstract interpretation framework to analyse mobile ambients. In: Eighth International Static Analysis Symposium (SAS \u201901), Lecture Notes in Computer Science, No. 2126. Berlin: Springer, 2001."},{"key":"10.1016\/S0096-0551(02)00008-5_BIB18","doi-asserted-by":"crossref","unstructured":"Nielson HR, Seidl H. Control-flow analysis in cubic time. In: Proceedings of ESOP \u201901, Lecture Notes in Computer Science, No. 2028. Berlin: Springer, 2001. p. 252\u201368.","DOI":"10.1007\/3-540-45309-1_17"}],"container-title":["Computer Languages, Systems &amp; Structures"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096055102000085?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096055102000085?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,2]],"date-time":"2019-04-02T09:23:40Z","timestamp":1554197020000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0096055102000085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,4]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2002,4]]}},"alternative-id":["S0096055102000085"],"URL":"https:\/\/doi.org\/10.1016\/s0096-0551(02)00008-5","relation":{},"ISSN":["1477-8424"],"issn-type":[{"type":"print","value":"1477-8424"}],"subject":[],"published":{"date-parts":[[2002,4]]}}}