{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T18:08:48Z","timestamp":1673201328239},"reference-count":20,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2002,4,1]],"date-time":"2002-04-01T00:00:00Z","timestamp":1017619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Languages, Systems &amp; Structures"],"published-print":{"date-parts":[[2002,4]]},"DOI":"10.1016\/s0096-0551(02)00009-7","type":"journal-article","created":{"date-parts":[[2003,2,4]],"date-time":"2003-02-04T20:48:55Z","timestamp":1044391735000},"page":"101-127","source":"Crossref","is-referenced-by-count":6,"title":["Security boundaries in mobile ambients"],"prefix":"10.1016","volume":"28","author":[{"given":"Chiara","family":"Braghin","sequence":"first","affiliation":[]},{"given":"Agostino","family":"Cortesi","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Focardi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0096-0551(02)00009-7_BIB1","series-title":"Proceedings of Fifth IFIP International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS \u201902)","first-page":"197","article-title":"Control flow analysis of mobile ambients with security boundaries","author":"Braghin","year":"2002"},{"key":"10.1016\/S0096-0551(02)00009-7_BIB2","unstructured":"Cortesi A, Focardi R. Information flow security in mobile ambients. In: Proceedings of International Workshop on Concurrency and Coordination (ConCoord \u201901), Electronic Notes on Theoretical Computer Science, ENTCS, vol. 54. Amsterdam: Elsevier, July 6\u20138, 2001."},{"key":"10.1016\/S0096-0551(02)00009-7_BIB3","doi-asserted-by":"crossref","unstructured":"Cardelli L, Gordon AD. Mobile ambients. In: Nivat M, editor. Proceedings of Foundations of Software Science and Computation Structures (FoSSaCS), Lecture Notes in Computer Science, vol. 1378, Berlin, Germany, Springer, March 1998, p. 140\u201355.","DOI":"10.1007\/BFb0053547"},{"key":"10.1016\/S0096-0551(02)00009-7_BIB4","doi-asserted-by":"crossref","unstructured":"Bodei C, Degano P, Nielson F, Nielson HR. Static analysis of processes for No read-up and No write-down. In: Proceedings of FoSSaCS \u201999, Lecture Notes in Computer Science, No. 1578. Berlin: Springer, 1999. p. 120\u201334.","DOI":"10.1007\/3-540-49019-1_9"},{"key":"10.1016\/S0096-0551(02)00009-7_BIB5","doi-asserted-by":"crossref","unstructured":"Focardi R, Gorrieri G, Martinelli F. Information flow analysis in a discrete-time process algebra. In: Proceedings of the 13th Computer Security Foundations Workshop (CSFW). Silver Spring, MD: IEEE Computer Society Press, 2000. p. 170\u201384.","DOI":"10.1109\/CSFW.2000.856935"},{"issue":"1","key":"10.1016\/S0096-0551(02)00009-7_BIB6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","article-title":"A classification of security properties for process algebras","volume":"3","author":"Focardi","year":"1995","journal-title":"Journal of Computer Security"},{"issue":"9","key":"10.1016\/S0096-0551(02)00009-7_BIB7","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1109\/32.629493","article-title":"The compositional security checker","volume":"23","author":"Focardi","year":"1997","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0096-0551(02)00009-7_BIB8","unstructured":"Hennessy M, Riely J. Information flow vs. resource access in the asynchronous pi-calculus. In: Montanari U, Rolim J, Welzl E, editors. Proceedings of the International Colloquium on Automata Languages and Programming, Lecture Notes in Computer Science, vol. 1853. Berlin, Geneva: Springer, August 2000, p. 415\u201327."},{"key":"10.1016\/S0096-0551(02)00009-7_BIB9","doi-asserted-by":"crossref","unstructured":"Smith G, Volpano D. Secure information flow in a multi-threaded imperative language. In: Conference Record of POPL 98: The 25TH ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, California, New York, NY, 1998. p. 355\u201364.","DOI":"10.1145\/268946.268975"},{"key":"10.1016\/S0096-0551(02)00009-7_BIB10","unstructured":"Bugliesi M, Castagna G, Crafa S. Boxed ambients. In: Proceedings of the Fourth International Conference on Theoretical Aspects of Computer Science (TACS \u201901), Lecture Notes in Computer Science, vol. 2215. Berlin: Springer, 2000. p. 38\u201363."},{"key":"10.1016\/S0096-0551(02)00009-7_BIB11","doi-asserted-by":"crossref","unstructured":"Levi F, Sangiorgi D. Controlling interference in ambients. In: Proceedings of the 28th ACM Symposium on Principles of Programming Languages (POPL \u201901), 2000. p. 352\u201364.","DOI":"10.1145\/325694.325741"},{"key":"10.1016\/S0096-0551(02)00009-7_BIB12","series-title":"Proceedings of Static Analysis Symposium (SAS \u201999)","first-page":"134","article-title":"Abstract interpretation of mobile ambients","volume":"No. 1694","author":"Hansen","year":"1999"},{"key":"10.1016\/S0096-0551(02)00009-7_BIB13","doi-asserted-by":"crossref","unstructured":"Nielson F, Hansen RR, Nielson HR. Abstract interpretation of mobile ambients. In: Cortesi A, File\u2019 G, editors. Science of computer programming (Special Issue on Static Analysis), to appear.","DOI":"10.1016\/S0167-6423(02)00131-4"},{"key":"10.1016\/S0096-0551(02)00009-7_BIB14","doi-asserted-by":"crossref","unstructured":"Bodei C, Degano P, Nielson F, Nielson HR. Control flow analysis for the \u03c0-calculus. In: Proceedings of CONCUR \u201998, Lecture Notes in Computer Science, No. 1466. Berlin: Springer, 1998. p. 84\u201398.","DOI":"10.1007\/BFb0055617"},{"key":"10.1016\/S0096-0551(02)00009-7_BIB15","unstructured":"Cardelli L, Ghelli G, Gordon AD. Ambient groups and mobility types. In: van Leeuwen J, Watanabe O, Hagiya M, Mosses PD, Ito T, editors. Theoretical computer science: exploring new frontiers of theoretical informatics. Proceedings of the International IFIP Conference TCS 2000 (Sendai, Japan), Lecture Notes in Computer Science, vol. 1872. New York, Berlin: IFIP, Springer, August 2000. p. 333\u201347."},{"key":"10.1016\/S0096-0551(02)00009-7_BIB16","unstructured":"Dezani-Ciancaglini M, Salvo I. Security types for mobile safe ambients. In: He J, Sato M, editors. Proceedings of Advances in Computing Science\u2014ASIAN \u201900 (Sixth Asian Computing Science Conference, Penang, Malaysia), Lecture Notes in Computer Science, vol. 1961, Berlin, Springer, December 2000, p. 215\u201336."},{"key":"10.1016\/S0096-0551(02)00009-7_BIB17","unstructured":"Degano P, Levi F, Bodei C. Safe ambients: control flow analysis and security. In: He J, Sato M, editors. Proceedings of Advances in Computing Science\u2014ASIAN \u201900 (Sixth Asian Computing Science Conference, Penang, Malaysia), Lecture Notes in Computer Science, vol. 1961, Berlin, Springer, December 2000, p. 199\u2013214."},{"key":"10.1016\/S0096-0551(02)00009-7_BIB18","doi-asserted-by":"crossref","unstructured":"Bugliesi M, Castagna G. Secure safe ambients. In: Proceedings of 28th ACM Symposium on Principles of Programming Languages (POPL \u201901). New York: ACM Press, 2001. p. 222\u201335.","DOI":"10.1145\/360204.360223"},{"key":"10.1016\/S0096-0551(02)00009-7_BIB19","doi-asserted-by":"crossref","unstructured":"Bugliesi M, Castagna G. Behavioural typing of safe ambients. Journal of Computer Security, this issue.","DOI":"10.1016\/S0096-0551(02)00008-5"},{"key":"10.1016\/S0096-0551(02)00009-7_BIB20","unstructured":"Levi F, Bodei C. Security analysis for mobile ambients. In: Electronic Proceedings of IFIP WG 1.7 Workshop on Issues on the Theory of Security (WITS \u201900), Geneve, 2000."}],"container-title":["Computer Languages, Systems &amp; Structures"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096055102000097?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096055102000097?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,2]],"date-time":"2019-04-02T13:23:39Z","timestamp":1554211419000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0096055102000097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,4]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2002,4]]}},"alternative-id":["S0096055102000097"],"URL":"https:\/\/doi.org\/10.1016\/s0096-0551(02)00009-7","relation":{},"ISSN":["1477-8424"],"issn-type":[{"value":"1477-8424","type":"print"}],"subject":[],"published":{"date-parts":[[2002,4]]}}}