{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T15:22:20Z","timestamp":1720624940457},"reference-count":27,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2003,4,1]],"date-time":"2003-04-01T00:00:00Z","timestamp":1049155200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":3772,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2003,4]]},"DOI":"10.1016\/s1571-0661(04)81010-7","type":"journal-article","created":{"date-parts":[[2004,9,29]],"date-time":"2004-09-29T12:47:47Z","timestamp":1096462067000},"page":"123-143","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Information Leakage Detection in Boundary Ambients1 1Partially supported by MIUR Projects \u201cInterpretazione Astratta, Type Systems e Analisi Control-Flow\u201d and \u201cModelli formali per la sicurezza\u201d, and the EU Contract IST-2001-32617 \u201cModels and Types for Security in Mobile Distributed Systems\u201d."],"prefix":"10.1016","volume":"78","author":[{"given":"Chiara","family":"Braghin","sequence":"first","affiliation":[]},{"given":"Agostino","family":"Cortesi","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Focardi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB1","first-page":"267","article-title":"A Bisimulation Method for Cryptographic Protocols","volume":"5","author":"Abadi","year":"1998","journal-title":"Nordic Journal of Computing"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB2","author":"Bell","year":"1976","journal-title":"\u201cSecure Computer Systems: Unified Exposition and Multics Interpretation\u201d, ESD-TR-75-306, MITRE MTR-2997"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB3","doi-asserted-by":"crossref","unstructured":"Barghin C., A. Cortesi, S. Filippone, R. Focardi, F. L. Luccio and C. Piazza, Banana, a Tool for Boundary Ambients Nesting AN Alysis, in: Proc. of The 9th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'03), 2003.","DOI":"10.1007\/3-540-36577-X_32"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB4","doi-asserted-by":"crossref","unstructured":"Braghin C., A. Cortesi and R. Focardi, Control Flow Analysis of Mobile Ambients with Security Boundaries, in: B. Jacobs and A. Rensink, editors, Proc. of Fifth IFIP International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS'02) (2002), pp. 197\u2013212.","DOI":"10.1007\/978-0-387-35496-5_14"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB5","unstructured":"Braghin, C.A. Cortesi and R. Focardi, Freshness Analysis in Security Protocols, in Proc. of 14th Nordic Workshop on Programming Theory (NWPT'02), 2002, pp. 30\u201333."},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB6","first-page":"101","article-title":"Security Boundaries in Mobile Ambients","volume":"28","author":"Braghin","year":"2002","journal-title":"Computer Languages"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB7","unstructured":"Braghin, C.A. Cortesi, R. Focardi and S. van Bakel, Boundary Inference for Enforcing Security Policies in Mobile Ambients, in: Proc. of The 2nd IFIP International Conference on Theoretical Computer Science (TCS'02) (2002), pp. 383\u2013395."},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB8","doi-asserted-by":"crossref","unstructured":"Bugliesi M. and G. Castagna, Secure Safe Ambients, in: Proc. 28th ACM Symposium on Principles of Programming Languages (POPL'01) (2001), pp. 222\u2013235.","DOI":"10.1145\/360204.360223"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB9","first-page":"61","article-title":"Behavioural Typing of Safe Ambients","volume":"28","author":"Bugliesi","year":"2002","journal-title":"Computer Languages"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB10","doi-asserted-by":"crossref","unstructured":"Bugliesi M., G. Castagna and S. Crafa, Boxed Ambients, in: Proc. of the 4th Int. Conference on Theoretical Aspects of Computer Science (TACS'01), LNCS 2215 (2001), pp. 38\u201363.","DOI":"10.1007\/3-540-45500-0_2"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB11","doi-asserted-by":"crossref","unstructured":"Cardelli L., G. Ghelli and A. D. Gordon, Ambient Groups and Mobility Types, in: J. van Leeuwen, O. Watanabe, M. Hagiya, P. D. Mosses and T. Ito, editors, Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics, Proceedings of the International IFIP Conference TCS 2000 (Sendai, Japan), LNCS 1872, IFIP (2000), pp. 333\u2013347.","DOI":"10.1007\/3-540-44929-9_25"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB12","doi-asserted-by":"crossref","unstructured":"Cardelli L. and A. D. Gordon, Mobile Ambients in: M. Nivat, editor, Proceedings of Foundations of Software Science and Computation Structures (FoSSaCS), LNCS 1378, Springer-Verlag, Berlin, Germany, 1998 pp. 140\u2013155.","DOI":"10.1016\/S1571-0661(05)80699-1"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB13","unstructured":"Cortesi A. and R. Focardi, Information Flow Security in Mobile Ambients, in: Proc. of International Workshop on Concurrency and Coordination (ConCoord'01), Electronic Notes on Theoretical Computer Science, ENTCS 54 (2001)."},{"issue":"3","key":"10.1016\/S1571-0661(04)81010-7_NEWBIB14","article-title":"Information Flow Security for Boxed Ambients","volume":"66","author":"Crafa","year":"2002","journal-title":"F-WAN: Int. Workshop on Foundations of Wide Area Networks number"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB15","unstructured":"Degano, P., F. Levi and C. Bodei, Safe Ambients: Control Flow Analysis and Security, in: J. He and M. Sato, editors, Proc. of Advances in Computing Science\u2013ASIAN'00 (6th Asian Computing Science Conference, Penang, Malaysia), LNCS 1961 (2000), pp. 199\u2013214."},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB16","unstructured":"Dezani-Ciancaglini M. and I. Salvo, Security Tyes for Mobile safe Ambients, in: J. He and M. Sato, editors, Proc. of Advances in Computing Science\u2013ASIAN'00 (6th Asian Computing Science Conference, Penang, Malaysia, LNCS 1961 (2000), pp. 215\u2013236."},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB17","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","article-title":"A Classification of Security Properties for Process Algebras","volume":"3","author":"Focardi","year":"1995","journal-title":"Journal of Computer Security"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB18","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1109\/32.629493","article-title":"The Compositional Security Checker: A Tool for the verification of Information Flow Security Properties","volume":"23","author":"Focardi","year":"1997","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB19","first-page":"331","article-title":"Classification of security properties (part i: Information flow), in: Foundations of Security Analysis and Design\u2013Tutorial Lectures","volume":"2171","author":"Focardi","year":"2001","journal-title":"LNCS"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB20","doi-asserted-by":"crossref","unstructured":"Focardi R., R. Gorrieri and F. Martinelli, Information Flow Analysis in a Discrete-Time Process Algebra, in: Proc. of The 13th Computer Security Foundations Workshop (CSFW) (2000), pp. 170\u2013184.","DOI":"10.1109\/CSFW.2000.856935"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB21","unstructured":"Goguen J. and J. Meseguer, Security Policies and Security Models, in: Proc. of Symposium on Security and Privacy (1992), pp. 11\u201320."},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB22","doi-asserted-by":"crossref","unstructured":"Gordon, A. D. and L. Cardelli, Equational Properties of Mobile Ambients, in: W. Thomas, editor, Proc. of the Second International Conference on Foundations of Software Science and Computation Structures (FoSSaCS '99), Held at Part of the Joint European Conferences on Theory and Practice of Software (ETAPS'99), (Amsterdam, The Netherlands, April 1999), LNCS 1578 (1999), pp. 212\u2013226.","DOI":"10.1007\/3-540-49019-1_15"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB23","unstructured":"Hansen, R. R., J. G. Jensen, F. Nielson and H. R. Nielson, Abstract Interpretation of Mobile Ambients, in: Cortesi and G. File', editors, Proc. of Static Analysis Symposium (SAS'99), number 1694 in Lecture Notes in Computer Science (1999), pp. 134\u2013148."},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB24","unstructured":"Levi F. and C. Bodei, Security Analysis for Mobile Ambients, in: Electronic Proc. of IFIP WG 1.7. Workshop on Issues on the Theory of Security (WITS'00), Geneve 2000."},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB25","doi-asserted-by":"crossref","unstructured":"Levi F. and D. Sangiorgi, Controlling Interference in Ambients, in: Proc. 28th ACM Symposium on Principles of Programming Languages (POPL'01), 2000, pp. 352\u2013364.","DOI":"10.1145\/325694.325741"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB26","series-title":"\u201cPrinciples of Program Analysis\u201d","author":"Nielson","year":"1999"},{"key":"10.1016\/S1571-0661(04)81010-7_NEWBIB27","doi-asserted-by":"crossref","unstructured":"Smith G. and D. Volpano, Secure Information Flow in a Multi-Threaded Imperative Language, in: Conference Record of POPL 98: The 25TH ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, California, New York, NY 1998, PP. 355\u2013364.","DOI":"10.1145\/268946.268975"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104810107?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104810107?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,3]],"date-time":"2019-02-03T05:53:54Z","timestamp":1549173234000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104810107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,4]]},"references-count":27,"alternative-id":["S1571066104810107"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)81010-7","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2003,4]]}}}