{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:15:05Z","timestamp":1759637705584,"version":"3.38.0"},"reference-count":69,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2016,5,30]],"date-time":"2016-05-30T00:00:00Z","timestamp":1464566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2016,8,16]]},"abstract":"<jats:p> Adaptive systems improve their efficiency by modifying their behaviour to respond to changes in their operational environment. Also, security must adapt to these changes and policy enforcement becomes dependent on the dynamic contexts. We study these issues within [Formula: see text], (the core of) an adaptive declarative language proposed recently. A main characteristic of [Formula: see text] is to have two components: a logical one for handling the context and a functional one for computing. We extend this language with security policies that are expressed in logical terms. They are of two different kinds: context and application policies. The first, unknown a priori to an application, protect the context from unwanted changes. The others protect the applications from malicious actions of the context, can be nested and can be activated and deactivated according to their scope. An execution step can only occur if all the policies in force hold, under the control of an execution monitor. Beneficial to this is a type and effect system, which safely approximates the behaviour of an application, and a further static analysis, based on the computed effect. The last analysis can only be carried on at load time, when the execution context is known, and it enables us to efficiently enforce the security policies on the code execution, by instrumenting applications. The monitor is thus implemented within [Formula: see text], and it is only activated on those policies that may be infringed, and switched off otherwise. <\/jats:p>","DOI":"10.3233\/jcs-160551","type":"journal-article","created":{"date-parts":[[2016,8,23]],"date-time":"2016-08-23T14:44:11Z","timestamp":1471963451000},"page":"427-477","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":7,"title":["Context-aware security: Linguistic mechanisms and static analysis"],"prefix":"10.1177","volume":"24","author":[{"given":"Chiara","family":"Bodei","sequence":"first","affiliation":[{"name":"Dipartimento di Informatica, Universit\u00e0 di Pisa, Pisa, Italy"}]},{"given":"Pierpaolo","family":"Degano","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica, Universit\u00e0 di Pisa, Pisa, Italy"}]},{"given":"Letterio","family":"Galletta","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica, Universit\u00e0 di Pisa, Pisa, Italy"}]},{"given":"Francesco","family":"Salvatori","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica, Universit\u00e0 di Pisa, Pisa, Italy"}]}],"member":"179","published-online":{"date-parts":[[2016,5,30]]},"reference":[{"key":"ref001","unstructured":"F.\u00a0Achermann, M.\u00a0Lumpe, J.\u00a0Schneider and O.\u00a0Nierstrasz, PICCOLA \u2013 A small composition language, in: Formal Methods for Distributed Processing, Cambridge University Press, 2001."},{"key":"ref002","doi-asserted-by":"crossref","unstructured":"F.\u00a0Al-Neyadi and J.\u00a0Abawajy, Context-based e-health system access control mechanism, in: Advances in Information Security and Its Application, 2009, pp.\u00a068\u201377.","DOI":"10.1007\/978-3-642-02633-1_9"},{"key":"ref003","doi-asserted-by":"crossref","unstructured":"T.\u00a0Aotani, T.\u00a0Kamina and H.\u00a0Masuhara, Featherweight eventCJ: A core calculus for a context-oriented language with event-based per-instance layer transition, in: Proceedings of the 3rd International Workshop on Context-Oriented Programming (COP\u201911), ACM, New York, NY, USA, 2011, Article No.\u00a01, pp.\u00a01\u20137.","DOI":"10.1145\/2068736.2068737"},{"key":"ref004","doi-asserted-by":"crossref","unstructured":"T.\u00a0Aotani, T.\u00a0Kamina and H.\u00a0Masuhara, Unifying multiple layer activation mechanisms using one event sequence, in: Proceedings of the 6th International Workshop on Context-Oriented Programming, COP\u201914, ACM, New York, NY, USA, 2014, Article No.\u00a02, pp.\u00a01\u20136, ISBN 978-1-4503-2861-6.","DOI":"10.1145\/2637066.2637068"},{"key":"ref005","doi-asserted-by":"crossref","unstructured":"M.\u00a0Appeltauer, R.\u00a0Hirschfeld, M.\u00a0Haupt, J.\u00a0Lincke and M.\u00a0Perscheid, A comparison of context-oriented programming languages, in: International Workshop on Context-Oriented Programming (COP\u201909), ACM, New York, NY, USA, 2009, Article No.\u00a06, pp.\u00a01\u20136.","DOI":"10.1145\/1562112.1562118"},{"issue":"1","key":"ref006","first-page":"272","volume":"28","author":"Appeltauer M.","year":"2011","journal-title":"Computer Software"},{"key":"ref007","doi-asserted-by":"crossref","unstructured":"G.\u00a0Bai, L.\u00a0Gu, T.\u00a0Feng, Y.\u00a0Guo and X.\u00a0Chen, Context-aware usage control for Android, in: Security and Privacy in Communication Networks \u2013 Proceedings of the 6th International ICST Conference, SecureComm 2010, Singapore, 7\u20139 September 2010, LNICST, Vol.\u00a050, Springer, 2010, pp.\u00a0326\u2013343.","DOI":"10.1007\/978-3-642-16161-2_19"},{"key":"ref008","doi-asserted-by":"crossref","unstructured":"J.\u00a0Bardram, R.E.\u00a0Kj\u00e6r and M.\u00d8.\u00a0Pedersen, Context-aware user authentication \u2013 Supporting proximity-based login in pervasive computing, in: Proceedings of the UbiComp 2003, Seattle, USA, LNCS, Vol.\u00a02864, Springer, 2003, pp.\u00a0107\u2013123.","DOI":"10.1007\/978-3-540-39653-6_8"},{"key":"ref009","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0357"},{"key":"ref010","doi-asserted-by":"crossref","unstructured":"M.\u00a0Bartoletti, P.\u00a0Degano, G.L.\u00a0Ferrari and R.\u00a0Zunino, Local policies for resource usage analysis, ACM Trans. Program. Lang. Syst. 31(6) (2009), Article No. 23.","DOI":"10.1145\/1552309.1552313"},{"key":"ref011","doi-asserted-by":"crossref","unstructured":"C.\u00a0Bodei, P.\u00a0Degano, L.\u00a0Galletta and F.\u00a0Salvatori, Linguistic mechanisms for context-aware security, in: Proceedings of the 11th International Colloquium on Theoretical Aspects of Computing, LNCS, Vol.\u00a08687, Springer, 2014, pp.\u00a061\u201379.","DOI":"10.1007\/978-3-319-10882-7_5"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504910"},{"key":"ref013","doi-asserted-by":"crossref","unstructured":"D.\u00a0Bucur and M.\u00a0Nielsen, Secure data flow in a calculus for context awareness, in: Concurrency, Graphs and Models, LNCS, Vol.\u00a05065, Springer, 2008, pp.\u00a0439\u2013456.","DOI":"10.1007\/978-3-540-68679-8_27"},{"key":"ref014","doi-asserted-by":"crossref","unstructured":"R.\u00a0Campbell, J.\u00a0Al-Muhtadi, P.\u00a0Naldurg, G.\u00a0Sampemane and M.D.\u00a0Mickunas, Towards security and privacy for pervasive computing, in: Proceedings of the 2002 Mext-NSF-JSPS International Conference on Software Security: (ISSS\u201902), LNCS, Vol.\u00a02609, Springer, 2003, pp.\u00a01\u201315.","DOI":"10.1007\/3-540-36532-X_1"},{"key":"ref015","doi-asserted-by":"crossref","unstructured":"A.\u00a0Canciani, P.\u00a0Degano, G.L.\u00a0Ferrari and L.\u00a0Galletta, A context-oriented extension of F#, in: FOCLASA 2015, EPTCS, Vol.\u00a0201, 2015, pp.\u00a018\u201332.","DOI":"10.4204\/EPTCS.201.2"},{"key":"ref016","unstructured":"J.\u00a0Cappaert, Code Obfuscation Techniques for Software Protection, PhD thesis, Katholieke Universit\u00e4t Loewen, 2012, https:\/\/www.cosic.esat.kuleuven.be\/publications\/thesis-199.pdf."},{"key":"ref017","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(99)00231-5"},{"key":"ref018","doi-asserted-by":"publisher","DOI":"10.1109\/69.43410"},{"key":"ref019","doi-asserted-by":"crossref","unstructured":"D.\u00a0Clarke and I.\u00a0Sergey, A semantics for context-oriented programming with layers, in: International Workshop on Context-Oriented Programming (COP\u201909), ACM, New York, NY, USA, 2009, Article No.\u00a010, pp.\u00a01\u20136.","DOI":"10.1145\/1562112.1562122"},{"key":"ref020","doi-asserted-by":"crossref","unstructured":"P.\u00a0Costanza, Language constructs for context-oriented programming, in: Proceedings of the Dynamic Languages Symposium, ACM Press, 2005, pp.\u00a01\u201310.","DOI":"10.1145\/1146841.1146842"},{"key":"ref021","doi-asserted-by":"crossref","unstructured":"P.\u00a0Degano, G.L.\u00a0Ferrari and L.\u00a0Galletta, A two-component language for COP, in: Proceedings of the 6th International Workshop on Context-Oriented Programming, ACM Digital Library, 2014. doi:10.1145\/2637066.2637072.","DOI":"10.1145\/2637066.2637072"},{"key":"ref022","doi-asserted-by":"crossref","unstructured":"P.\u00a0Degano, G.L.\u00a0Ferrari and L.\u00a0Galletta, A two-phase static analysis for reliable adaptation, in: Proceedings of the 12th International Conference on Software Engineering and Formal Methods, LNCS, Vol.\u00a08702, Springer, 2014, pp.\u00a0347\u2013362.","DOI":"10.1007\/978-3-319-10431-7_28"},{"key":"ref023","doi-asserted-by":"crossref","unstructured":"P.\u00a0Degano, G.L.\u00a0Ferrari and L.\u00a0Galletta, A two-component language for adaptation: Design, semantics and program analysis, IEEE Transactions on Software Engineering (2016). doi:10.1109\/TSE.2015.2496941.","DOI":"10.1109\/TSE.2015.2496941"},{"key":"ref024","doi-asserted-by":"crossref","unstructured":"P.\u00a0Degano, F.\u00a0Levi and C.\u00a0Bodei, Safe ambients: Control flow analysis and security, in: Proceedings of the 6th Asian Computing Science Conference, Malaysia, LNCS, Vol.\u00a01961, Springer, 2000, pp.\u00a0199\u2013214.","DOI":"10.1007\/3-540-44464-5_15"},{"key":"ref025","doi-asserted-by":"publisher","DOI":"10.1108\/14684520910969880"},{"key":"ref026","doi-asserted-by":"crossref","unstructured":"J.\u00a0DeTreville, Binder, a logic-based security language, in: Proceedings of the 2002 IEEE Symposium on Security and Privacy, SP\u201902, IEEE Computer Society, 2002, pp.\u00a0105\u2013113.","DOI":"10.1109\/SECPRI.2002.1004365"},{"issue":"1","key":"ref027","first-page":"1","volume":"5","author":"Eiter T.","year":"1997","journal-title":"ACM Transactions on Database Systems"},{"key":"ref028","unstructured":"L.\u00a0Galletta, Adaptivity: Linguistic mechanisms and static analysis techniques, PhD thesis, University of Pisa, 2014, http:\/\/www.di.unipi.it\/~galletta\/phdThesis.pdf."},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2008.7.3.a4"},{"key":"ref031","doi-asserted-by":"crossref","unstructured":"R.\u00a0Hirschfeld, A.\u00a0Igarashi and H.\u00a0Masuhara, ContextFJ: A minimal core calculus for context-oriented programming, in: Proceedings of the 10th International Workshop on Foundations of Aspect-Oriented Languages, ACM, 2011, pp.\u00a019\u201323.","DOI":"10.1145\/1960510.1960515"},{"key":"ref032","doi-asserted-by":"crossref","unstructured":"R.\u00a0Hulsebosch, A.\u00a0Salden, M.\u00a0Bargh, P.\u00a0Ebben and J.\u00a0Reitsma, Context sensitive access control, in: Proceedings of the ACM Symposium on Access Control Models and Technologies, 2005, pp.\u00a0111\u2013119.","DOI":"10.1145\/1063979.1064000"},{"key":"ref033","doi-asserted-by":"crossref","unstructured":"R.J.\u00a0Hulsebosch, M.S.\u00a0Bargh, G.\u00a0Lenzini, P.W.G.\u00a0Ebben and S.M.\u00a0Iacob, Context sensitive adaptive authentication, in: Proceedings of the EuroSSC 2007, Kendal, England, LNCS, Vol.\u00a04793, Springer, 2007, pp.\u00a093\u2013109.","DOI":"10.1007\/978-3-540-75696-5_6"},{"key":"ref034","unstructured":"A.\u00a0Igarashi, R.\u00a0Hirschfeld and H.\u00a0Masuhara, A type system for dynamic layer composition, in: FOOL 2012, 2012, p.\u00a013."},{"key":"ref035","doi-asserted-by":"crossref","unstructured":"H.\u00a0Inoue, A.\u00a0Igarashi, M.\u00a0Appeltauer and R.\u00a0Hirschfeld, Towards type-safe JCop: A type system for layer inheritance and first-class layers, in: COP\u201914, ACM, New York, NY, USA, 2014, Article No.\u00a07, pp.\u00a01\u20136, ISBN 978-1-4503-2861-6.","DOI":"10.1145\/2637066.2637073"},{"key":"ref036","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0229-x"},{"key":"ref037","doi-asserted-by":"crossref","unstructured":"T.\u00a0Kamina, T.\u00a0Aotani and H.\u00a0Masuhara, EventCJ: A context-oriented programming language with declarative event-based context transition, in: Proceedings of the 10th International Conference on Aspect-Oriented Software Development (AOSD\u201911), ACM, 2011, pp.\u00a0253\u2013264.","DOI":"10.1145\/1960275.1960305"},{"key":"ref038","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"ref039","doi-asserted-by":"crossref","unstructured":"G.\u00a0Kiczales, E.\u00a0Hilsdale, J.\u00a0Hugunin, M.\u00a0Kersten, J.\u00a0Palm and W.\u00a0Griswold, An overview of AspectJ, in: ECOOP 2001\u00a0\u2013 Object-Oriented Programming, J.\u00a0Knudsen, ed. LNCS, Vol.\u00a02072, Springer, Berlin, Heidelberg, 2001, pp.\u00a0327\u2013354, ISBN 978-3-540-42206-8.","DOI":"10.1007\/3-540-45337-7_18"},{"key":"ref040","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.002"},{"key":"ref041","doi-asserted-by":"crossref","unstructured":"N.\u00a0Li and J.C.\u00a0Mitchell, DATALOG with constraints: A foundation for trust management languages, in: Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages (PADL\u201903), LNCS, Vol.\u00a02562, Springer, 2003, pp.\u00a058\u201373.","DOI":"10.1007\/3-540-36388-2_6"},{"key":"ref042","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2006.01.004"},{"key":"ref043","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888905000263"},{"key":"ref044","unstructured":"N.\u00a0MacDonal, The future of information security is context aware and adaptive, Technical report, Gartner RAS, 2010."},{"key":"ref045","doi-asserted-by":"publisher","DOI":"10.1145\/250707.239104"},{"key":"ref046","unstructured":"C.\u00a0Masone and A.D.\u00a0Kotz, Role Definition Language (RDL): A language to describe context-aware roles, Technical report, 2002."},{"key":"ref047","doi-asserted-by":"crossref","unstructured":"R.\u00a0Milner, Bigraphical reactive systems, in: Proceedings of the CONCUR 2001, Aalborg, Denmark, LNCS, Vol.\u00a02154, Springer, 2001, pp.\u00a016\u201335.","DOI":"10.1007\/3-540-44685-0_2"},{"key":"ref048","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2005.01.004"},{"key":"ref049","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.11.009"},{"issue":"2","key":"ref050","first-page":"31","volume":"4","author":"Most\u00e9faoui G.K.","year":"2014","journal-title":"IJOCI"},{"key":"ref051","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(84)90017-1"},{"key":"ref052","doi-asserted-by":"crossref","unstructured":"A.\u00a0Nanevski, A.\u00a0Banerjee and D.\u00a0Garg, Dependent type theory for verification of information flow and access control policies, ACM Trans. Program. Lang. Syst. 35(2) (2013), Article No. 6.","DOI":"10.1145\/2491522.2491523"},{"key":"ref053","doi-asserted-by":"crossref","unstructured":"F.\u00a0Nielson, H.\u00a0Riis Nielson, R.R.\u00a0Hansen and J.G.\u00a0Jensen, Validating firewalls in mobile ambients, in: Proceedings of the CONCUR\u201999, Eindhoven, The Netherlands, LNCS, Vol.\u00a01664, Springer, 1999, pp.\u00a0463\u2013477.","DOI":"10.1007\/3-540-48320-9_32"},{"key":"ref054","doi-asserted-by":"crossref","unstructured":"H.R.\u00a0Nielson and F.\u00a0Nielson, Flow logic: A multi-paradigmatic approach to static analysis, in: The Essence of Computation, T.A.\u00a0Mogensen, D.A.\u00a0Schmidt and I.H.\u00a0Sudborough, eds, LNCS, Vol.\u00a02566, Springer, 2002, pp.\u00a0223\u2013244.","DOI":"10.1007\/3-540-36377-7_11"},{"key":"ref055","doi-asserted-by":"crossref","unstructured":"G.\u00a0Orsi and L.\u00a0Tanca, Context modelling and context-aware querying, in: Datalog Reloaded, O.\u00a0Moor, G.\u00a0Gottlob, T.\u00a0Furche and A.\u00a0Sellers, eds, LNCS, Vol.\u00a06702, Springer, 2011, pp.\u00a0225\u2013244.","DOI":"10.1007\/978-3-642-24206-9_13"},{"key":"ref056","doi-asserted-by":"crossref","unstructured":"L.\u00a0Pasquale, C.\u00a0Ghezzi, C.\u00a0Menghi, C.\u00a0Tsigkanos and B.\u00a0Nuseibeh, Topology aware adaptive security, in: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2014, ACM, New York, NY, USA, 2014, pp.\u00a043\u201348, ISBN 978-1-4503-2864-7.","DOI":"10.1145\/2593929.2593939"},{"key":"ref057","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.042313.00197"},{"key":"ref058","unstructured":"C.\u00a0Pfleeger and S.\u00a0Pfleeger, Security in Computing, Prentice-Hall, 2003."},{"key":"ref059","doi-asserted-by":"publisher","DOI":"10.1145\/505754.505757"},{"key":"ref060","doi-asserted-by":"publisher","DOI":"10.1145\/643550.643558"},{"key":"ref061","doi-asserted-by":"crossref","unstructured":"M.\u00a0Salehie and L.\u00a0Tahvildari, Self-adaptive software: Landscape and research challenges, ACM Trans. Auton. Adapt. Syst. 4(2) (2009), Article No.\u00a014, pp.\u00a01\u201342, ISSN 1556-4665.","DOI":"10.1145\/1516533.1516538"},{"key":"ref062","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.03.024"},{"key":"ref063","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796807006466"},{"key":"ref064","unstructured":"O.\u00a0Spinczyk, A.\u00a0Gal and W.\u00a0Schr\u00f6der-Preikschat, AspectC++: An aspect-oriented extension to the C++ programming language, in: CRPIT\u201902, Australian Computer Society, Inc., Darlinghurst, Australia, 2002, pp.\u00a053\u201360, ISBN 0-909925-88-7."},{"key":"ref065","doi-asserted-by":"crossref","unstructured":"C.\u00a0Tsigkanos, L.\u00a0Pasquale, C.\u00a0Ghezzi and B.\u00a0Nuseibeh, Ariadne: Topology aware adaptive security for cyber-physical systems, in: 37th IEEE\/ACM International Conference on Software Engineering, Florence, Italy, Vol.\u00a02, IEEE, 2015, pp.\u00a0729\u2013732.","DOI":"10.1109\/ICSE.2015.234"},{"key":"ref066","doi-asserted-by":"publisher","DOI":"10.1145\/944746.944718"},{"key":"ref067","doi-asserted-by":"publisher","DOI":"10.1145\/1018203.1018208"},{"key":"ref068","unstructured":"K.\u00a0Wrona and L.\u00a0Gomez, Context-aware security and secure context-awareness in ubiquitous computing environments, in: XXI Autumn Meeting of Polish Information Processing Society, 2005."},{"key":"ref069","doi-asserted-by":"crossref","unstructured":"G.\u00a0Zhang and M.\u00a0Parashar, Dynamic context-aware access control for grid applications, in: Proceedings of the Fourth International Workshop on Grid Computing, IEEE, 2003, pp.\u00a0101\u2013108.","DOI":"10.1109\/GRID.2003.1261704"}],"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-160551","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JCS-160551","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-160551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T20:47:21Z","timestamp":1741639641000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-160551"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,30]]},"references-count":69,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,8,16]]}},"alternative-id":["10.3233\/JCS-160551"],"URL":"https:\/\/doi.org\/10.3233\/jcs-160551","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"type":"print","value":"0926-227X"},{"type":"electronic","value":"1875-8924"}],"subject":[],"published":{"date-parts":[[2016,5,30]]}}}