Information flow security in boundary ambients
From MaRDI portal
Publication:2482455
DOI10.1016/j.ic.2007.12.001zbMath1147.68330DBLPjournals/iandc/BraghinCF08OpenAlexW2030876862WikidataQ62045688 ScholiaQ62045688MaRDI QIDQ2482455
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
Publication date: 16 April 2008
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2007.12.001
Related Items (3)
Information Leakage Analysis by Abstract Interpretation ⋮ Secured Information Flow for Asynchronous Sequential Processes ⋮ Security boundaries in mobile ambients
Uses Software
Cites Work
- Abstract interpretation of mobile ambients.
- Mobile ambients
- Behavioural typing for safe ambients
- Security boundaries in mobile ambients
- BioAmbients: an abstraction for biological compartments
- Nesting analysis of mobile ambients
- On abstract interpretation of mobile ambients
- An overview of Boxed Ambients
- Equational properties of mobile ambients
- Secure safe ambients
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Information flow security in boundary ambients