19,299 Hits in 7.6 sec

Information Flow Security for Boxed Ambients

Silvia Crafa, Michele Bugliesi, Giuseppe Castagna
2002 Electronical Notes in Theoretical Computer Science  
1 0 2 £ ' ¦ % 3 £ Conclusions We have studied information flow security in the calculus of Boxed Ambients.  ...  In [23] Sewell and Vitek introduce box-¢ , a process calculus that provides mechanisms for composing (partially trusted) software components and for enforcing information flow security policies.  ... 
doi:10.1016/s1571-0661(04)80417-1 fatcat:b3ai4s7oojbnjfkkmjd2svszke

Banana - A Tool for Boundary Ambients Nesting ANAlysis [chapter]

Chiara Braghin, Agostino Cortesi, Stefano Filippone, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza
2003 Lecture Notes in Computer Science  
The scalability is also possible toward variants of the Mobile Ambient calculus and extensions of the analysis, such as the one of [4] where a minimal set of security boundaries is inferred.  ...  ., processes) are modeled as nested boxes (i.e., ambients), provided with capabilities for entering, exiting and dissolving other boxes.  ...  This specification language provides a very simple framework to reason about information flow and security when mobility is an issue [1] .  ... 
doi:10.1007/3-540-36577-x_32 fatcat:3klbdonbsfevff2ifxmxkgkf6m

Information Leakage Detection in Boundary Ambients1 1Partially supported by MIUR Projects "Interpretazione Astratta, Type Systems e Analisi Control-Flow" and "Modelli formali per la sicurezza", and the EU Contract IST-2001-32617 "Models and Types for Security in Mobile Distributed Systems"

Chiara Braghin, Agostino Cortesi, Riccardo Focardi
2003 Electronical Notes in Theoretical Computer Science  
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel security policies.  ...  Ambients that may guarantee to properly protect their content are explicitly identified as boundaries: a boundary can be seen as a resource access manager for confidential data.  ...  Flow Direct Information Flow The concept of direct flow of high level/ambients outside security boundaries may be formalized as follows.  ... 
doi:10.1016/s1571-0661(04)81010-7 fatcat:4ix4b43xmjgm7kwhu47dhupxi4

Reasoning about Security in Mobile Ambients [chapter]

Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
2001 Lecture Notes in Computer Science  
The paper gives an assessment of security for Mobile Ambients, with specific focus on mandatory access control (MAC) policies in multilevel security systems.  ...  The first part of the paper reports on different formalization attempts for MAC policies in the Ambient Calculus, and provides an in-depth analysis of the problems one encounters.  ...  Thanks to Luca Cardelli for insightful comments and discussion, and to the anonymous referees.  ... 
doi:10.1007/3-540-44685-0_8 fatcat:jmwdjoz3hncmbe22fkca3dphli

Flow-sensitive Leakage Analysis in Mobile Ambients

Chiara Braghin, Agostino Cortesi
2005 Electronical Notes in Theoretical Computer Science  
In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow security in the the calculus of Mobile Ambients.  ...  run-time topology of Mobile Ambient processes.  ...  This allows the study of a very general notion of information flow which should be applicable also to different versions of the calculus such as, e.g., Boxed Ambients [6] , BioAmbients [15] , and Safe  ... 
doi:10.1016/j.entcs.2004.11.039 fatcat:u6thfqfzkbhnvf36uja2oj5aye

Guardians for Ambient-Based Monitoring

G. Ferrari, E. Moggi, R. Pugliese
2002 Electronical Notes in Theoretical Computer Science  
Since the seminal work of Cardelli and Gordon, several ambient-based calculi have been proposed (Seal, Boxπ, Safe Ambients, Secure Safe Ambients, Boxed Ambients), mainly for supporting security.  ...  We exemplify the use of guardians for enforcing security properties.  ...  Acknowledgement The authors thank Cedric Fournet for helpful comments.  ... 
doi:10.1016/s1571-0661(04)80416-x fatcat:lp5zskhbencw3ozvaed3dwbjp4

Information flow security in Boundary Ambients

Chiara Braghin, Agostino Cortesi, Riccardo Focardi
2008 Information and Computation  
We then give a new notion of non-interference for Boundary Ambients aiming at capturing indirect flows, too.  ...  A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multilevel security policies.  ...  Direct information flow The flow of high-level ambients outside security boundaries is the downward flow that the Bell-LaPadula model intends to avoid. It may be formalised as follows.  ... 
doi:10.1016/j.ic.2007.12.001 fatcat:2qtjsb32vva2dh64lleuszp564

Page 146 of American Society for Microbiology. ASM News Vol. 48, Issue 3 [page]

1982 American Society for Microbiology. ASM News  
VTM 20 x 3 ml tubes/box 46-995-03 For further information or to place an order, please contact the nearest Flow Laboratories, Inc., Customer Service Department or your Flow Laboratories representative.  ...  INCREASED SAFETY e Noglass ampules to crush for release of medium. e Screw-cap tubes provide securely sealed containers for assured containment of the viral specimen.  ... 

Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients

C. Braghin, A. Cortesi, R. Focardi, F.L. Luccio, C. Piazza
2004 Electronical Notes in Theoretical Computer Science  
We study security issues, in particular information leakage detection, in the context of the Mobile Ambient calculus.  ...  We describe BANANA, a Java-based tool for ambient nesting analysis, by focussing on analysis accuracy and algorithmic optimizations.  ...  In this paper, we have studied information flow security in the calculus of Mobile Ambients with a static approach.  ... 
doi:10.1016/j.entcs.2004.02.014 fatcat:ibkywz2jvjb6rluclaktlcdp3i

A Formal Policy Specification Language for an 802.11 WLAN with Enhanced Security Network [chapter]

Handan Gül Çalıklı, Ufuk Çağlayan
2005 Lecture Notes in Computer Science  
Recently, security policies are written in natural language and as they get more complicated, even for an expert it might be impossible to detect such inconsistencies.  ...  In this paper, we extend Mob adtl [1] according its refinement methodology to obtain a formal policy specification language for an 802.11 WLAN with enhanced security network.  ...  Among the Ambient Calculi we examined, there were Mobile Ambients [6] and its variants Mobile Safe Ambients [7] , Secure Safe Ambients [8] and Boxed Ambients [9] .  ... 
doi:10.1007/11569596_21 fatcat:h75ocuhvfnem3ftwdl5aqq3rum

Security for Mobility [chapter]

Hanne Riis Nielson, Flemming Nielson, Mikael Buchholtz
2004 Lecture Notes in Computer Science  
We show how to use static analysis to provide information about security issues related to mobility.  ...  Finally, we use Boxed Ambients as a means for expressing cryptographic key exchange protocols and we adapt the operational semantics and the 0CFA analysis. the Server (S) encrypted by her master key K  ...  More recently, the same authors have studied information flow in a variant of Boxed Ambients [21] .  ... 
doi:10.1007/978-3-540-24631-2_6 fatcat:n6pokailgzbgpicdjpdusf2xmm

Access control for mobile agents

Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
2004 ACM Transactions on Programming Languages and Systems  
Boxed Ambients are a variant of Mobile Ambients that result from dropping the open capability, and introducing new primitives for ambient communication.  ...  Section 2 presents our analysis of security and access control in MA. Section 3 introduces the calculus of Boxed Ambients.  ...  We investigate atype based analysis of information flow in Boxed Ambients in a companion paper , where we develop static type system for non interference.  ... 
doi:10.1145/963778.963781 fatcat:jozjwfnlavbhhg3scuos62a754

Real Time Video Black Box in Air Craft for an Intelligent Surveillance System

Sasikala Guruswamy, K. Siddappanaidu
2015 Indian Journal of Science and Technology  
This paper describes the method of analyzing the information of both audio and video of flight accidents recorded by the black box.  ...  The method of investigation of accidents can also be used efficiently for surface traffic signal system and ship monitoring.  ...  The operation of the ARM7 processor is to initiate the camera and start for recording and storing information in black box.  ... 
doi:10.17485/ijst/2015/v8i10/51141 fatcat:cb35fkfirjamve7u3kbrvm4vha

Industrial Automation Based on IOT

Priyadarshi Balbudhe
2019 International Journal for Research in Applied Science and Engineering Technology  
Safety from leaking of raw gas and fire are the most important requirements of home and industries security system for people. A traditional security system gives the signals in terms of alarm.  ...  Where this information is indicated with the indicators. [Write an appointment of the document or the summary of an interesting point. You can place the text box anywhere in the document.  ...  Within industries the various hazardous gas are being processed, hence to provide security to those employ working within those industreis, it becomes important issue to work on their security, If leakage  ... 
doi:10.22214/ijraset.2019.5681 fatcat:khnuhck755fx7pmhla5dq5zzqu

Evaluation on frozen shellfish quality by blockchain based multi-sensors monitoring and SVM algorithm during cold storage

Huanhuan Feng, Wensheng Wang, Bingqi Chen, Xiaoshuan Zhang
2020 IEEE Access  
For more information, see  ...  IoT-enable monitoring can provide valuable information for the shellfish quality evaluation during cold storage condition.  ...  . • User application interface for PC and mobile phone is responsible for displaying the ambient information from all sensor nodes to the end-users.  ... 
doi:10.1109/access.2020.2977723 fatcat:hfu5yydhhrgg7bhx6yjmto4sba
« Previous Showing results 1 — 15 out of 19,299 results