A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Reasoning about Security in Mobile Ambients
[chapter]
2001
Lecture Notes in Computer Science
The paper gives an assessment of security for Mobile Ambients, with specific focus on mandatory access control (MAC) policies in multilevel security systems. ...
As it turns out, MAC security does not appear to have fully convincing interpretations in the calculus. The second part proposes a solution to this impasse, based on a variant of Mobile Ambients. ...
It is the interplay between communication and the primitives for ambient mobility which makes it difficult to reason about resource access in terms of classical security models. ...
doi:10.1007/3-540-44685-0_8
fatcat:jmwdjoz3hncmbe22fkca3dphli
What Is This Sensor and Does This App Need Access to It?
2019
Informatics
In this paper, first, we discuss the issues around the security and privacy of mobile sensors. ...
Our findings showed that when mobile users were provided with reasonable choices and intuitive teaching, they could easily self-direct themselves to improve their security and privacy. ...
Ambient sensors: Almost all of our participants felt Not or only a Little concerned about ambient sensors in relation to their risk to PINs. ...
doi:10.3390/informatics6010007
fatcat:r5g7ha6c25bililmakywwpwtme
Banana - A Tool for Boundary Ambients Nesting ANAlysis
[chapter]
2003
Lecture Notes in Computer Science
The scalability is also possible toward variants of the Mobile Ambient calculus and extensions of the analysis, such as the one of [4] where a minimal set of security boundaries is inferred. ...
This specification language provides a very simple framework to reason about information flow and security when mobility is an issue [1] . ...
Security of Mobile Ambients The Mobile Ambient calculus has been introduced in [5] with the main purpose of explicitly modeling mobility. ...
doi:10.1007/3-540-36577-x_32
fatcat:3klbdonbsfevff2ifxmxkgkf6m
CLAIM: A Computational Language for Autonomous, Intelligent and Mobile Agents
[chapter]
2004
Lecture Notes in Computer Science
The primitives of mobility are inspired from the ambient calculus. ...
Agents designed thanks to CLAIM are endowed with cognitive capabilities (e.g. reasoning), are able to communicate with other agents (send and receive several kinds of messages) and are mobile. ...
Acknowledgements: Part of this work was done in the context of a LAFMI 2 project. ...
doi:10.1007/978-3-540-25936-7_5
fatcat:jvbkfikycfgibgtorvvhevbfdq
The Spider Model of Agents
[chapter]
2001
Lecture Notes in Computer Science
We present both a formal description of the model using the ambient calculus, and a Java-based implementation. ...
We present both a formal description of the model using the ambient calculus, and a Java-based implementation. ...
Reasoning about the Spider Model Spider programs that is, actions taken by spiders at the request of an external user can be reasoned about in two styles. ...
doi:10.1007/3-540-44651-6_20
fatcat:nxghbcr6srhifnmwbazgpalwl4
Wide Area Computation
[chapter]
1999
Lecture Notes in Computer Science
Our approach reflects the intuition that, to function satisfactorily on a wide area network, the sea of objects must be partitioned and made hierarchical, internally mobile, and secure. ...
and software mobility, and the presence of firewalls). ...
It supports reasoning about mobility and security, and has an intuitive graphical presentation in terms of a folder calculus [3] . ...
doi:10.1007/3-540-48523-6_2
fatcat:qzhtvmndrjhdloe2rfvgxzk6ka
Foreword
2000
Theoretical Computer Science
This calculus, which is deÿned formally using an operational semantics, opens new perspectives for reasoning about mobility and security. The paper by R. ...
It provides both a formalisation of these features and original methods to reason about bisimilarity of processes in this calculus. ...
doi:10.1016/s0304-3975(99)00225-x
fatcat:wasbiikkurcbbkearbh4gtrmtq
An OWL-Based Mobile GeoBI Context Ontology Enabling Location-Based and Context-Based Reasoning and Supporting Contextual Business Analysis
2015
International journal of geosciences
model and reason on it. ...
reasoning capabilities. ...
IT Security: is about the information security regarding hardware, software and data in a given area. It involves information about IT security level (e.g. ...
doi:10.4236/ijg.2015.61007
fatcat:t5zu66dz65e6bp326fovq7f5ze
A survey of potential architectures for communication in heterogeneous networks
2012
Wireless Telecommunications Symposium 2012
This means that future mobile networks will have to integrate communications, mobility, quality-of service and security. ...
In addition, since these networks must work together, future mobile systems will have an open, instead of the currently closed, architecture. ...
Authentication, Authorizing, Auditing and Cost (A3C) servers are used for security reasons in the CEP and low level domains as well. ...
doi:10.1109/wts.2012.6266121
dblp:conf/wts/AiashMLLSPAMV12
fatcat:y7bzdp5hfnf7rgteb76f4m7mqe
Access control in mobile ambient calculi: A comparative view
2008
Theoretical Computer Science
Ambient Calculi represent a class of process calculi used to describe and model mobile and distributed computations. ...
So the security problem for ambient calculi is investigated considering the authentication mechanism and the possibility to implement security policies. ...
Security policies The type system of M 3 permits to express fine discrimination about the access to ambients. ...
doi:10.1016/j.tcs.2008.01.024
fatcat:2uxkcqtuuzgsloh3bmmeto5av4
Agents and ambient intelligence: case studies
2009
Journal of Ambient Intelligence and Humanized Computing
One of the most important aspects in Ambient Intelligence is the use of context-aware technologies in order to perceive stimuli from both the users and the environment. ...
The significance that Ambient Intelligence (AmI) has acquired in recent years requires the development of innovative solutions. ...
In addition, the continuous advancement in mobile computing makes it possible to obtain information about the context and also to react physically to it in more innovative ways (Jayaputera, et al., 2007 ...
doi:10.1007/s12652-009-0006-2
fatcat:hs44cdohxra6hoyy7wsbp3uwbu
Information Flow Security in Mobile Ambients1 1Partially supported by MURST Projects "Interpretazione Astratta, Type Systems e Analisi Control-Flow", and "Certificazione automatica di programmi mediante interpretazione astratta"
2001
Electronical Notes in Theoretical Computer Science
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pure" Mobile Ambients calculus, in which no communication channels are present and the only possible actions ...
The information flow property of interest is defined in terms of the possibility for a confidential ambient/data to move outside a security boundary. ...
proposed restrictions of Mobile Ambients designed for security issues (like Secure Safe Ambients [3] ). ...
doi:10.1016/s1571-0661(04)00235-x
fatcat:jlf2v73sybd2rmcstrz4f2g62e
Control Flow Analysis of Mobile Ambients with Security Boundaries
[chapter]
2002
Formal Methods for Open Object-Based Distributed Systems V
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pure" Mobile Ambients calculus, in which no communication channels are present and the only possible actions ...
The information flow property of interest is defined in terms of the possibility for a confidential ambient/data to move outside a security boundary. ...
Information Flow In this section, we present a formalization of multilevel security in the setting of Mobile Ambients. ...
doi:10.1007/978-0-387-35496-5_14
fatcat:qu4afi72l5dtvmwcor6nf4zcnm
C2L:A Formal Policy Language for Secure Cloud Configurations
2012
Procedia Computer Science
Syntactically, C 2 L is based upon a spatio-temporal modal logic and provides a concise and clear statement of policy constraints for colocation, hosting, migration, security, and availability. ...
Formulae in the mobile ambient logic are essentially statements about mobile ambient processes that define infinite structures, whereas C 2 L formulae are direct statements about dynamically evolving typed ...
Process algebra have been used to study security policies, e.g., CSP is proposed as a language to reason about XACML policies [9] . ...
doi:10.1016/j.procs.2012.06.064
fatcat:twcgjs6mvvefdazrtvsxmll3tu
Failover for Mobile Routers: A Vision of Resilient Ambience
[chapter]
2005
Lecture Notes in Computer Science
In this paper we consider the Mobile Router related failures that could occur in today's mobile networks and describe how the ambient networking environment with its in-built enhanced failover management ...
The end user entities are, in the majority of use cases, mobile and they operate in a highly dynamic environment. ...
Acknowledgements This document is a byproduct of the Ambient Networks Project, partially funded by the European Commission under its Sixth Framework Programme. ...
doi:10.1007/978-3-540-31957-3_24
fatcat:gakvchyatfchdi7j6lzk3xfhpm
« Previous
Showing results 1 — 15 out of 29,876 results