Filters








29,876 Hits in 6.0 sec

Reasoning about Security in Mobile Ambients [chapter]

Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
2001 Lecture Notes in Computer Science  
The paper gives an assessment of security for Mobile Ambients, with specific focus on mandatory access control (MAC) policies in multilevel security systems.  ...  As it turns out, MAC security does not appear to have fully convincing interpretations in the calculus. The second part proposes a solution to this impasse, based on a variant of Mobile Ambients.  ...  It is the interplay between communication and the primitives for ambient mobility which makes it difficult to reason about resource access in terms of classical security models.  ... 
doi:10.1007/3-540-44685-0_8 fatcat:jmwdjoz3hncmbe22fkca3dphli

What Is This Sensor and Does This App Need Access to It?

Maryam Mehrnezhad, Ehsan Toreini
2019 Informatics  
In this paper, first, we discuss the issues around the security and privacy of mobile sensors.  ...  Our findings showed that when mobile users were provided with reasonable choices and intuitive teaching, they could easily self-direct themselves to improve their security and privacy.  ...  Ambient sensors: Almost all of our participants felt Not or only a Little concerned about ambient sensors in relation to their risk to PINs.  ... 
doi:10.3390/informatics6010007 fatcat:r5g7ha6c25bililmakywwpwtme

Banana - A Tool for Boundary Ambients Nesting ANAlysis [chapter]

Chiara Braghin, Agostino Cortesi, Stefano Filippone, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza
2003 Lecture Notes in Computer Science  
The scalability is also possible toward variants of the Mobile Ambient calculus and extensions of the analysis, such as the one of [4] where a minimal set of security boundaries is inferred.  ...  This specification language provides a very simple framework to reason about information flow and security when mobility is an issue [1] .  ...  Security of Mobile Ambients The Mobile Ambient calculus has been introduced in [5] with the main purpose of explicitly modeling mobility.  ... 
doi:10.1007/3-540-36577-x_32 fatcat:3klbdonbsfevff2ifxmxkgkf6m

CLAIM: A Computational Language for Autonomous, Intelligent and Mobile Agents [chapter]

Amal El Fallah-Seghrouchni, Alexandru Suna
2004 Lecture Notes in Computer Science  
The primitives of mobility are inspired from the ambient calculus.  ...  Agents designed thanks to CLAIM are endowed with cognitive capabilities (e.g. reasoning), are able to communicate with other agents (send and receive several kinds of messages) and are mobile.  ...  Acknowledgements: Part of this work was done in the context of a LAFMI 2 project.  ... 
doi:10.1007/978-3-540-25936-7_5 fatcat:jvbkfikycfgibgtorvvhevbfdq

The Spider Model of Agents [chapter]

Freeman Y. Huang, David B. Skillicorn
2001 Lecture Notes in Computer Science  
We present both a formal description of the model using the ambient calculus, and a Java-based implementation.  ...  We present both a formal description of the model using the ambient calculus, and a Java-based implementation.  ...  Reasoning about the Spider Model Spider programs that is, actions taken by spiders at the request of an external user can be reasoned about in two styles.  ... 
doi:10.1007/3-540-44651-6_20 fatcat:nxghbcr6srhifnmwbazgpalwl4

Wide Area Computation [chapter]

Luca Cardelli
1999 Lecture Notes in Computer Science  
Our approach reflects the intuition that, to function satisfactorily on a wide area network, the sea of objects must be partitioned and made hierarchical, internally mobile, and secure.  ...  and software mobility, and the presence of firewalls).  ...  It supports reasoning about mobility and security, and has an intuitive graphical presentation in terms of a folder calculus [3] .  ... 
doi:10.1007/3-540-48523-6_2 fatcat:qzhtvmndrjhdloe2rfvgxzk6ka

Foreword

Daniel Le Métayer
2000 Theoretical Computer Science  
This calculus, which is deÿned formally using an operational semantics, opens new perspectives for reasoning about mobility and security. The paper by R.  ...  It provides both a formalisation of these features and original methods to reason about bisimilarity of processes in this calculus.  ... 
doi:10.1016/s0304-3975(99)00225-x fatcat:wasbiikkurcbbkearbh4gtrmtq

An OWL-Based Mobile GeoBI Context Ontology Enabling Location-Based and Context-Based Reasoning and Supporting Contextual Business Analysis

Belko Abdoul Aziz Diallo, Thierry Badard, Frédéric Hubert, Sylvie Daniel
2015 International journal of geosciences  
model and reason on it.  ...  reasoning capabilities.  ...  IT Security: is about the information security regarding hardware, software and data in a given area. It involves information about IT security level (e.g.  ... 
doi:10.4236/ijg.2015.61007 fatcat:t5zu66dz65e6bp326fovq7f5ze

A survey of potential architectures for communication in heterogeneous networks

Mahdi Aiash, Glenford Mapp, Aboubaker Lasebae, Jonathan Loo, Fragkiskos Sardis, Raphael C.-W. Phan, Mario Augusto, Edson Moreira, Renata Vanni
2012 Wireless Telecommunications Symposium 2012  
This means that future mobile networks will have to integrate communications, mobility, quality-of service and security.  ...  In addition, since these networks must work together, future mobile systems will have an open, instead of the currently closed, architecture.  ...  Authentication, Authorizing, Auditing and Cost (A3C) servers are used for security reasons in the CEP and low level domains as well.  ... 
doi:10.1109/wts.2012.6266121 dblp:conf/wts/AiashMLLSPAMV12 fatcat:y7bzdp5hfnf7rgteb76f4m7mqe

Access control in mobile ambient calculi: A comparative view

Ines Margaria, Maddalena Zacchi
2008 Theoretical Computer Science  
Ambient Calculi represent a class of process calculi used to describe and model mobile and distributed computations.  ...  So the security problem for ambient calculi is investigated considering the authentication mechanism and the possibility to implement security policies.  ...  Security policies The type system of M 3 permits to express fine discrimination about the access to ambients.  ... 
doi:10.1016/j.tcs.2008.01.024 fatcat:2uxkcqtuuzgsloh3bmmeto5av4

Agents and ambient intelligence: case studies

Dante I. Tapia, Ajith Abraham, Juan M. Corchado, Ricardo S. Alonso
2009 Journal of Ambient Intelligence and Humanized Computing  
One of the most important aspects in Ambient Intelligence is the use of context-aware technologies in order to perceive stimuli from both the users and the environment.  ...  The significance that Ambient Intelligence (AmI) has acquired in recent years requires the development of innovative solutions.  ...  In addition, the continuous advancement in mobile computing makes it possible to obtain information about the context and also to react physically to it in more innovative ways (Jayaputera, et al., 2007  ... 
doi:10.1007/s12652-009-0006-2 fatcat:hs44cdohxra6hoyy7wsbp3uwbu

Information Flow Security in Mobile Ambients1 1Partially supported by MURST Projects "Interpretazione Astratta, Type Systems e Analisi Control-Flow", and "Certificazione automatica di programmi mediante interpretazione astratta"

Agostino Cortesi, Riccardo Focardi
2001 Electronical Notes in Theoretical Computer Science  
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pure" Mobile Ambients calculus, in which no communication channels are present and the only possible actions  ...  The information flow property of interest is defined in terms of the possibility for a confidential ambient/data to move outside a security boundary.  ...  proposed restrictions of Mobile Ambients designed for security issues (like Secure Safe Ambients [3] ).  ... 
doi:10.1016/s1571-0661(04)00235-x fatcat:jlf2v73sybd2rmcstrz4f2g62e

Control Flow Analysis of Mobile Ambients with Security Boundaries [chapter]

Chiara Braghin, Agostino Cortesi, Riccardo Focardi
2002 Formal Methods for Open Object-Based Distributed Systems V  
A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pure" Mobile Ambients calculus, in which no communication channels are present and the only possible actions  ...  The information flow property of interest is defined in terms of the possibility for a confidential ambient/data to move outside a security boundary.  ...  Information Flow In this section, we present a formalization of multilevel security in the setting of Mobile Ambients.  ... 
doi:10.1007/978-0-387-35496-5_14 fatcat:qu4afi72l5dtvmwcor6nf4zcnm

C2L:A Formal Policy Language for Secure Cloud Configurations

Jayaraj Poroor, Bharat Jayaraman
2012 Procedia Computer Science  
Syntactically, C 2 L is based upon a spatio-temporal modal logic and provides a concise and clear statement of policy constraints for colocation, hosting, migration, security, and availability.  ...  Formulae in the mobile ambient logic are essentially statements about mobile ambient processes that define infinite structures, whereas C 2 L formulae are direct statements about dynamically evolving typed  ...  Process algebra have been used to study security policies, e.g., CSP is proposed as a language to reason about XACML policies [9] .  ... 
doi:10.1016/j.procs.2012.06.064 fatcat:twcgjs6mvvefdazrtvsxmll3tu

Failover for Mobile Routers: A Vision of Resilient Ambience [chapter]

Eranga Perera, Aruna Seneviratne, Roksana Boreli, Michael Eyrich, Michael Wolf, Tim Leinmüller
2005 Lecture Notes in Computer Science  
In this paper we consider the Mobile Router related failures that could occur in today's mobile networks and describe how the ambient networking environment with its in-built enhanced failover management  ...  The end user entities are, in the majority of use cases, mobile and they operate in a highly dynamic environment.  ...  Acknowledgements This document is a byproduct of the Ambient Networks Project, partially funded by the European Commission under its Sixth Framework Programme.  ... 
doi:10.1007/978-3-540-31957-3_24 fatcat:gakvchyatfchdi7j6lzk3xfhpm
« Previous Showing results 1 — 15 out of 29,876 results