Information flow security in Boundary Ambients
نویسندگان
چکیده
منابع مشابه
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to properly protect their content are explicitly identified as boundaries: a boundary can be seen as a resource access manager for confidential data. In this setting, absence of direct information leakage is granted as soon as ...
متن کاملInformation Flow Security in Boxed Ambients
We study the problem of secure information flow for Boxed Ambients in terms of non-interference. We develop a sound type system that provides static guarantees of absenceof unwanted flow of information for well typed processes. Non-interference is stated, andproved, in terms of a typed notion of contextual equivalence for Boxed Ambients akin tothe corresponding equivalence d...
متن کاملInformation Flow Security in Mobile Ambients
A multilevel security policy is considered in the scenario of mobile systems, and modeled within “pure” Mobile Ambients calculus, in which no communication channels are present and the only possible actions are represented by the moves performed by mobile processes. The information flow property of interest is defined in terms of the possibility for a confidential ambient/data to move outside a...
متن کاملInformation Flow Security in Mobile Ambients 1 Agostino Cortesi
Amultilevel security policy is considered in the scenario of mobile systems, and modeled within “pure” Mobile Ambients calculus, in which no communication channels are present and the only possible actions are represented by the moves performed by mobile processes. The information flow property of interest is defined in terms of the possibility for a confidential ambient/data to move outside a ...
متن کاملInformation Leakage Detection in Boundary Ambients
A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel security policies. Ambients that may guarantee to properly protect their content are explicitly identified as boundaries: a boundary can be seen as a resource access manager for confidential data. In this setting, we define a notion of non-interference which captures the absence of any (both direct ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information and Computation
سال: 2008
ISSN: 0890-5401
DOI: 10.1016/j.ic.2007.12.001