Pii: S0096-0551(02)00009-7

نویسندگان

  • Chiara Braghin
  • Agostino Cortesi
  • Riccardo Focardi
چکیده

A new notion of security boundary is introduced to model multilevel security policies in the scenario of mobile systems, within Cardelli and Gordon’s “pure” mobile ambients calculus. Information leakage may be expressed in terms of the possibility for a hostile ambient to access con0dential data that are not protected inside a security boundary. A control 1ow analysis is de0ned, as a re0nement of the Hansen–Jensen–Nielsons’s CFA, that allows to properly capture boundary crossings. In this way, direct information leakage may be statically detected. c © 2002 Elsevier Science Ltd. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security boundaries in mobile ambients

A new notion of Security Boundary is introduced to model multilevel security policies in the scenario of mobile systems, within Cardelli and Gordon’s “pure” Mobile Ambients calculus. Information leakage may be expressed in terms of the possibility for a hostile ambient to access confidential data that are not protected inside a security boundary. A control flow analysis is defined, as a refinem...

متن کامل

Iteration constructs in data-flow visual programming languages

Many visual programming languages (VPLs) rely on the data-!ow paradigm, probably because of its simple and intuitive functioning mechanism. However, there are cases where more powerful programming constructs are needed to deal with complex problems. For example, iteration is undoubtedly an important aspect of programming, and should allow repetitive behaviors to be speci2ed in compact and easy ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002