Skip to main content

Security Types for Mobile Safe Ambients

  • Conference paper
  • First Online:
Advances in Computing Science — ASIAN 2000 (ASIAN 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1961))

Included in the following conference series:

Abstract

The Ambient Calculus and the Safe Ambient Calculus have been recently successfully proposed as models for the Web. They are based on the notions of ambient movement and ambient opening. Different type disciplines have been devised for them in order to avoid unwanted behaviours of processes. In the present paper we propose a type discipline for safe mobile ambients which is essentially motivated by ensuring security properties. We associate security levels to ambients and we require that an ambient at security level s can only be traversed or opened by ambients at security level at least s. Since the movement and opening rights can be unrelated, we consider two partial orders between security levels. We also discuss some meaningful examples of use of our type discipline.

Partially supported by MURST Cofin’ 99 TOSCA Project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Michele Bugliesi and Giuseppe Castagna. Secure safe ambients. In Proceedings of the 28th ACM Symposium on Principles of Programming Languages, 2001. To appear.

    Google Scholar 

  2. Luca Cardelli, Giorgio Ghelli, and Andrew D. Gordon. Mobility types for mobile ambients. In Jiří Wiederman, Peter van Emde Boas, and Mogens Nielsen, editors, ICALP 1999, volume 1644 of Lecture Notes in Computer Science, pages 230–239. Springer-Verlag, 1999.

    Google Scholar 

  3. Luca Cardelli, Giorgio Ghelli, and Andrew D. Gordon. Ambient groups and mobility types. In Jan van Leeuwen et al., editor, Theoretical Computer Science: Exploring New Frontiers in Theoretical Informatics, volume 1872 of Lecture Notes in Computer Science, pages 333–347. Springer-Verlag, 2000.

    Chapter  Google Scholar 

  4. Luca Cardelli and Andrew D. Gordon. Mobile ambients. In Maurice Nivat, editor, FoSSaCS 1998, volume 1378 of Lecture Notes in Computer Science, pages 140–155. Springer-Verlag, 1998.

    Google Scholar 

  5. Luca Cardelli and Andrew D. Gordon. Types for mobile ambients. In POPL’99, pages 79–92, New York, NY, USA, 1999. ACM Press.

    Google Scholar 

  6. Matthew Hennessy and James Riely. Resource access control in systems of mobile agents (extended abstract). In Proc. of 3rd International Workshop on High-Level Concurrent Languages (HLCL’98), 1998. Vol. 16(3) of Electronic Notes in Theoretical Computer Science. Full version to appear in Information and Computation.

    Google Scholar 

  7. Matthew Hennessy and James Riely. Information flow vs. resource access in the asynchronous π-calculus. In Ugo Montanari, José Rolim, and Emo Welzl, editors, ICALP 2000, volume 1853 of Lecture Notes in Computer Science, pages 415–427. Springer-Verlag, 2000.

    Google Scholar 

  8. Francesca Levi and Chiara Bodei. Security analysis for mobile ambients. In Proceedings of the Workshop on Issues in the Theory of Security, (co-located with ICALP 2000), pages 18–23, 2000.

    Google Scholar 

  9. Francesca Levi and Davide Sangiorgi. Controlling interference in ambients. In POPL’00, pages 352–364, New York, NY, USA, 2000. ACM Press.

    Google Scholar 

  10. Rocco De Nicola, Gianluigi Ferrari, Rosario Pugliese, and Betty Venneri. Types for access control. Theoretical Computer Science, 2000. Special issue on Coordination. To appear, available at http://rap.dsi.unifi.it/papers.htm.

  11. Benjamin Pierce and Davide Sangiorgi. Typing and subtyping for mobile processes. In Logic in Computer Science, 1993. Full version in Mathematical Structures in Computer Science, Vol. 6, No. 5, pages 409–454, 1996.

    MATH  MathSciNet  Google Scholar 

  12. Pascal Zimmer. Subtyping and typing algorithms for mobile ambients. In Jerzy Tiuryn, editor, FoSSaCS 2000, volume 1784 of Lecture Notes in Computer Science, pages 375–390. Springer-Verlag, 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dezani-Ciancaglini, M., Salvo, I. (2000). Security Types for Mobile Safe Ambients. In: Jifeng, H., Sato, M. (eds) Advances in Computing Science — ASIAN 2000. ASIAN 2000. Lecture Notes in Computer Science, vol 1961. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44464-5_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-44464-5_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41428-5

  • Online ISBN: 978-3-540-44464-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics