Role-Based Access Control Models
Computer
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Controlling interference in ambients
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Bisimulation congruences in safe ambients
POPL '02 Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
TACS '01 Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software
A Type-Based Approach to Program Security
TAPSOFT '97 Proceedings of the 7th International Joint Conference CAAP/FASE on Theory and Practice of Software Development
Using Ambients to Control Resources
CONCUR '02 Proceedings of the 13th International Conference on Concurrency Theory
Typing and Subtyping Mobility in Boxed Ambients
CONCUR '02 Proceedings of the 13th International Conference on Concurrency Theory
FoSSaCS '98 Proceedings of the First International Conference on Foundations of Software Science and Computation Structure
ACM SIGOPS Operating Systems Review
Types for ambient and process mobility†
Mathematical Structures in Computer Science
ICALP'03 Proceedings of the 30th international conference on Automata, languages and programming
Types for security in a mobile world
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
A mobility calculus with local and dependent types
Processes, Terms and Cycles
Language-based information-flow security
IEEE Journal on Selected Areas in Communications
Hi-index | 5.23 |
Ambient Calculi represent a class of process calculi used to describe and model mobile and distributed computations. This paper examines the most relevant of these calculi and focuses on an important dimension: the access control problem. In the security world, a system is considered trusted if it controls the access to its resources, i.e. every request for the access to a resource is honored if and only if the subject requiring the resource is an authorized user of the system and the request agrees with a given policy. So the security problem for ambient calculi is investigated considering the authentication mechanism and the possibility to implement security policies. Two examples have been chosen to illustrate these topics: the firewall and the communication by means of named channels.