2004
DOI: 10.1007/s10207-004-0035-y
|View full text |Cite
|
Sign up to set email alerts
|

Using ambients to control resources

Abstract: Current software and hardware systems, being parallel and reconfigurable, raise new safety and reliability problems, and the resolution of these problems requires new methods. Numerous proposals aim at reducing the threat of bugs and preventing several kinds of attacks. In this paper, we develop an extension of the calculus of mobile ambients, named controlled ambients, that is suited for expressing such issues, specifically denial of service attacks. We present a type system for controlled ambients, which mak… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…This encoding uses both mobility features from the calculus as well as name restriction. However, several variants of the ambient calculus have been proposed so far [14,2,19] by adding and/or retracting features from the original calculus. In [14], the safe ambient calculus introduces some co-capabilities.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This encoding uses both mobility features from the calculus as well as name restriction. However, several variants of the ambient calculus have been proposed so far [14,2,19] by adding and/or retracting features from the original calculus. In [14], the safe ambient calculus introduces some co-capabilities.…”
Section: Introductionmentioning
confidence: 99%
“…We prove this fact by defining a general shape matching all reachable processes and by applying an exhaustive inspection of all possibles reductions 2. In[19], the iteration is also defined by means of a reduction rule, but for explicit recursion instead of replication.…”
mentioning
confidence: 98%
“…To see the problem, consider again the cab trip example given above. On the one hand, comparing with [31], we notice that we can deal with the cab's space satisfactorily with no need for 3-way synchronisations. On the other hand, however, as already observed in [31], this encoding may lead to unwanted behaviours, since there is no way of preventing a client to enter a cab different from the one called and/or the ambient bye to enter a cab different from the one the client has left.…”
Section: Discussionmentioning
confidence: 93%
“…As a further example, we give a new version of the cab trip protocol from [31], formulated in our calculus. A customer sends a request for a cab, which then arrives and takes the customer to his destination.…”
Section: A Cab Tripmentioning
confidence: 99%
“…A piece of resource may move from one ambient to another. Several variants of MA, like Safe Ambients [5], Safe Ambients with Passwords [6], Controlled Ambients [7] and ROAM (The Calculus of Robust Ambients) [8] to name a few, have been proposed to enhance the control power of MA. The Calculus of Fair Ambient [9], or FA, has the most strict rules about when ambients may interact.…”
Section: Introductionmentioning
confidence: 99%