DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dezani-Ciancaglini, Mariangiola | en |
dc.contributor.author | Ghilezan, Silvia | en |
dc.contributor.author | Pantović, Jovanka | en |
dc.contributor.author | Varacca, Daniele | en |
dc.date.accessioned | 2020-05-02T16:42:21Z | - |
dc.date.available | 2020-05-02T16:42:21Z | - |
dc.date.issued | 2008-08-08 | en |
dc.identifier.issn | 0304-3975 | en |
dc.identifier.uri | http://researchrepository.mi.sanu.ac.rs/handle/123456789/2599 | - |
dc.description.abstract | We describe a type system for the X d π calculus of Gardner and Maffeis. An X d π-network is a network of locations, where each location consists of both a data tree (which contains scripts and pointers to nodes in trees at different locations) and a process, for modeling process interaction, process migration and interaction between processes and data. Our type system is based on types for locations, data and processes, expressing security levels. A tree can store data of different security level, independently from the security level of the enclosing location. The access and mobility rights of a process depend on the security level of the "source" location of the process itself, i.e. of the location where the process was in the initial network or where the process was created by the activation of a script. The type system enjoys type preservation under reduction (subject reduction). In consequence of subject reduction we prove the following security properties. In a well-typed X d π-network, a process P whose source location is of level h can copy data of security level at most h and update data of security level less than h. Moreover, the process P can only communicate data and go to locations of security level equal or less than h. | en |
dc.publisher | Elsevier | - |
dc.relation | FP6-2004-510996 Coordination Action TYPES | - |
dc.relation | GLORA 144029 of MSEP | - |
dc.relation | ANR project “ParSec” ANR-06-SETI-010-02 | - |
dc.relation | MMIT 1438 of PSNTR | - |
dc.relation.ispartof | Theoretical Computer Science | en |
dc.subject | Dynamic web data | Pi-calculus | Security types | XML | en |
dc.title | Security types for dynamic web data | en |
dc.type | Article | en |
dc.identifier.doi | 10.1016/j.tcs.2008.04.032 | en |
dc.identifier.scopus | 2-s2.0-46649115490 | en |
dc.relation.firstpage | 156 | en |
dc.relation.lastpage | 171 | en |
dc.relation.issue | 2-3 | en |
dc.relation.volume | 402 | en |
dc.description.rank | M22 | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.openairetype | Article | - |
item.cerifentitytype | Publications | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
crisitem.author.orcid | 0000-0003-2253-8285 | - |
SCOPUSTM
Citations
4
checked on Nov 24, 2024
Page view(s)
21
checked on Nov 24, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.