Using ambients to control resources

Teller, David; Zimmer, Pascal; Hirschkoff, Daniel
August 2004
International Journal of Information Security;2004, Vol. 2 Issue 3/4, p126
Academic Journal
Current software and hardware systems, being parallel and reconfigurable, raise new safety and reliability problems, and the resolution of these problems requires new methods. Numerous proposals aim at reducing the threat of bugs and preventing several kinds of attacks. In this paper, we develop an extension of the calculus of mobile ambients, named controlled ambients, that is suited for expressing such issues, specifically denial of service attacks. We present a type system for controlled ambients, which makes static resource control possible in our setting, and enhance it with a rich notion of resources .


Related Articles

  • Vulnerability Scanning.  // Network Dictionary;2007, p520 

    An encyclopedia entry for "Vulnerability Scanning" in computer security is presented. It refers to the process of using some software or hardware tools to identify vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened....

  • 10-Step Security. O'Reilly, Dennis // PCWorld;Nov2005, Vol. 23 Issue 11, p119 

    The article offers step-by-step instructions that will help protect computer hardware, software, and data from computer viruses. It outlines examples of computer security software, techniques that can be used to protect your data, and how to use the Windows Security Center.

  • IDS/IPS may offer the perfect partnership for IT security management. Cracknell, Phil // Computer Weekly;8/30/2005, p7 

    The article presents information about the benefits of using mobile adaptive security systems. A common criticism of many operating system suppliers and their history of patching is either that the patches themselves cause new problems, or that they are not developed and released quickly enough...

  • Hardware versus Software Approaches to Encrypting Data for Security. Toubbe, Karim // Database Trends & Applications;Dec2005, Vol. 19 Issue 12, p16 

    The article focuses on the use of data encryption by business enterprises to combat data theft and to ensure compliance with a range of legislative and industry mandates. The two types of approaches in considering encryption is the deployment of software-based products and the hardware-based...

  • Design Flow Instantiation for Run-Time Reconfigurable Systems: A Case Study. Yang Qu; Tiensyrjä, Kari; Soininen, Juha-Pekka; Nurmi, Jari // EURASIP Journal on Embedded Systems;2008 Special Issue 1, p1 

    Reconfigurable system is a promising alternative to deliver both flexibility and performance at the same time. New reconfigurable technologies and technology-dependent tools have been developed, but a complete overview of the whole design flow for run-time reconfigurable systems is missing. In...

  • PRODUCT PREVIEWS. McCown, Sean; Rash, Wayne // InfoWorld;8/9/2004, Vol. 26 Issue 32, p12 

    The article evaluates computer software and hardware. Sun Microsystems introduced its Sun Fire V40z, a 3U server based on as many as four AMD Opteron 800 series processors. The system ships preinstalled with either the x86 version of Sun's Solaris 9, Red Hat Enterprise Linux, or SusE Linux...

  • XFire helps pinpoint Web application bugs. Powell, Thomas // Network World;8/2/2004, Vol. 21 Issue 31, p36 

    Modern Web applications are a conglomerate of many individual moving parts. Web server software and hardware, application servers, database systems, custom developed applications, a variety of network devices, the network transport and, of course, the ever-present Web browser all present...

  • Two-factor authentication.  // SC Magazine: For IT Security Professionals (UK Edition);Dec2004, p47 

    Evaluates several two-factor authentication products and software. Novell Netware Version 6.5 from Novell Inc.; KeyCrypt Version 5.0 from DigiSafe Pte Ltd.; Digital Persona Pro for Active Directory from DigitalPersona Inc.; Passholder Pro from Pointserve Data Ltd.

  • The synthesis of nonlinear operations for cryptographic transformation. Babenko, V.; Melnyk, O.; Stabetska, T. // Ukrainian Scientific Journal of Information Security;2014, Vol. 20 Issue 2, p143 

    In this paper we develop rules for the synthesis of nonlinear direct and reverse cryptographic transformation, as well as formalized the model of construction of elementary functions of extended matrix cryptographic transformation. With the use of matrix models describing the operation extended...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics