Ambient Groups and Mobility Types

  • Luca Cardelli
  • Giorgio Ghelli
  • Andrew D. Gordon
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1872)


We add name groups and group creation to the typed ambient calculus. Group creation is surprisingly interesting: it has the effect of statically preventing certain communications, and can thus block the accidental or malicious escape of capabilities that is a major concern in practical systems. Moreover, ambient groups allow us to refine our earlier work on type systems for ambient mobility. We present type systems in which groups identify the set of ambients that a process may cross or open.


Type System Objective Move Exchange Type Typing Rule Message Type 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. [Aba97]
    M. Abadi. Secrecy by typing in security protocols. In Proceedings TACS’97, LNCS 1281, pages 611–638. Springer, 1997.Google Scholar
  2. [BDNN98]
    C. Bodei, P. Degano, F. Nielson, and H. Nielson. Control flow analysis for the π-calculus. In Proceedings Concur’98, LNCS 1466, pages 84–98. Springer, 1998.Google Scholar
  3. [CG98]
    L. Cardelli and A. D. Gordon. Mobile ambients. In Proceedings FoS-SaCS’’98, LNCS 1378, pages 140–155. Springer, 1998. Accepted for publication in Theoretical Computer Science.Google Scholar
  4. [CG99]
    L. Cardelli and A. D. Gordon. Types for mobile ambients. In Proceedings POPL’99, pages 79–92. ACM, 1999.Google Scholar
  5. [CGG99]
    L. Cardelli, G. Ghelli, and A. D. Gordon. Mobility types for mobile ambients. In Proceedings ICALP’99, LNCS 1644, pages 230–239. Springer, 1999.Google Scholar
  6. [CGG00]
    L. Cardelli, G. Ghelli, and A. D. Gordon. Types for the ambient calculus. Microsoft Research Technical Report, to appear.Google Scholar
  7. [GC99]
    A. D. Gordon and L. Cardelli. Equational properties of mobile ambients. In Proceedings FoSSaCS’99, LNCS 1578, pages 212–226. Springer, 1999.Google Scholar
  8. [LS00]
    F. Levi and D. Sangiorgi. Controlling interference in ambients. In Proceedings POPL’00, pages 352–364. ACM, 2000.Google Scholar
  9. [Mil99]
    R. Milner. Communicating and Mobile Systems: the π-Calculus. CUP, 1999.Google Scholar
  10. [NNHJ99]
    F. Nielson, H.R. Nielson, R.R. Hansen, and J.G. Jensen. Validating firewalls in mobile ambients. In Proceedings Concur’99, LNCS 1664, pages 463–477. Springer, 1999.Google Scholar
  11. [TT97]
    M. Tofte and J.-P. Talpin. Region-based memory management. Information and Computation, 132(2):109–176, 1997. Preliminary version in Proceedings POPL’94.zbMATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Luca Cardelli
    • 1
  • Giorgio Ghelli
    • 2
  • Andrew D. Gordon
    • 1
  1. 1.Microsoft ResearchUSA
  2. 2.Pisa UniversityItaly

Personalised recommendations