{"title":"Boxed Safe Ambients with Password and Simulation of E-Mail System","authors":"Hua Jiang, Xiang Li","doi":"10.1109/ISITAE.2007.4409300","DOIUrl":null,"url":null,"abstract":"This page puts forward boxed safe ambients with password (BSAP), which can solve the side effect from open operation and strengthen the control capability of its own boundary in mobile ambients (MA). Compared to MA, BSAP has the following advantages: 1) cancels open operation in MA and adds the communication operation primitive between ambients and sub-ambients; 2) adds in, out operation and adds password to in, out operations; 3) adds the del operation for ambient reclamation. In the end of this page, the authors use BSAP to describe and simulate the e-mail system; it shows that BSAP has a powerful modeling and simulating capability in the area of network computing.","PeriodicalId":332503,"journal":{"name":"2007 First IEEE International Symposium on Information Technologies and Applications in Education","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 First IEEE International Symposium on Information Technologies and Applications in Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISITAE.2007.4409300","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This page puts forward boxed safe ambients with password (BSAP), which can solve the side effect from open operation and strengthen the control capability of its own boundary in mobile ambients (MA). Compared to MA, BSAP has the following advantages: 1) cancels open operation in MA and adds the communication operation primitive between ambients and sub-ambients; 2) adds in, out operation and adds password to in, out operations; 3) adds the del operation for ambient reclamation. In the end of this page, the authors use BSAP to describe and simulate the e-mail system; it shows that BSAP has a powerful modeling and simulating capability in the area of network computing.