{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:52:38Z","timestamp":1725573158689},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540279921"},{"type":"electronic","value":"9783540317258"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11531142_21","type":"book-chapter","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T17:28:49Z","timestamp":1292866129000},"page":"479-503","source":"Crossref","is-referenced-by-count":9,"title":["A Type System for Reachability and Acyclicity"],"prefix":"10.1007","author":[{"given":"Yi","family":"Lu","sequence":"first","affiliation":[]},{"given":"John","family":"Potter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24851-4_1","volume-title":"ECOOP 2004 \u2013 Object-Oriented Programming","author":"J. Aldrich","year":"2004","unstructured":"Aldrich, J., Chambers, C.: Ownership domains: Separating aliasing policy from mechanism. In: Odersky, M. (ed.) ECOOP 2004. LNCS, vol.\u00a03086, pp. 1\u201325. Springer, Heidelberg (2004)"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/BFb0053373","volume-title":"ECOOP \u201997 - Object-Oriented Programming","author":"P.S. Almeida","year":"1997","unstructured":"Almeida, P.S.: Balloon types: Controlling sharing of state in data types. In: Aksit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol.\u00a01241, pp. 32\u201359. Springer, Heidelberg (1997)"},{"key":"21_CR3","unstructured":"Barnett, M., DeLine, R., F\u00e4hndrich, M., Leino, K.R.M., Schulte, W.: Verification of object-oriented programs with invariants. In: Eisenbach, S., Leavens, G.T., M\u00fcller, P., Poetzsch-Heffter, A., Poll, E. (eds.) Formal Techniques for Java-like Programs (FTfJP) (July 2003) Published as Technical Report 408 from ETH Zurich"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Boyapati, C., Lee, R., Rinard, M.: Ownership types for safe programming: Preventing data races and deadlocks. In: Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA) (November 2002)","DOI":"10.1145\/582419.582440"},{"key":"21_CR5","unstructured":"Clarke, D.: Object Ownership and Containment. PhD thesis, School of Computer Science and Engineering, The University of New South Wales, Sydney, Australia (2001)"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45337-7_4","volume-title":"ECOOP 2001 - Object-Oriented Programming","author":"D.G. Clarke","year":"2001","unstructured":"Clarke, D.G., Noble, J., Potter, J.M.: Simple ownership types for object containment. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol.\u00a02072, p. 53. Springer, Heidelberg (2001)"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/286936.286947","volume-title":"Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications","author":"D.G. Clarke","year":"1998","unstructured":"Clarke, D.G., Potter, J.M., Noble, J.: Ownership types for flexible alias protection. In: Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, pp. 48\u201364. ACM Press, New York (1998)"},{"issue":"5","key":"21_CR8","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"issue":"7","key":"21_CR9","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D.E. Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Commun. ACM"},{"key":"21_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/237721.237724","volume-title":"Proceedings of the 23rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages","author":"R. Ghiya","year":"1996","unstructured":"Ghiya, R., Hendren, L.J.: Is it a tree, a dag, or a cyclic graph? a shape analysis for heap-directed pointers in c. In: Proceedings of the 23rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 1\u201315. ACM Press, New York (1996)"},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1145\/512529.512563","volume-title":"Proceedings of the ACM SIGPLAN 2002 Conference on Programming language design and implementation","author":"D. Grossman","year":"2002","unstructured":"Grossman, D., Morrisett, G., Jim, T., Hicks, M., Wang, Y., Cheney, J.: Region-based memory management in cyclone. In: Proceedings of the ACM SIGPLAN 2002 Conference on Programming language design and implementation, pp. 282\u2013293. ACM Press, New York (2002)"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Hackett, B., Rugina, R.: Region-based shape analysis with tracked locations. In: POPL, pp. 310\u2013323 (2005)","DOI":"10.1145\/1040305.1040331"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1145\/268946.268976","volume-title":"Conference record of POPL \u201998: the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"N. Heintze","year":"1998","unstructured":"Heintze, N., Riecke, J.G.: The SLam calculus: programming with secrecy and integrity. In: Conference record of POPL \u201998: the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, California, January 19\u201321, pp. 365\u2013377. ACM Press, New York (1998)"},{"key":"21_CR14","first-page":"249","volume-title":"Proceedings of the Conference on Programming Language Design and Implementation (PLDI)","author":"L.J. Hendren","year":"1992","unstructured":"Hendren, L.J., Hummel, J., Nicolau, A.: Abstractions for recursive pointer data structures: Improving the analysis and transformation of imperative programs. In: Proceedings of the Conference on Programming Language Design and Implementation (PLDI), vol.\u00a027, pp. 249\u2013260. ACM Press, New York (1992)"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/379605.379665","volume-title":"Proceedings of the 2001 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering","author":"M. Hind","year":"2001","unstructured":"Hind, M.: Pointer analysis: haven\u2019t we solved this problem yet? In: Proceedings of the 2001 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, pp. 54\u201361. ACM Press, New York (2001)"},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1145\/117954.117975","volume-title":"Conference proceedings on Object-oriented programming systems, languages, and applications","author":"J. Hogg","year":"1991","unstructured":"Hogg, J.: Islands: aliasing protection in object-oriented languages. In: Conference proceedings on Object-oriented programming systems, languages, and applications, pp. 271\u2013285. ACM Press, New York (1991)"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Hummel, J., Hendren, L.J., Nicolau, A.: A language for conveying the aliasing properties of dynamic, pointer-based data structures. In: 8th International Parallel Processing Symposium, Cancun, Mexico, pp. 208\u2013216 (1994)","DOI":"10.1109\/IPPS.1994.288299"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/3-540-47993-7_19","volume-title":"ECOOP 2002 - Object-Oriented Programming","author":"A. Igarashi","year":"2002","unstructured":"Igarashi, A., Viroli, M.: On variance-based subtyping for parametric types. In: Magnusson, B. (ed.) ECOOP 2002. LNCS, vol.\u00a02374, pp. 441\u2013469. Springer, Heidelberg (2002)"},{"key":"21_CR19","unstructured":"M\u00fcller, P., Poetzsch-Heffter, A.: Universes: A type system for controlling representation exposure. Programming Languages and Fundamentals of Programming (1999)"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: Practical mostly-static information flow control. In: Symposium on Principles of Programming Languages, pp. 228\u2013241 (1999)","DOI":"10.1145\/292540.292561"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/978-3-540-24851-4_22","volume-title":"ECOOP 2004 \u2013 Object-Oriented Programming","author":"K. Rustan","year":"2004","unstructured":"Rustan, K., Leino, M., M\u00fcller, P.: Object invariants in dynamic contexts. In: Odersky, M. (ed.) ECOOP 2004. LNCS, vol.\u00a03086, pp. 491\u2013515. Springer, Heidelberg (2004)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Tofte, M., Talpin, J.-P.: Implementation of the typed call-by-value lambda-calculus using a stack of regions. In: Symposium on Principles of Programming Languages, pp. 188\u2013201 (1994)","DOI":"10.1145\/174675.177855"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Tofte, M., Talpin, J.-P.: Region-based memory management. Information and Computation (1997)","DOI":"10.1006\/inco.1996.2613"},{"issue":"3","key":"21_CR24","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. Journal of Computer Security\u00a04(3), 167\u2013187 (1996)","journal-title":"Journal of Computer Security"},{"key":"21_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/BFb0030629","volume-title":"TAPSOFT\u201997: Theory and Practice of Software Development","author":"D.M. Volpano","year":"1997","unstructured":"Volpano, D.M., Smith, G.: A type-based approach to program security. In: Bidoit, M., Dauchet, M. (eds.) CAAP 1997, FASE 1997, and TAPSOFT 1997. LNCS, vol.\u00a01214, pp. 607\u2013621. Springer, Heidelberg (1997)"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Wilhelm, R., Sagiv, S., Reps, T.W.: Shape analysis. In: Computational Complexity, pp. 1\u201317 (2000)","DOI":"10.1007\/3-540-46423-9_1"}],"container-title":["Lecture Notes in Computer Science","ECOOP 2005 - Object-Oriented Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11531142_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:08:46Z","timestamp":1605643726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11531142_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540279921","9783540317258"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/11531142_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}