{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:09:43Z","timestamp":1725559783163},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283720"},{"type":"electronic","value":"9783540318200"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11541868_14","type":"book-chapter","created":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T19:12:52Z","timestamp":1279653172000},"page":"211-226","source":"Crossref","is-referenced-by-count":12,"title":["Verifying a Secure Information Flow Analyzer"],"prefix":"10.1007","author":[{"given":"David A.","family":"Naumann","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Naumann, D.A.: Secure information flow and pointer confinement in a Java-like language. In: 15th IEEE Computer Security Foundations Workshop (2002)","DOI":"10.1109\/CSFW.2002.1021820"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Naumann, D.A.: Stack-based access control for secure information flow. Journal of Functional Programming\u00a015(2) (2003) (Special issue on Language Based Security)","DOI":"10.1017\/S0956796804005453"},{"key":"14_CR3","unstructured":"Banerjee, A., Naumann, D.A.: State based encapsulation and generics. Technical Report CS-2004-11, Stevens Institute of Technology (2004)"},{"key":"14_CR4","unstructured":"Bartels, F., Pfeifer, H., von Henke, F., Rue\u00df, H.: Mechanizing domain theory. Technical Report UIB-96-10 (1996)"},{"key":"14_CR5","volume-title":"Workshop on Issues in the Theory of Security (WITS)","author":"A. Darvas","year":"2003","unstructured":"Darvas, A., H\u00e4hnle, R., Sands, D.: A theorem proving approach to analysis of secure information flow. In: Workshop on Issues in the Theory of Security (WITS), ACM Press, New York (2003)"},{"key":"14_CR6","volume-title":"Inside Java 2 Platform Security","author":"L. Gong","year":"1999","unstructured":"Gong, L.: Inside Java 2 Platform Security. Addison-Wesley, Reading (1999)"},{"issue":"3","key":"14_CR7","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1145\/503502.503505","volume":"23","author":"A. Igarashi","year":"2001","unstructured":"Igarashi, A., Pierce, B., Wadler, P.: Featherweight Java: A minimal core calculus for Java and GJ. ACM Trans. Prog. Lang. Syst.\u00a023(3), 396\u2013459 (2001)","journal-title":"ACM Trans. Prog. Lang. Syst."},{"key":"14_CR8","volume-title":"Workshop on Issues in the Theory of Security (WITS)","author":"B. Jacobs","year":"2005","unstructured":"Jacobs, B., Pieters, W., Warnier, M.: Statically checking confidentiality via dynamic labels. In: Workshop on Issues in the Theory of Security (WITS). ACM Press, New York (2005)"},{"issue":"1\u20133","key":"14_CR9","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/S0167-6423(99)00024-6","volume":"37","author":"R. Joshi","year":"2000","unstructured":"Joshi, R., Leino, K.R.M.: A semantic approach to secure information flow. Science of Computer Programming\u00a037(1\u20133), 113\u2013138 (2000)","journal-title":"Science of Computer Programming"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Kennedy, A., Syme, D.: Design and implementation of generics for the .NET Common Language Runtime. In: Programming Language Design and Implementation (2001)","DOI":"10.1145\/378795.378797"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-39656-7_11","volume-title":"Formal Methods for Components and Objects","author":"G.T. Leavens","year":"2003","unstructured":"Leavens, G.T., Cheon, Y., Clifton, C., Ruby, C., Cok, D.R.: How the design of JML accommodates both runtime assertion checking and formal verification. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2002. LNCS, vol.\u00a02852, pp. 262\u2013284. Springer, Heidelberg (2003)"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-45793-3_16","volume-title":"Computer Science Logic","author":"P. Levy","year":"2002","unstructured":"Levy, P.: Possible world semantics for general storage in call-by-value. In: Bradfield, J.C. (ed.) CSL 2002 and EACSL 2002, vol.\u00a02471, p. 232. Springer, Heidelberg (2002)"},{"key":"14_CR13","series-title":"Lecture Notes in Artificial Intelligence","volume-title":"Automated Deduction - CADE-11","author":"S. Owre","year":"1992","unstructured":"Owre, S., Rushby, J.M., Shankar, N.: PVS: A prototype verification system. In: Kapur, D. (ed.) CADE 1992. LNCS (LNAI), vol.\u00a0607. Springer, Heidelberg (1992)"},{"key":"14_CR14","unstructured":"Rushby, J.: Noninterference, transitivity, and channel-control security policies. Technical report, SRI (December 1992)"},{"issue":"1","key":"14_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"14_CR16","unstructured":"Strecker, M.: Formal analysis of an information flow type system for MicroJava (extended version). Technical report, Technische Universit\u00e4t M\u00fcnchen (July 2003)"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-27864-1_9","volume-title":"Static Analysis","author":"Q. Sun","year":"2004","unstructured":"Sun, Q., Banerjee, A., Naumann, D.A.: Modular and constraint-based information flow inference for an object-oriented language. In: Giacobazzi, R. (ed.) SAS 2004. LNCS, vol.\u00a03148, pp. 84\u201399. Springer, Heidelberg (2004)"},{"key":"14_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0030629","volume-title":"TAPSOFT1997: Theory and Practice of Software Development","author":"D. Volpano","year":"1997","unstructured":"Volpano, D., Smith, G.: A type-based approach to program security. In: Bidoit, M., Dauchet, M. (eds.) CAAP 1997, FASE 1997, and TAPSOFT 1997, vol.\u00a01214. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Theorem Proving in Higher Order Logics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11541868_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:11Z","timestamp":1605644291000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11541868_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283720","9783540318200"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11541868_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}