{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:28:52Z","timestamp":1761596932539},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540291077"},{"type":"electronic","value":"9783540320722"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11560647_24","type":"book-chapter","created":{"date-parts":[[2005,10,20]],"date-time":"2005-10-20T10:04:06Z","timestamp":1129802646000},"page":"366-380","source":"Crossref","is-referenced-by-count":18,"title":["On Typing Information Flow"],"prefix":"10.1007","author":[{"given":"G\u00e9rard","family":"Boudol","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Almeida Matos, A., Boudol, G.: On declassification and the non-disclosure policy. To appear in the proceedings of the 18th IEEE Computer Security Foundations Workshop (2005)"},{"issue":"1","key":"24_CR2","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0304-3975(02)00010-5","volume":"281","author":"G. Boudol","year":"2002","unstructured":"Boudol, G., Castellani, I.: Non-interference for concurrent programs and thread systems. Theoretical Comput. Sci.\u00a0281(1), 109\u2013130 (2002)","journal-title":"Theoretical Comput. Sci."},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Cohen, E.: Information transmission in computational systems. In: 6th ACM Symp. on Operating Systems Principles, pp. 133\u2013139 (1977)","DOI":"10.1145\/1067625.806556"},{"issue":"2","key":"24_CR4","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1017\/S0956796804005441","volume":"15","author":"K. Crary","year":"2005","unstructured":"Crary, K., Kliger, A., Pfenning, F.: A monadic analysis of information flow security with mutable state. J. of Functional Programming\u00a015(2), 249\u2013291 (2005)","journal-title":"J. of Functional Programming"},{"issue":"5","key":"24_CR5","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. CACM\u00a019(5), 236\u2013243 (1976)","journal-title":"CACM"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: IEEE Symp. on Security and Privacy, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Heintze, N., Riecke, J.: The SLam calculus: programming with secrecy and integrity. In: POPL 1998, pp. 365\u2013377 (1998)","DOI":"10.1145\/268946.268976"},{"key":"24_CR8","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1093\/comjnl\/6.4.308","volume":"6","author":"P.J. Landin","year":"1964","unstructured":"Landin, P.J.: The mechanical evaluation of expressions. Computer Journal\u00a06, 308\u2013320 (1964)","journal-title":"Computer Journal"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Lucassen, J.M., Gifford, D.K.: Polymorphic effect systems. In: POPL 1988, pp. 47\u201357 (1988)","DOI":"10.1145\/73560.73564"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Myers, A.: JFlow: practical mostly-static information flow control. In: POPL 1999 (1999)","DOI":"10.1145\/292540.292561"},{"issue":"1","key":"24_CR11","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/596980.596983","volume":"25","author":"F. Pottier","year":"2003","unstructured":"Pottier, F., Simonet, V.: Information flow inference for ML. ACM TOPLAS\u00a025(1), 117\u2013158 (2003)","journal-title":"ACM TOPLAS"},{"issue":"1","key":"24_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. on Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE J. on Selected Areas in Communications"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: CSFW 2000 (2000)","DOI":"10.1109\/CSFW.2000.856937"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. In: Proceedings of the 18th IEEE Computer Security Foundations Workshop (2005)","DOI":"10.1109\/CSFW.2005.15"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Smith, G.: A new type system for secure information flow. In: CSFW 2001 (2001)","DOI":"10.1109\/CSFW.2001.930141"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: POPL 1998 (1998)","DOI":"10.1145\/268946.268975"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Volpano, D., Smith, G.: Eliminating covert flows with minimum typings. In: CSFW 1997, pp.\u00a0156\u2013168 (1997)","DOI":"10.1109\/CSFW.1997.596807"},{"issue":"3","key":"24_CR18","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. of Computer Security\u00a04(3), 167\u2013187 (1996)","journal-title":"J. of Computer Security"},{"key":"24_CR19","unstructured":"Zdancewic, S.: Programming Languages for Information Security, PhD Thesis, Cornell University (2002)"},{"key":"24_CR20","unstructured":"Zdancewic, S.: Challenges for information-flow security. In: PLID 2004 (2004)"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing \u2013 ICTAC 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11560647_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T07:08:08Z","timestamp":1586502488000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11560647_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540291077","9783540320722"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11560647_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}