{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:29:01Z","timestamp":1761596941017},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540304951"},{"type":"electronic","value":"9783540324195"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11590156_14","type":"book-chapter","created":{"date-parts":[[2005,12,5]],"date-time":"2005-12-05T15:43:16Z","timestamp":1133797396000},"page":"177-188","source":"Crossref","is-referenced-by-count":2,"title":["Non-disclosure for Distributed Mobile Code"],"prefix":"10.1007","author":[{"given":"Ana Almeida","family":"Matos","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Almeida Matos, A., Boudol, G.: On declassification and the nondisclosure policy. In: CSFW (2005)"},{"key":"14_CR2","unstructured":"Almeida Matos, A., Boudol, G., Castellani, I.: Typing noninterference for reactive programs. In: FCS. TUCS General Publications, vol.\u00a031 (2004)"},{"issue":"1","key":"14_CR3","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0304-3975(02)00010-5","volume":"281","author":"G. Boudol","year":"2002","unstructured":"Boudol, G., Castellani, I.: Noninterference for concurrent programs and thread systems. Theoretical Computer Science\u00a0281(1), 109\u2013130 (2002)","journal-title":"Theoretical Computer Science"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/3-540-45500-0_2","volume-title":"Theoretical Aspects of Computer Software","author":"M. Bugliesi","year":"2001","unstructured":"Bugliesi, M., Castagna, G., Crafa, S.: Boxed ambients. In: Kobayashi, N., Pierce, B.C. (eds.) TACS 2001. LNCS, vol.\u00a02215, p. 38. Springer, Heidelberg (2001)"},{"key":"14_CR5","unstructured":"Boudol, G., Castellani, I., Germain, F., Lacoste, M.: Analysis of formal models of distribution and mobility: state of the art. Mikado D1.1.1 (2002)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-540-24725-8_17","volume-title":"Programming Languages and Systems","author":"G. Boudol","year":"2004","unstructured":"Boudol, G.: ULM, a core programming model for global computing. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol.\u00a02986, pp. 234\u2013248. Springer, Heidelberg (2004)"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/11560647_24","volume-title":"Theoretical Aspects of Computing \u2013 ICTAC 2005","author":"G. Boudol","year":"2005","unstructured":"Boudol, G.: On typing information flow. In: Van Hung, D., Wirsing, M. (eds.) ICTAC 2005. LNCS, vol.\u00a03722, pp. 366\u2013380. Springer, Heidelberg (2005)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Crafa, S., Bugliesi, M., Castagna, G.: Information flow security for boxed ambients. In: F-WAN. ENTCS, vol.\u00a066(3) (2002)","DOI":"10.1016\/S1571-0661(04)80417-1"},{"issue":"5","key":"14_CR9","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Communications of the ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Communications of the ACM"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Symposium on Security and Privacy (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/3-540-45022-X_35","volume-title":"Automata, Languages and Programming","author":"M. Hennessy","year":"2000","unstructured":"Hennessy, M., Riely, J.: Information flow vs resource access in the asynchronous pi-calculus. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol.\u00a01853, p. 415. Springer, Heidelberg (2000)"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/3-540-46425-5_12","volume-title":"Programming Languages and Systems","author":"K. Honda","year":"2000","unstructured":"Honda, K., Vasconcelos, V., Yoshida, N.: Secure information flow as typed process behaviour. In: Smolka, G. (ed.) ESOP 2000. LNCS, vol.\u00a01782, p. 180. Springer, Heidelberg (2000)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Lucassen, J.M., Gifford, D.K.: Polymorphic effect systems. In: POPL (1988)","DOI":"10.1145\/73560.73564"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Myers, A., Liskov, B.: Complete, safe information flow with decentralized labels. In: Symposium on Security and Privacy (1998)","DOI":"10.1109\/SECPRI.1998.674834"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A.: The impact of synchronization on secure information flow in concurrent programs. In: Andrei Ershov International Conference on Perspectives of System Informatics (2001)","DOI":"10.1007\/3-540-45575-2_22"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Mantel, H.: Static confidentiality enforcement for distributed programs. In: CCL 1999. LNCS, vol.\u00a02477 (2002)","DOI":"10.1007\/3-540-45789-5_27"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Myers, A.: Language-based information-flow security. Journal on Selected Areas in Communications\u00a021(1) (2003)","DOI":"10.1109\/JSAC.2002.806121"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Smith, G.: A new type system for secure information flow. In: CSFW (2001)","DOI":"10.1109\/CSFW.2001.930141"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. In: CSFW (2005)","DOI":"10.1109\/CSFW.2005.15"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: POPL (1998)","DOI":"10.1145\/268946.268975"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. Journal of Computer Security\u00a04(3) (1996)","DOI":"10.3233\/JCS-1996-42-304"},{"issue":"3","key":"14_CR22","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1145\/566340.566343","volume":"20","author":"S. Zdancewic","year":"2002","unstructured":"Zdancewic, S., Zheng, L., Nystrom, N., Myers, A.C.: Secure program partitioning. ACM Transactions in Computer Systems\u00a020(3), 283\u2013328 (2002)","journal-title":"ACM Transactions in Computer Systems"}],"container-title":["Lecture Notes in Computer Science","FSTTCS 2005: Foundations of Software Technology and Theoretical Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11590156_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:49:05Z","timestamp":1619506145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11590156_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540304951","9783540324195"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11590156_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}