{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:02:04Z","timestamp":1725544924506},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540326281"},{"type":"electronic","value":"9783540326298"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11679219_15","type":"book-chapter","created":{"date-parts":[[2006,2,23]],"date-time":"2006-02-23T02:36:41Z","timestamp":1140662201000},"page":"203-216","source":"Crossref","is-referenced-by-count":1,"title":["Type-Based Distributed Access Control vs. Untyped Attackers"],"prefix":"10.1007","author":[{"given":"Tom","family":"Chothia","sequence":"first","affiliation":[]},{"given":"Dominic","family":"Duggan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"[Aba97]Abadi, M.: Secrecy by typing in security protocols. In: Theoretical Aspects of Computer Science, pp. 611\u2013638 (1997)","DOI":"10.1007\/BFb0014571"},{"key":"15_CR2","unstructured":"[AFG99] Abadi, M., Fournet, C., Gonthier, G.: Secure communications processing for distributed languages. In: IEEE Symposium on Security and Privacy (1999)"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"[AFG00] Abadi, M., Fournet, C., Gonthier, G.: Authentication primitives and their compilation. In: Proceedings of ACM Symposium on Principles of Programming Languages (2000)","DOI":"10.1145\/325694.325734"},{"issue":"1","key":"15_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"[AG99] Abadi, M., Gordon, A.: A calculus for cryptographic protocols: The spi calculus. Information and Computation\u00a0148(1), 1\u201370 (1999)","journal-title":"Information and Computation"},{"key":"15_CR5","volume-title":"Computer Security Foundations Workshop","author":"T. Chothia","year":"2003","unstructured":"[CDV03] Chothia, T., Duggan, D., Vitek, J.: Type-based distributed access control. In: Computer Security Foundations Workshop, Asilomar, California. IEEE, Los Alamitos (June 2003)"},{"key":"15_CR6","unstructured":"[CDV04] Chothia, T., Duggan, D., Vitek, J.: Principals, policies and keys in a secure distributed programming language. In: Foundations of Computer Security (2004)"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/3-540-44618-4_27","volume-title":"CONCUR 2000 - Concurrency Theory","author":"L. Cardelli","year":"2000","unstructured":"[CGG00] Cardelli, L., Ghelli, G., Gordon, A.D.: Secrecy and group creation. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol.\u00a01877, p. 365. Springer, Heidelberg (2000)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","first-page":"44","volume-title":"Secure Internet Programming","author":"G. Castagna","year":"1999","unstructured":"[CV99]Castagna, G., Vitek, J.: A calculus of secure mobile computations. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 44\u201377. Springer, Heidelberg (1999)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"[DD77] Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Communications of the ACM (1977)","DOI":"10.1145\/359636.359712"},{"key":"15_CR10","unstructured":"[Dug03] Duggan, D.: Type-based cryptographic operations. Journal of Computer Security (2003)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48749-2_5","volume-title":"Secure Internet Programming","author":"M. Hennessy","year":"1999","unstructured":"[HR99] Hennessy, M., Riely, J.: Type-safe execution of mobile agents in anonymous networks. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, Springer, Heidelberg (1999)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"[ML97] Myers, A.C., Liskov, B.: A decentralized model for information flow control. In: Symposium on Operating Systems Principles (1997)","DOI":"10.1145\/268998.266669"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"[Mye99] Myers., A.C.: Jflow: Practical mostly-static information flow control. In: Proceedings of ACM Symposium on Principles of Programming Languages, pp. 228\u2013241 (1999)","DOI":"10.1145\/292540.292561"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"[PC00] Pottier, F., Conchon, S.: Information flow inference for free. In: Proceedings of ACM International Conference on Functional Programming (2000)","DOI":"10.1145\/351240.351245"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"[RH99] Riely, J., Hennessy, M.: Trust and partial typing in open systems of mobile agents. In: Proceedings of ACM Symposium on Principles of Programming Languages (1999)","DOI":"10.1145\/292540.292551"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"[SM02] Sabelfeld, A., Myers, A.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications (2002)","DOI":"10.1109\/JSAC.2002.806121"},{"key":"15_CR17","volume-title":"Proceedings of the International Joint Conference on Theory and Practice of Software Development","author":"D. Volpano","year":"1997","unstructured":"[VS97] Volpano, D., Smith, G.: A type-based approach to program security. In: Proceedings of the International Joint Conference on Theory and Practice of Software Development. Springer, Heidelberg (1997)"},{"key":"15_CR18","volume-title":"IEEE Symposium on Security and Privacy","author":"L. Zheng","year":"2003","unstructured":"[ZCZM03]Zheng, L., Chong, S., Zdancewic, S., Myers, A.C.: Building secure distributed systems using replication and partitioning. In: IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos (2003)"},{"issue":"3","key":"15_CR19","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1145\/566340.566343","volume":"20","author":"S. Zdancewic","year":"2002","unstructured":"[ZZNM02] Zdancewic, S., Zheng, L., Nystrom, N., Myers, A.C.: Secure program partitioning. Transactions on Computer Systems\u00a020(3), 283\u2013328 (2002)","journal-title":"Transactions on Computer Systems"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11679219_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,6]],"date-time":"2023-05-06T11:44:31Z","timestamp":1683373471000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11679219_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540326281","9783540326298"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11679219_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}