{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:03:37Z","timestamp":1743073417565,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_24","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T11:26:42Z","timestamp":1163590002000},"page":"332-351","source":"Crossref","is-referenced-by-count":23,"title":["Provably Correct Runtime Enforcement of Non-interference Properties"],"prefix":"10.1007","author":[{"given":"V. N.","family":"Venkatakrishnan","sequence":"first","affiliation":[]},{"given":"Wei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Daniel C.","family":"DuVarney","sequence":"additional","affiliation":[]},{"given":"R.","family":"Sekar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"24_CR1","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/357084.357088","volume":"2","author":"G.R. Andrews","year":"1980","unstructured":"Andrews, G.R., Reitman, R.P.: An axiomatic approach to information flow in programs. ACM Transactions on Programming Languages and Systems (TOPLAS)\u00a02(1), 56\u201375 (1980)","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"key":"24_CR2","unstructured":"Banerjee, A., Naumann, D.A.: Using access control for secure information flow in a java-like language. In: Proc. IEEE Computer Security Foundations Workshop (2003)"},{"key":"24_CR3","unstructured":"Barthe, G., D\u2019Argenio, P., Rezk, T.: Secure information flow by self-composition. In: Proc. IEEE Computer Security Foundations Workshop (2004)"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Barthe, G., Rezk, T., Naumann, D.: Deriving an information flow checker and certifying compiler for java. In: IEEE Symposium on Security and Privacy (2006)","DOI":"10.1109\/SP.2006.13"},{"key":"24_CR5","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations. Technical Report MTR-2547, vol. 1, MITRE Corp. (1973)"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Beres, Y., Dalton, C.: Dynamic label binding at run-time. In: New Security Paradigms Workshop (2003)","DOI":"10.1145\/986655.986662"},{"key":"24_CR7","unstructured":"Broadwell, P., Harren, M., Sastry, N.: Scrash: A system for generating security crash information. In: USENIX Security Symposium (2003)"},{"key":"24_CR8","unstructured":"Chen, S., Xu, J., Nakka, N., Kalbarczyk, Z., Iyer, R.K.: Defeating memory corruption attacks via pointer taintedness detection. In: IEEE International Conference on Dependable Systems and Networks (DSN) (2005)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Cooper, K.D., Kennedy, K.: Interprocedural side-effect analysis in linear time. In: Programming Languages Design and Implementation (PLDI) (1988)","DOI":"10.1145\/53990.53996"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-540-32004-3_20","volume-title":"Security in Pervasive Computing","author":"A. Darvas","year":"2005","unstructured":"Darvas, A., H\u00e4hnle, R., Sands, D.: A theorem proving approach to analysis of secure information flow. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol.\u00a03450, pp. 193\u2013209. Springer, Heidelberg (2005)"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Das, M.: Unification-based pointer analysis with directional assignments. In: Programming Languages Design and Implementation (PLDI) (2000)","DOI":"10.1145\/349299.349309"},{"issue":"7","key":"24_CR12","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D.E. Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Comm. of the ACM"},{"issue":"2","key":"24_CR13","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1093\/comjnl\/17.2.143","volume":"17","author":"J.S. Fenton","year":"1974","unstructured":"Fenton, J.S.: Memoryless subsystems. Computing J.\u00a017(2), 143\u2013147 (1974)","journal-title":"Computing J."},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and Privacy, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"24_CR15","unstructured":"Guernic, G.L., Jensen, T.: Monitoring information flow. In: Workshop on Foundations of Computer Security (2005)"},{"issue":"1\u20133","key":"24_CR16","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/S0167-6423(99)00024-6","volume":"37","author":"R. Joshi","year":"2000","unstructured":"Joshi, R., Leino, K.R.M.: A semantic approach to secure information flow. Science of Computer Programming\u00a037(1\u20133), 113\u2013138 (2000)","journal-title":"Science of Computer Programming"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Li, P., Zdancewic, S.: Downgrading policies and relaxed noninterference. In: ACM Symposium on Principles of Programming Languages (POPL) (2005)","DOI":"10.1145\/1040305.1040319"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"McLean, J.: Proving noninterference and functional correctness using traces. Journal of Computer Security\u00a01(1) (1992)","DOI":"10.3233\/JCS-1992-1103"},{"key":"24_CR19","unstructured":"Myers, A., Sabelfeld, A., Zdancewic, S.: Enforcing robust declassification. In: Proc. IEEE Computer Security Foundations Workshop (2004)"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: Practical mostly-static information flow control. In: ACM Symposium on Principles of Programming Languages (POPL), pp. 228\u2013241 (1999)","DOI":"10.1145\/292540.292561"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Myers, A.C., Liskov, B.: Complete, safe information flow with decentralized labels. In: IEEE Symposium on Security and Privacy, pp. 186\u2013197 (1998)","DOI":"10.1109\/SECPRI.1998.674834"},{"key":"24_CR22","unstructured":"Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Network and Distributed System Security Symposium (NDSS) (2005)"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Pottier, F., Simonet, V.: Information flow inference for ml. In: ACM Symposium on Principles of Programming Languages (POPL) (2002)","DOI":"10.1145\/503272.503302"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Selected Areas in Communications\u00a021(1) (2003)","DOI":"10.1109\/JSAC.2002.806121"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Transactions on Information and System Security (TISSEC)\u00a03(1) (2001)","DOI":"10.1145\/353323.353382"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. In: International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 85\u201396 (2004)","DOI":"10.1145\/1024393.1024404"},{"key":"24_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/11547662_24","volume-title":"Static Analysis","author":"T. Terauchi","year":"2005","unstructured":"Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol.\u00a03672, pp. 352\u2013367. Springer, Heidelberg (2005)"},{"key":"24_CR28","unstructured":"Tse, S., Zdancewic, S.: Run-time principals in information-flow type systems. In: IEEE Symposium on Security and Privacy (2004)"},{"key":"24_CR29","unstructured":"Venkatakrishnan, V.N., DuVarney, D.C., Xu, W., Sekar, R.: A program transformation technique for enforcement of information flow properties. Technical Report SECLAB-04-01, Department of Computer Science, Stony Brook University (2004)"},{"key":"24_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/3-540-48294-6_20","volume-title":"Static Analysis","author":"D. Volpano","year":"1999","unstructured":"Volpano, D.: Safety versus secrecy. In: Cortesi, A., Fil\u00e9, G. (eds.) SAS 1999. LNCS, vol.\u00a01694, pp. 303\u2013311. Springer, Heidelberg (1999)"},{"issue":"3","key":"24_CR31","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. Journal of Computer Security (JCS)\u00a04(3), 167\u2013187 (1996)","journal-title":"Journal of Computer Security (JCS)"},{"key":"24_CR32","volume-title":"Programming Perl","author":"L. Wall","year":"1996","unstructured":"Wall, L., Christiansen, T., Schwartz, R.: Programming Perl. O\u2019Reilly, Sebastopol (1996)"},{"key":"24_CR33","doi-asserted-by":"crossref","unstructured":"Whaley, J., Lam, M.S.: Cloning-based context-sensitive pointer alias analysis using binary decision diagrams. In: Programming Languages Design and Implementation (PLDI) (2004)","DOI":"10.1145\/996841.996859"},{"key":"24_CR34","unstructured":"Xu, W., Bhatkar, S., Sekar, R.: Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In: USENIX Security Symposium (2006)"},{"key":"24_CR35","doi-asserted-by":"crossref","unstructured":"Zheng, L., Myers, A.: Dynamic security labels and noninterference. In: Workshop on Formal Aspects in Security and Trust (FAST) (2004)","DOI":"10.1007\/0-387-24098-5_3"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T23:14:41Z","timestamp":1736637281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/11935308_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}