{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:30:27Z","timestamp":1761597027220},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540430759"},{"type":"electronic","value":"9783540455752"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45575-2_22","type":"book-chapter","created":{"date-parts":[[2007,5,30]],"date-time":"2007-05-30T21:30:22Z","timestamp":1180560622000},"page":"225-239","source":"Crossref","is-referenced-by-count":20,"title":["The Impact of Synchronisation on Secure Information Flow in Concurrent Programs"],"prefix":"10.1007","author":[{"given":"Andrei","family":"Sabelfeld","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,12,18]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"M. Abadi, A. Banerjee, N. Heintze, and J. Riecke. A core calculus of dependency. In POPL\u201999, Proceedings of the 26th Annual ACM Symposium on Principles of Programming Languages (January 1999), 1999.","DOI":"10.1145\/292540.292555"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"J. Agat. Transforming out timing leaks. In Proceedings of the ACM Symposium on Principles of Programming Languages, pages 40\u201353, January 2000.","DOI":"10.1145\/325694.325702"},{"key":"22_CR3","unstructured":"J. Agat and D. Sands. On Confidentiality and Algorithms. In Proceedings of 2001 IEEE Symposium on Security and Privacy, May 2001."},{"issue":"1","key":"22_CR4","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/357084.357088","volume":"2","author":"G. R. Andrews","year":"1980","unstructured":"G. R. Andrews and R. P. Reitman. An axiomatic approach to information flow in programs. ACM TOPLAS, 2(1):56\u201375, January 1980.","journal-title":"ACM TOPLAS"},{"key":"22_CR5","unstructured":"Gregory R. Andrews. Foundations of Multithreaded, Parallel, and Distributed Programming. Addison Wesley, 2000."},{"key":"22_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-58618-0_56","volume-title":"Compile-time detection of information flow in sequential programs","author":"J.-P. Banatre","year":"1994","unstructured":"J.-P. Banatre, C. Bryce, and D. Le Metayer. Compile-time detection of information flow in sequential programs. LNCS, 875:55\u201373, 1994."},{"key":"22_CR7","unstructured":"E. S. Cohen. Information transmission in sequential programs. In Richard A. DeMillo, David P. Dobkin, Anita K. Jones, and Richard J. Lipton, editors, Foundations of Secure Computation, pages 297\u2013335. Academic Press, 1978."},{"issue":"5","key":"22_CR8","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D. E. Denning","year":"1976","unstructured":"D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236\u2013243, May 1976.","journal-title":"Communications of the ACM"},{"issue":"7","key":"22_CR9","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D. E. Denning","year":"1977","unstructured":"D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504\u2013513, July 1977.","journal-title":"Communications of the ACM"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"E.W. Dijkstra. Cooperating sequential processes. In F. Genuys, editor, Programming Languages, pages 43\u2013112. Academic Press, 1968.","DOI":"10.1007\/978-1-4757-3472-0_2"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"N. Heintze and J. G. Riecke. The SLam calculus: programming with secrecy and integrity. In Conference Record of the Twenty-Fifth Annual ACM Symposium on Principles of Programming Languages, pages 365\u2013377, 1998.","DOI":"10.1145\/268946.268976"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"K. R. M. Leino and Rajeev Joshi. A semantic approach to secure information flow. Science of Computer Programming, 37(1), 2000.","DOI":"10.1016\/S0167-6423(99)00024-6"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"D. McCullough. Specifications for multi-level security and hook-up property. In Proceedings of the IEEE Symposium on Security and Privacy, pages 161\u2013166, 1987.","DOI":"10.1109\/SP.1987.10009"},{"issue":"6A","key":"22_CR14","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/BF03180570","volume":"4","author":"M. Mizuno","year":"1992","unstructured":"M. Mizuno and D. Schmidt. A security flow control algorithm and its denotational semantics correctness proof. Formal Aspects of Computing, 4(6A):727\u2013754, 1992.","journal-title":"Formal Aspects of Computing"},{"key":"22_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1007\/3-540-59293-8_221","volume-title":"Can you Trust your Data?","author":"P. \u00d8rb\u00e6k","year":"1995","unstructured":"P. \u00d8rb\u00e6k. Can you Trust your Data? In Proceedings of the TAPSOFT\/FASE\u201995 Conference, LNCS 915, pages 575\u2013590, May 1995."},{"key":"22_CR16","unstructured":"A. Sabelfeld. Semantic Models for the Security of Sequential and Concurrent Programs. PhD thesis, Chalmers University of Technology and G\u00f6teborg University, May 2001."},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"A. Sabelfeld and D. Sands. Probabilistic noninterference for multi-threaded programs. In Proceedings of the 13th IEEE Computer Security Foundations Workshop, pages 200\u2013214, Cambridge, England, July 2000.","DOI":"10.1109\/CSFW.2000.856937"},{"issue":"1","key":"22_CR18","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1023\/A:1011553200337","volume":"14","author":"A. Sabelfeld","year":"2001","unstructured":"A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher-Order and Symbolic Computation, 14(1):59\u201391, March 2001.","journal-title":"Higher-Order and Symbolic Computation"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"G. Smith. Personal communication, 2000.","DOI":"10.1525\/california\/9780520215429.003.0010"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"G. Smith and D. Volpano. Secure information flow in a multi-threaded imperative language. In Proceedings of the 25th ACM Symposium on Principles of Programming Languages, pages 355\u2013364, 19\u201321 January 1998.","DOI":"10.1145\/268946.268975"},{"issue":"2","key":"22_CR21","doi-asserted-by":"crossref","first-page":"231","DOI":"10.3233\/JCS-1999-72-305","volume":"7","author":"D. Volpano","year":"1999","unstructured":"D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. Journal of Computer Security, 7(2,3):231\u2013253, November 1999.","journal-title":"Journal of Computer Security"},{"issue":"3","key":"22_CR22","first-page":"1","volume":"4","author":"D. Volpano","year":"1996","unstructured":"D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):1\u201321, 1996.","journal-title":"J. Computer Security"}],"container-title":["Lecture Notes in Computer Science","Perspectives of System Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45575-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T09:35:15Z","timestamp":1556444115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45575-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540430759","9783540455752"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-45575-2_22","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}