{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:19:56Z","timestamp":1743142796428,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540428800"},{"type":"electronic","value":"9783540456001"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45600-7_33","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T12:21:49Z","timestamp":1186834909000},"page":"292-303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes"],"prefix":"10.1007","author":[{"given":"Shigeta","family":"Kuninobu","sequence":"first","affiliation":[]},{"given":"Yoshiaki","family":"Takata","sequence":"additional","affiliation":[]},{"given":"Hiroyuki","family":"Seki","sequence":"additional","affiliation":[]},{"given":"Katsuro","family":"Inoue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"33_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-58618-0_56","volume-title":"3rd ESORICS","author":"J. Ban\u00e2tre","year":"1994","unstructured":"J. Ban\u00e2tre, C. Bryce and D. Le M\u00e9tayer: Compile-time detection of information flow in sequential programs, 3rd ESORICS, LNCS 875, 55\u201373, 1994."},{"issue":"5","key":"33_CR2","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D. E. Denning","year":"1976","unstructured":"D. E. Denning: A lattice model of secure information flow, Communications of the ACM, 19(5), 236\u2013243, 1976.","journal-title":"Communications of the ACM"},{"issue":"7","key":"33_CR3","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D. E. Denning","year":"1977","unstructured":"D. E. Denning and P. J. Denning: Certification of programs for secure information flow, Communications of the ACM, 20(7), 504\u2013513, 1977.","journal-title":"Communications of the ACM"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"N. Heintze and J. G. Riecke: The SLam calculus: Programming with secrecy and integrity, 25thACMSymp. on Principles of Programming Languages, 365\u2013377, 1998.","DOI":"10.1145\/268946.268976"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"T. Jensen, D. Le M\u00e9tayer and T. Thorn: Verification of control flow based security properties, 1999 IEEE Symp. on Security and Privacy, 89\u2013103, 1999.","DOI":"10.1109\/SECPRI.1999.766902"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"X. Leroy and F. Rouaix: Security properties of typed appletes, 25th ACM Symp. on Principles of Programming Languages, 391\u2013403, 1998.","DOI":"10.1145\/268946.268979"},{"key":"33_CR7","unstructured":"J. Mitchell: Foundations of Programming Languages, The MIT Press, 1996."},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"A. C. Myers: JFLOW: Practical mostly-static information flow control, 26th ACM Symp. on Principles of Progmming Languages, 228\u2013241, 1999.","DOI":"10.1145\/292540.292561"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"A. C. Myers and B. Liskov: Complete, safe information flowwith decentralized labels, 1998 IEEE Symp. on Security and Privacy, 186\u2013197.","DOI":"10.1109\/SECPRI.1998.674834"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"N. Nitta, Y. Takata and H. Seki: Security verification of programs with stack inspection, 6th ACM Symp. on Access Control Models and Technologies, 31\u201340, 2001.","DOI":"10.1145\/373256.373260"},{"key":"33_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1007\/3-540-59293-8_221","volume-title":"TAPSOFT\u201995","author":"P. \u00d8rb\u00e6k","year":"1995","unstructured":"P. \u00d8rb\u00e6k: Can you trust your data? TAPSOFT\u201995, LNCS 915, 575\u2013589."},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"G. Smith and D. Volpano: Secure information flow in a muti-threaded imperative language, 25th ACM Symp. on Principles of Programming Languages, 355\u2013364, 1998.","DOI":"10.1145\/268946.268975"},{"key":"33_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1007\/BFb0030629","volume-title":"TAPSOFT\u201997","author":"D. Volpano","year":"1997","unstructured":"D. Volpano and G. Smith:A type-based approach to program security, TAPSOFT\u201997, LNCS 1214, 607\u2013621."},{"key":"33_CR14","unstructured":"R. Yokomori: Security analysis algorithm for object-oriented programs, Master\u2019s Thesis, Osaka University, 2001."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45600-7_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T08:19:17Z","timestamp":1737361157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/3-540-45600-7_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540428800","9783540456001"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-45600-7_33","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"24 October 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}