{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:43:13Z","timestamp":1774946593916,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540443452","type":"print"},{"value":"9783540458531","type":"electronic"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45853-0_1","type":"book-chapter","created":{"date-parts":[[2007,5,4]],"date-time":"2007-05-04T00:42:13Z","timestamp":1178239333000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Computational Probabilistic Non-interference"],"prefix":"10.1007","author":[{"given":"Michael","family":"Backes","sequence":"first","affiliation":[]},{"given":"Birgit","family":"Pfitzmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"key":"1_CR1","unstructured":"M. Backes. Cryptographically sound analysis of security protocols. Ph.D thesis, Computer Science Department, Saarland University, 2002. Available at http:\/\/www-krypt.cs.uni-sb.de\/~mbackes\/diss.ps ."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"M. Backes, C. Jacobi, and B. Pfitzmann. Deriving cryptographically sound implementations using composition and formally verified bisimulation. In Proceedings of Formal Methods Europe 2002 (FME\u201902), Copenhagen, 2002.","DOI":"10.1007\/3-540-45614-7_18"},{"key":"1_CR3","volume-title":"Technical Report ESD-TR-75-306","author":"D. Bell","year":"1976","unstructured":"D. Bell and L. LaPadula. Secure computer systems: Unified exposition and multics interpretation. Technical Report ESD-TR-75-306, The Mitre Corporation, Bedford MA, USA, March 1976."},{"key":"1_CR4","unstructured":"D. Clark, C. Hankin, S. Hunt, and R. Nagarajan. Possibilistic information flow is safe for probabilistic non-interference. Workshop on Issues in the Theory of Security (WITS\u201900), available at http:\/\/www.doc.ic.ac.uk\/clh\/Papers\/witscnh.ps.gz ."},{"issue":"5","key":"1_CR5","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D. E. Denning","year":"1976","unstructured":"D. E. Denning. A lattice model of secure information flow. Communications of the ACM 19\/5 (1976) 236\u2013243.","journal-title":"Communications of the ACM"},{"key":"1_CR6","first-page":"11","volume-title":"IEEE Symposium on Security and Privacy","author":"J. A. Goguen","year":"1982","unstructured":"J. A. Goguen and J. Meseguer. Security policies and security models. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Washington 1982, 11\u201320."},{"key":"1_CR7","first-page":"75","volume-title":"IEEE Symposium on Security and Privacy","author":"J. A. Goguen","year":"1984","unstructured":"J. A. Goguen and J. Meseguer. Unwinding and inference control. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Oakland 1984, 75\u201386."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"O. Goldreich. Foundations of cryptography: Basic tools. Cambridge University Press, 2001.","DOI":"10.1017\/CBO9780511546891"},{"key":"1_CR9","first-page":"170","volume-title":"IEEE Symposium on Security and Privacy","author":"J.W. Gray III","year":"1990","unstructured":"J.W. Gray III. Probabilistic interference. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos 1990, 170\u2013179."},{"issue":"34","key":"1_CR10","first-page":"255","volume":"1","author":"J. W. Gray III","year":"1992","unstructured":"J. W. Gray III. Toward a mathematical foundation for information flow security. Journal of Computer Security, Vol. 1, no. 3,4, 1992, 255\u2013295.","journal-title":"Journal of Computer Security"},{"key":"1_CR11","unstructured":"C.A. R. Hoare. Communicating sequential processes. International Series in Computer Science, Prentice Hall, Hemel Hempstead 1985."},{"key":"1_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-45309-1_6","volume-title":"10th European Symposium On Programming (ESOP 2001)","author":"P. Laud","year":"2001","unstructured":"P. Laud. Semantics and program analysis of computationally secure information flow. 10th European Symposium On Programming (ESOP 2001), LNCS 2028, Springer-Verlag, Berlin 2001, 77\u201391."},{"key":"1_CR13","volume-title":"Distributed algorithms","author":"N. Lynch","year":"1996","unstructured":"N. Lynch. Distributed algorithms. Morgan Kaufmann Publishers, San Francisco 1996."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"H. Mantel. Unwinding possibilistic security properties. 6th European Symposium on Research in Computer Security (ESORICS\u201900), Toulouse 2000, 238\u2013254.","DOI":"10.1007\/10722599_15"},{"key":"1_CR15","first-page":"161","volume-title":"IEEE Symposium on Security and Privacy","author":"D. McCullough","year":"1987","unstructured":"D. McCullough. Specifications for multi-level security and a hook-up property. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Oakland 1987, 161\u2013166."},{"key":"1_CR16","unstructured":"J. McLean. Security models. in: John Marciniak (ed.): Encyclopedia of Software Engineering; Wiley Press, 1994."},{"key":"1_CR17","first-page":"180","volume-title":"IEEE Symposium on Security and Privacy","author":"J. McLean","year":"1990","unstructured":"J. McLean. Security models and information flow. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos 1990, 180\u2013187."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. IEEE Symposium on Security and Privacy, Oakland, May 2001, 184\u2013201.","DOI":"10.1109\/SECPRI.2001.924298"},{"key":"1_CR19","unstructured":"D. Sutherland. A model of information. 9th National Computer Security Conference; National Bureau of Standards, National Computer Security Center, September 1986, 175\u2013183."},{"key":"1_CR20","first-page":"144","volume-title":"IEEE Symposium on Security and Privacy","author":"J. T. Wittbold","year":"1990","unstructured":"J. T. Wittbold and D. M. Johnson. Information flow in nondeterministic systems. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos 1990, 144\u2013161."},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"A. C. Yao. Protocols for secure computations. 23rd Symposium on Foundations of Computer Science (FOCS) 1982, IEEE Computer Society, 1982, 160\u2013164.","DOI":"10.1109\/SFCS.1982.38"},{"key":"1_CR22","first-page":"94","volume-title":"IEEE Symposium on Security and Privacy","author":"A. Zakinthinos","year":"1997","unstructured":"A. Zakinthinos and E. S. Lee. A general theory of security properties. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Washington 1997, 94\u2013102."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45853-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T01:54:48Z","timestamp":1736992488000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45853-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540443452","9783540458531"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-45853-0_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"26 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}