{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:44:45Z","timestamp":1743068685011,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540443452"},{"type":"electronic","value":"9783540458531"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45853-0_12","type":"book-chapter","created":{"date-parts":[[2007,5,4]],"date-time":"2007-05-04T00:42:13Z","timestamp":1178239333000},"page":"194-211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Confidentiality-Preserving Refinement is Compositional \u2014 Sometimes"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Santen","sequence":"first","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Pfitzmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"J. A. Goguen and J. Meseguer. Security policies and security models. In IEEE Symposium on Security and Privacy, pages 11\u201320. IEEE Computer Society Press, 1982.","key":"12_CR1","DOI":"10.1109\/SP.1982.10014"},{"doi-asserted-by":"crossref","unstructured":"J. Graham-Cumming and J. W. Sanders. On the refinement of non-interference. In 9th IEEE Computer Security Foundations Workshop, pages 35\u201342. IEEE Computer Society Press, 1991.","key":"12_CR2","DOI":"10.1109\/CSFW.1991.151567"},{"doi-asserted-by":"crossref","unstructured":"J.W. Gray. Toward a mathematical foundation for information flow security. Journal of Computer Security, 1992.","key":"12_CR3","DOI":"10.3233\/JCS-1992-13-405"},{"doi-asserted-by":"crossref","unstructured":"M. Heisel, A. Pfitzmann, and T. Santen. Confidentiality-preserving refinement. In 14th IEEE Computer Security Foundations Workshop, pages 295\u2013305. IEEE Computer Society Press, 2001.","key":"12_CR4","DOI":"10.1109\/CSFW.2001.930154"},{"doi-asserted-by":"crossref","unstructured":"J. Jacob. On the derivation of secure components. In IEEE Symposium on Security and Privacy, pages 242\u2013247. IEEE Press, 1989.","key":"12_CR5","DOI":"10.1109\/SECPRI.1989.36298"},{"key":"12_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44618-4_29","volume-title":"CONCUR 2000","author":"J. J\u00fcrjens","year":"2000","unstructured":"J. J\u00fcrjens. Secure information flow for concurrent processes. In CONCUR 2000, LNCS 1877. Springer-Verlag, 2000."},{"key":"12_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/3-540-45251-6_8","volume-title":"FME 2001: Formal Methods for Increasing Software Productivity","author":"J. J\u00fcrjens","year":"2001","unstructured":"J. J\u00fcrjens. Secrecy-preserving refinement. In J. N. Oliveira and P. Zave, editors, FME 2001: Formal Methods for Increasing Software Productivity, LNCS 2021, pages 135\u2013152. Springer-Verlag, 2001."},{"doi-asserted-by":"crossref","unstructured":"G. Lowe. Quantifying information flow. In 15th IEEE Computer Security Foundations Workshop, pages 18\u201331. IEEE Computer Society, 2002.","key":"12_CR8","DOI":"10.1109\/CSFW.2002.1021804"},{"doi-asserted-by":"crossref","unstructured":"H. Mantel. Preserving information flow properties under refinement. In IEEE Symposium on Security and Privacy, pages 78\u201391. IEEE Computer Society Press, 2001.","key":"12_CR9","DOI":"10.1109\/SECPRI.2001.924289"},{"unstructured":"H. Mantel. On the composition of secure systems. In IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 2002. to appear.","key":"12_CR10"},{"issue":"6","key":"12_CR11","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/BF01213492","volume":"8","author":"C. Morgan","year":"1996","unstructured":"C. Morgan, A. McIver, K. Seidel, and J.W. Sanders. Refinement-oriented probability for CSP. Formal Aspects of Computing, 8(6):617\u2013647, 1996.","journal-title":"Formal Aspects of Computing"},{"unstructured":"A. W. Roscoe. The Theory and Practice of Concurrency. Prentice Hall, 1998.","key":"12_CR12"},{"doi-asserted-by":"crossref","unstructured":"P.Y.A. Ryan and S.A. Schneider. Process algebra and non-interference. In 12th IEEE Computer Security Foundations Workshop, pages 214\u2013227. IEEE Computer Society, 1999.","key":"12_CR13","DOI":"10.1109\/CSFW.1999.779775"},{"unstructured":"T. Santen, M. Heisel, and A. Pfitzmann. Compositionality of confidentiality-preserving refinement. Technical Report 10\/2002, Technische Universit\u00e4t Berlin, 2002.","key":"12_CR14"},{"unstructured":"J. M. Spivey. The Z Notation-A Reference Manual. Prentice Hall, 2nd edition, 1992.","key":"12_CR15"},{"doi-asserted-by":"crossref","unstructured":"J.T. Wittbold and D.M. Johnson. Information flow in nondeterministic systems. In IEEE Symposium on Security and Privacy, pages 144\u2013161. IEEE, 1990.","key":"12_CR16","DOI":"10.1109\/RISP.1990.63846"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45853-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T01:55:05Z","timestamp":1736992505000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45853-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540443452","9783540458531"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-45853-0_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"26 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}