{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:09Z","timestamp":1763467809784,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540656999"},{"type":"electronic","value":"9783540490999"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-49099-x_4","type":"book-chapter","created":{"date-parts":[[2007,6,24]],"date-time":"2007-06-24T21:03:21Z","timestamp":1182719001000},"page":"40-58","source":"Crossref","is-referenced-by-count":37,"title":["A Per Model of Secure Information Flow in Sequential Programs"],"prefix":"10.1007","author":[{"given":"Andrei","family":"Sabelfeld","sequence":"first","affiliation":[]},{"given":"David","family":"Sands","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"M. Abadi, A. Banerjee, N. Heintze, and J. Riecke. A core calculus of dependency. In POPL\u2019 99, Proceedings of the 26th Annual ACM Symposium on Principles of Programming Languages (January 1999), 1999.","DOI":"10.1145\/292540.292555"},{"key":"4_CR2","unstructured":"M. Abadi and G. Plotkin. A per model of polymorphism and recursive Types. In Logic in Computer Science. IEEE, 1990."},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/357084.357088","volume":"2","author":"G. R. Andrews","year":"1980","unstructured":"G. R. Andrews and R. P. Reitman. An axiomatic approach to information flow in programs. ACM TOPLAS, 2(1):56\u201375, January 1980.","journal-title":"ACM TOPLAS"},{"key":"4_CR4","volume-title":"MTR-2997, Rev. 1","author":"D.E. Bell","year":"1976","unstructured":"D.E. Bell and L.J. LaPadula. Secure Computer Systems: Unified Exposition and Multics Interpretation. MTR-2997, Rev. 1, The MITRE Corporation, Bedford, Mass., 1976."},{"issue":"7","key":"4_CR5","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D. E. Denning","year":"1977","unstructured":"Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504\u2013513, July 1977.","journal-title":"Communications of the ACM"},{"issue":"5","key":"4_CR6","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D. E. Denning","year":"1976","unstructured":"Dorothy E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236\u2013243, May 1976.","journal-title":"Communications of the ACM"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"M. Das, T. Reps, and P. Van Hentenryck. Semantic foundations of bindingtime analysis for imperative programs. In Partial Evaluation and Semantics-Based Program Manipulation, pages 100\u2013110, La Jolla, California, June 1995. ACM.","DOI":"10.1145\/215465.215569"},{"issue":"1","key":"4_CR8","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","volume":"3","author":"R. Focardi","year":"1994","unstructured":"R. Focardi and R. Gorrieri. A classification of security properties for process Algebra. J. Computer Security, 3(1):5\u201333, 1994.","journal-title":"J. Computer Security"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Joseph Goguen and Jos\u00e9 Meseguer. Security policies and security models. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, April 1982.","DOI":"10.1109\/SP.1982.10014"},{"key":"4_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of the First Static Analysis Symposium","author":"C. L. Hankin","year":"1994","unstructured":"C. L. Hankin and D. Le M\u00e9tayer. A type-based framework for program Analysis. In Proceedings of the First Static Analysis Symposium, volume 864 of LNCS. Springer-Verlag, 1994."},{"key":"4_CR11","unstructured":"Nevin Heintze and Jon G. Riecke. The SLam calculus: Programming with secrecy and integrity. In Conference Record of POPL\u201998: The 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 365\u2013377, San Diego, California, January 19\u201321, 1998."},{"issue":"9","key":"4_CR12","first-page":"154","volume":"26","author":"S. Hunt","year":"1991","unstructured":"S. Hunt and D. Sands. Binding Time Analysis: A New PERspective. In Proceedings of the ACM Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM\u201991), pages 154\u2013164, September 1991. ACM SIGPLAN Notices 26(9).","journal-title":"Proceedings of the ACM Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM\u201991)"},{"key":"4_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/BFb0026827","volume-title":"Proc. Programming Languages: Implementations, Logics and Programs (PLILP), Utrecht, The Netherlands","author":"F. Henglein","year":"1995","unstructured":"F. Henglein and D. Sands. A semantic model of binding times for safe partial Evaluation. In Manuel Hermenegildo and S. Doaitse Swierstra, editors, Proc. Programming Languages: Implementations, Logics and Programs (PLILP), Utrecht, The Netherlands, volume 982 of Lecture Notes in Computer Science pages 299\u2013320. Springer-Verlag, September 1995."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"S. Hunt. PERs generalise projections for strictness analysis. In Draft Proceedings of the Third Glasgow Functional Programming Workshop, Ullapool, 1990.","DOI":"10.1007\/978-1-4471-3810-5_10"},{"key":"4_CR15","unstructured":"L. S. Hunt. Abstract Interpretation of Functional Languages: From Theory to Practice. PhD thesis, Department of Computing, Imperial College of Science, Technology and Medicine, 1991."},{"key":"4_CR16","unstructured":"T. P. Jensen. Abstract Interpretation in Logical Form. PhD thesis, Imperial College, University of London, November 1992. Available as DIKU Report 93\/11 from DIKU, University of Copenhagen."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"C. Jones and G. D. Plotkin. A probabilistic powerdomain of evaluations. In Proceedings, Fourth Annual Symposium on Logic in Computer Science, pages 186\u2013195, Asilomar Conference Center, Pacific Grove, California, 5\u20138 June 1989. IEEE Computer Society Press.","DOI":"10.1109\/LICS.1989.39173"},{"key":"4_CR18","unstructured":"J. Launchbury. Projection Factorisations in Partial Evaluation. PhD thesis, Department of Computing, University of Glasgow, 1989."},{"key":"4_CR19","series-title":"Lect Notes Comput Sci","volume-title":"MPC\u201998","author":"K. R. M. Leino","year":"1998","unstructured":"K. R. M. Leino and Rajeev Joshi. A semantic approach to secure information Flow. In MPC\u201998, Springer Verlag LNCS, 1998."},{"key":"4_CR20","unstructured":"K. R. M. Leino and Rajeev Joshi. A semantic approach to secure information Flow. Science of Computer Programming, 1999. To appear."},{"issue":"1","key":"4_CR21","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2.48795","volume":"23","author":"J. McLean","year":"1990","unstructured":"John McLean. The specification and modeling of computer security. Computer, 23(1):9\u201316, January 1990.","journal-title":"Computer"},{"key":"4_CR22","unstructured":"J. McLean. Security models. In J. Marciniak, editor, Encyclopedia of Software Engineering. Wiley & Sons, 1994."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"M. Mizuno and D. Schmidt. A security flow control algorithm and its denotational semantics correctness proof. itFormal Aspects of Computing, 4(6A):727-754, 1992.","DOI":"10.1007\/BF03180570"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"F. Nielson. Two-level semantics and abstract interpretation \u2014 fundamental Studies. Theoretical Computer Science, (69):117\u2013242, 90.","DOI":"10.1016\/0304-3975(89)90091-1"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Peter \u00d8rb\u00e6k and Jens Palsberg. Trust in the \u03bb-calculus. Journal of Functional Programming, 7(4), 1997.","DOI":"10.1017\/S0956796897002906"},{"key":"4_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1007\/3-540-59293-8_221","volume-title":"Proceedings of the TAPSOFT\/FASE\u201995 Conference","author":"P. \u00d8rb\u00e6k","year":"1995","unstructured":"Peter \u00d8rb\u00e6k. Can you Trust your Data? In M. I. Schwartzbach P. D. Mosses and M. Nielsen, editors, Proceedings of the TAPSOFT\/FASE\u201995 Conference, LNCS 915, pages 575\u2013590, Aarhus, Denmark, May 1995. Springer-Verlag."},{"issue":"3","key":"4_CR27","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1137\/0205035","volume":"5","author":"G. D. Plotkin","year":"1976","unstructured":"G. D. Plotkin. A powerdomain construction. SIAM Journal on Computing, 5(3):452\u2013487, 1976.","journal-title":"SIAM Journal on Computing"},{"key":"4_CR28","first-page":"513","volume-title":"Proceedings 9th IFIP World Computer Congress, Information Processing\u2019 83, Paris, France, 19\u201323 Sept 1983","author":"J. C. Reynolds","year":"1983","unstructured":"John C. Reynolds. Types, abstraction and parametric polymorphism. In R. E. A. Mason, editor, Proceedings 9th IFIP World Computer Congress, Information Processing\u2019 83, Paris, France, 19\u201323 Sept 1983, pages 513\u2013523. North-Holland, Amsterdam, 1983."},{"issue":"1","key":"4_CR29","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/0022-0000(78)90048-X","volume":"16","author":"M. B. Smyth","year":"1978","unstructured":"Michael B. Smyth. Powerdomains. Journal of Computer and Systems Sciences, 16(1):23\u201336, February 1978.","journal-title":"Journal of Computer and Systems Sciences"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Andrei Sabelfeld and David Sands. A per model of secure information flow in sequential programs. Technical report, Department of Computer Science, Chalmers University of Technology, 1999. http:\/\/www.cs.chalmers.se\/~csreport\/ .","DOI":"10.1007\/3-540-49099-X_4"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Geoffrey Smith and Dennis Volpano. Secure information flow in a multithreaded imperative language. In Conference Record of POPL\u2019 98: The 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 355\u2013364, 1998.","DOI":"10.1145\/268946.268975"},{"key":"4_CR32","unstructured":"P. Thiemann and H. Klaeren. Binding-time analysis by security analysis. Universitt T\u00fcbingen, November 1997."},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Dennis Volpano and Geoffrey Smith. Probabilistic noninterference in a concurrent Language. In 11th IEEE Computer Security FoundationsWorkshop, pages 34\u201343, 1998.","DOI":"10.1109\/CSFW.1998.683153"},{"issue":"3","key":"4_CR34","first-page":"1","volume":"4","author":"D. Volpano","year":"1996","unstructured":"D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow Analysis. J. Computer Security, 4(3):1\u201321, 1996.","journal-title":"J. Computer Security"},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Philip Wadler. Theorems for free. In Functional Programming Languages and Computer Architecture, pages 347\u2013359. ACM, 1989.","DOI":"10.1145\/99370.99404"},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"P. Wadler and R. J. M. Hughes. Projections for strictness analysis. In 1987 Conference on Functional Programming and Computer Architecture, pages 385\u2013407, Portland, Oregon, September 1987.","DOI":"10.1007\/3-540-18317-5_21"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49099-X_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T13:56:59Z","timestamp":1737122219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49099-X_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540656999","9783540490999"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/3-540-49099-x_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}