{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:31:02Z","timestamp":1760783462396,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":9,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_874","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:50:23Z","timestamp":1319723423000},"page":"605-607","source":"Crossref","is-referenced-by-count":24,"title":["Information Flow and Noninterference"],"prefix":"10.1007","author":[{"given":"Heiko","family":"Mantel","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"874_CR1_874","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","volume":"3","author":"R Focardi","year":"1995","unstructured":"Focardi R, Gorrieri R (1995) A taxonomy of security properties for process algebras. J Comput Secur 3(1):5\u201334","journal-title":"J Comput Secur"},{"key":"874_CR2_874","first-page":"11","volume-title":"Proceedings of the IEEE symposium on security and privacy","author":"JA Goguen","year":"1982","unstructured":"Goguen JA, Meseguer J (1982) Security policies and security models. In: Proceedings of the IEEE symposium on security and privacy, Oakland, pp 11\u201320"},{"key":"874_CR3_874","first-page":"21","volume-title":"Proceedings of the IEEE symposium on security and privacy","author":"JW Gray III","year":"1991","unstructured":"Gray III JW (1991) Toward a mathematical foundation for information flow security. In: Proceedings of the IEEE symposium on security and privacy, Oakland, pp 21\u201334"},{"key":"874_CR4_874","first-page":"78","volume-title":"Proceedings of the IEEE symposium on security and privacy","author":"H Mantel","year":"2001","unstructured":"Mantel H (2001) Preserving information flow properties under refinement. In: Proceedings of the IEEE symposium on security and privacy, Oakland, pp 78\u201391"},{"key":"874_CR5_874","first-page":"88","volume-title":"Proceedings of the IEEE symposium on security and privacy","author":"H Mantel","year":"2002","unstructured":"Mantel H (2002) On the composition of secure systems. In: Proceedings of the IEEE symposium on security and privacy, Oakland, pp 88\u2013104"},{"key":"874_CR6_874","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/1103576.1103584","volume-title":"Proceedings of the ACM workshop on formal methods for security engineering: from specifications to code","author":"H Mantel","year":"2005","unstructured":"Mantel H (2005) The framework of selective interleaving functions and the modular assembly kit. In: Proceedings of the ACM workshop on formal methods for security engineering: from specifications to code, Alexandria, pp 53\u201362"},{"issue":"1","key":"874_CR7_874","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/32.481534","volume":"22","author":"JD McLean","year":"1996","unstructured":"McLean JD (1996) A general theory of composition for a class of \u201cpossibilistic\u201d properties. IEEE Trans Softw Eng 22(1):53\u201367","journal-title":"IEEE Trans Softw Eng"},{"key":"874_CR8_874","series-title":"Lecture notes in computer science","first-page":"33","volume-title":"Proceedings of the European symposium on research in computer security","author":"AW Roscoe","year":"1994","unstructured":"Roscoe AW, Woodcock JCP, Wulf L (1994) Non-interference through determinism. In: Proceedings of the European symposium on research in computer security. Lecture notes in computer science, vol 875. Springer, Berlin, pp 33\u201353"},{"key":"874_CR9_874","unstructured":"Rushby JM (1992) Noninterference, transitivity, and channel-control security policies. Technical report CSL-92-02. SRI International, Menlo Park, Dec 1992"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,12]],"date-time":"2021-12-12T22:24:26Z","timestamp":1639347866000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_874","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}