{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:09:04Z","timestamp":1762459744223,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030217587"},{"type":"electronic","value":"9783030217594"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-21759-4_5","type":"book-chapter","created":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T23:30:20Z","timestamp":1559518220000},"page":"75-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Only Connect, Securely"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0365-5478","authenticated-orcid":false,"given":"Chandrika","family":"Bhardwaj","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5887-1237","authenticated-orcid":false,"given":"Sanjiva","family":"Prasad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,29]]},"reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-642-01465-9_2","volume-title":"Formal Aspects in Security and Trust","author":"G Boudol","year":"2009","unstructured":"Boudol, G.: Secure information flow as a safety property. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 20\u201334. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01465-9_2"},{"key":"5_CR2","unstructured":"Cheng, W., et al.: Abstractions for usable information flow control in Aeolus. In: 2012 USENIX Annual Technical Conference, Boston, MA, USA, 13\u201315 June 2012, pp. 139\u2013151 (2012)"},{"key":"5_CR3","first-page":"98","volume":"31","author":"A Cortesi","year":"2018","unstructured":"Cortesi, A., Ferrara, P., Halder, R., Zanioli, M.: Combining symbolic and numerical domains for information leakage analysis. Trans. Comput. Sci. 31, 98\u2013135 (2018)","journal-title":"Trans. Comput. Sci."},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-662-46081-8_4","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"A Cortesi","year":"2015","unstructured":"Cortesi, A., Ferrara, P., Pistoia, M., Tripp, O.: Datacentric semantics for verification of privacy policy compliance by mobile applications. In: D\u2019Souza, D., Lal, A., Larsen, K.G. (eds.) VMCAI 2015. LNCS, vol. 8931, pp. 61\u201379. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46081-8_4"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Cousot, P.: Types as Abstract Interpretations. In: Conference Record of POPL 1997: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Papers Presented at the Symposium, Paris, France, 15\u201317 January 1997, pp. 316\u2013331 (1997)","DOI":"10.1145\/263699.263744"},{"key":"5_CR6","unstructured":"Deng, S., G\u00fcm\u00fcsoglu, D., Xiong, W., Gener, Y.S., Demir, O., Szefer, J.: SecChisel: language and tool for practical and scalable security verification of security-aware hardware architectures. IACR Cryptology ePrint Archive 2017\/193 (2017). http:\/\/eprint.iacr.org\/2017\/193"},{"issue":"5","key":"5_CR7","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Efstathopoulos, P., et al.: Labels and event processes in the Asbestos operating system. In: Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, 23\u201326 October 2005, pp. 17\u201330 (2005)","DOI":"10.1145\/1095809.1095813"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Ferraiuolo, A., Zhao, M., Myers, A.C., Suh, G.E.: Hyperflow: a processor architecture for nonmalleable, timing-safe information flow security. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, 15\u201319 October 2018, pp. 1583\u20131600 (2018)","DOI":"10.1145\/3243734.3243743"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: 1982 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 26\u201328 April 1982, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"5_CR11","series-title":"Workshops in Computing","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-1-4471-3503-6_13","volume-title":"Theory and Formal Methods 1993","author":"M Huth","year":"1993","unstructured":"Huth, M.: On the equivalence of state-transition systems. In: Burn, G., Gay, S., Ryan, M. (eds.) Theory and Formal Methods 1993. Workshops in Computing, pp. 171\u2013182. Springer, London (1993). https:\/\/doi.org\/10.1007\/978-1-4471-3503-6_13"},{"key":"5_CR12","unstructured":"Krohn, M.N., et al.: Information flow control for standard OS abstractions. In: Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, SOSP 2007, Stevenson, Washington, USA, 14\u201317 October 2007, pp. 321\u2013334 (2007)"},{"issue":"4\u20135","key":"5_CR13","doi-asserted-by":"publisher","first-page":"367","DOI":"10.3233\/JCS-15805","volume":"25","author":"J Liu","year":"2017","unstructured":"Liu, J., Arden, O., George, M.D., Myers, A.C.: Fabric: building open distributed systems securely by construction. J. Comput. Secur. 25(4\u20135), 367\u2013426 (2017)","journal-title":"J. Comput. Secur."},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Liu, J., George, M.D., Vikram, K., Qi, X., Waye, L., Myers, A.C.: Fabric: a platform for secure distributed computation and storage. In: Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, SOSP 2009, Big Sky, Montana, USA, 11\u201314 October 2009, pp. 321\u2013334 (2009)","DOI":"10.1145\/1629575.1629606"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Louren\u00e7o, L., Caires, L.: Dependent information flow types. In: Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2015, Mumbai, India, 15\u201317 January 2015, pp. 317\u2013328 (2015)","DOI":"10.1145\/2676726.2676994"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/0304-3975(94)00123-Z","volume":"136","author":"A Melton","year":"1994","unstructured":"Melton, A., Schr\u00f6der, B.S.W., Strecker, G.E.: Lagois connections - a counterpart to Galois connections. Theor. Comput. Sci. 136(1), 79\u2013107 (1994)","journal-title":"Theor. Comput. Sci."},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: practical mostly-static information flow control. In: Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 1999, San Antonio, TX, USA, 20\u201322 January 1999, pp. 228\u2013241 (1999)","DOI":"10.1145\/292540.292561"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: Mostly-static decentralized information flow control. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA, USA (1999). http:\/\/hdl.handle.net\/1721.1\/16717","DOI":"10.1145\/292540.292561"},{"issue":"1","key":"5_CR19","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/596980.596983","volume":"25","author":"F Pottier","year":"2003","unstructured":"Pottier, F., Simonet, V.: Information flow inference for ML. ACM Trans. Program. Lang. Syst. 25(1), 117\u2013158 (2003)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Roy, I., Porter, D.E., Bond, M.D., McKinley, K.S., Witchel, E.: Laminar: practical fine-grained decentralized information flow control. In: Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2009, Dublin, Ireland, 15\u201321 June 2009, pp. 63\u201374 (2009)","DOI":"10.1145\/1543135.1542484"},{"issue":"1","key":"5_CR21","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5\u201319 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"5_CR22","unstructured":"Schultz, D.A., Liskov, B.: IFDB: decentralized information flow control for databases. In: Eighth Eurosys Conference 2013, EuroSys 2013, Prague, Czech Republic, 14\u201317 April 2013, pp. 43\u201356 (2013)"},{"issue":"2\/3","key":"5_CR23","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"DM Volpano","year":"1996","unstructured":"Volpano, D.M., Irvine, C.E., Smith, G.: A sound type system for secure flow analysis. J. Comput. Secur. 4(2\/3), 167\u2013188 (1996)","journal-title":"J. Comput. Secur."},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45789-5_26","volume-title":"Static Analysis","author":"M Zanotti","year":"2002","unstructured":"Zanotti, M.: Security typings by abstract interpretation. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 360\u2013375. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45789-5_26"},{"key":"5_CR25","unstructured":"Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazi\u00e8res, D.: Making information flow explicit in histar. In: 7th Symposium on Operating Systems Design and Implementation (OSDI 2006), Seattle, WA, USA, 6\u20138 November, pp. 263\u2013278 (2006)"},{"key":"5_CR26","unstructured":"Zeldovich, N., Boyd-Wickizer, S., Mazi\u00e8res, D.: Securing distributed systems with information flow control. In: Proceedings of 5th USENIX Symposium on Networked Systems Design & Implementation, NSDI 2008, San Francisco, CA, USA, 16\u201318 April 2008, pp. 293\u2013308 (2008)"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, D., Wang, Y., Suh, G.E., Myers, A.C.: A hardware design language for timing-sensitive information-flow security. In: Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2015, Istanbul, Turkey, 14\u201318 March 2015, pp. 503\u2013516 (2015)","DOI":"10.1145\/2694344.2694372"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Distributed Objects, Components, and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-21759-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T00:03:08Z","timestamp":1685750588000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-21759-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030217587","9783030217594"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-21759-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FORTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Techniques for Distributed Objects, Components, and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"forte2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.discotec.org\/2019\/forte","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}