{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:49:48Z","timestamp":1767340188360,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030518301"},{"type":"electronic","value":"9783030518318"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-51831-8_7","type":"book-chapter","created":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T23:05:05Z","timestamp":1593471905000},"page":"131-152","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Interleaving vs True Concurrency: Some Instructive Security Examples"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Gorrieri","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,30]]},"reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/FI-2015-1243","volume":"140","author":"P Baldan","year":"2015","unstructured":"Baldan, P., Carraro, A.: A causal view on non-intereference. Fundam. Infor. 140(1), 1\u201338 (2015)","journal-title":"Fundam. Infor."},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-319-59746-1_9","volume-title":"Coordination Models and Languages","author":"P Baldan","year":"2017","unstructured":"Baldan, P., Beggiato, A., Lluch Lafuente, A.: Many-to-many information flow policies. In: Jacquet, J.-M., Massink, M. (eds.) COORDINATION 2017. LNCS, vol. 10319, pp. 159\u2013177. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-59746-1_9"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Best, E., Darondeau, Ph., Gorrieri, R.: On the decidability of non-interference over unbounded Petri nets. In: Proceedings of the 8th International Workshop on Security Issues in Concurrency (SecCo 2010), EPTCS, vol. 51, pp. 16\u201333 (2010)","DOI":"10.4204\/EPTCS.51.2"},{"issue":"3","key":"7_CR4","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/BF01178506","volume":"28","author":"E Best","year":"1991","unstructured":"Best, E., Devillers, R., Kiehn, A., Pomello, L.: Concurrent bisimulations in Petri nets. Acta Informatica 28(3), 231\u2013264 (1991). \nhttps:\/\/doi.org\/10.1007\/BF01178506","journal-title":"Acta Informatica"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-540-27755-2_8","volume-title":"Lectures on Concurrency and Petri Nets","author":"N Busi","year":"2004","unstructured":"Busi, N., Gorrieri, R.: A survey on non-interference with Petri nets. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) ACPN 2003. LNCS, vol. 3098, pp. 328\u2013344. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-27755-2_8"},{"issue":"6","key":"7_CR6","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1017\/S0960129509990120","volume":"19","author":"N Busi","year":"2009","unstructured":"Busi, N., Gorrieri, R.: Structural non-interference in elementary and trace nets. Math. Struct. Comput. Sci. 19(6), 1065\u20131090 (2009)","journal-title":"Math. Struct. Comput. Sci."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"B\u00e9rard, B., H\u00e9lou\u00ebt, L., Mullins, J.: Non-interference in partial order models. In: Proceedings of the ACSD 2015, pp. 80\u201389. IEEE Computer Society (2015)","DOI":"10.1109\/ACSD.2015.11"},{"key":"7_CR8","first-page":"12","volume":"31","author":"L Castellano","year":"1987","unstructured":"Castellano, L., De Michelis, G., Pomello, L.: Concurrency versus interleaving: an instructive example. Bull. EATCS 31, 12\u201314 (1987)","journal-title":"Bull. EATCS"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1007\/3-540-65306-6_20","volume-title":"Lectures on Petri Nets I: Basic Models","author":"J Esparza","year":"1998","unstructured":"Esparza, J.: Decidability and complexity of petri net problems\u2014an introduction. In: Reisig, W., Rozenberg, G. (eds.) ACPN 1996. LNCS, vol. 1491, pp. 374\u2013428. Springer, Heidelberg (1998). \nhttps:\/\/doi.org\/10.1007\/3-540-65306-6_20"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-45608-2_6","volume-title":"Foundations of Security Analysis and Design","author":"R Focardi","year":"2001","unstructured":"Focardi, R., Gorrieri, R.: Classification of security properties. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 331\u2013396. Springer, Heidelberg (2001). \nhttps:\/\/doi.org\/10.1007\/3-540-45608-2_6"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-01465-9_14","volume-title":"Formal Aspects in Security and Trust","author":"S Frau","year":"2009","unstructured":"Frau, S., Gorrieri, R., Ferigato, C.: Petri net security checker: structural non-interference at work. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 210\u2013225. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-01465-9_14"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Fr\u00f6schle, S.: Causality, behavioural equivalences, and the security of cyberphysical systems. In: [30], pp. 83\u201398 (2015)","DOI":"10.1007\/978-3-319-23506-6_8"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-51486-4_71","volume-title":"Mathematical Foundations of Computer Science 1989","author":"R van Glabbeek","year":"1989","unstructured":"van Glabbeek, R., Goltz, U.: Equivalence notions for concurrent systems and refinement of actions. In: Kreczmar, A., Mirkowska, G. (eds.) MFCS 1989. LNCS, vol. 379, pp. 237\u2013248. Springer, Heidelberg (1989). \nhttps:\/\/doi.org\/10.1007\/3-540-51486-4_71"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"van Glabbeek, R.J.: Structure preserving bisimilarity: supporting an operational Petri net semantics of CCSP. In: [30], pp. 99\u2013130. Springer (2015)","DOI":"10.1007\/978-3-319-23506-6_9"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Gorrieri, R., Rensink, A.: Action Refinement. In: Handbook of Process Algebra, pp. 1047\u20131147. North-Holland (2001)","DOI":"10.1016\/B978-044482830-9\/50034-5"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-23082-0_5","volume-title":"Foundations of Security Analysis and Design VI","author":"R Gorrieri","year":"2011","unstructured":"Gorrieri, R., Vernali, M.: On intransitive non-interference in some models of concurrency. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2011. LNCS, vol. 6858, pp. 125\u2013151. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-23082-0_5"},{"key":"7_CR17","series-title":"EATCS Texts in Theoretical Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21491-7","volume-title":"Introduction to Concurrency Theory: Transition Systems and CCS","author":"R Gorrieri","year":"2015","unstructured":"Gorrieri, R., Versari, C.: Introduction to Concurrency Theory: Transition Systems and CCS. EATCS Texts in Theoretical Computer Science. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-21491-7"},{"key":"7_CR18","series-title":"EATCS Monographs in Theoretical Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55559-1","volume-title":"Process Algebras for Petri Nets: The Alphabetization of Distributed Systems","author":"R Gorrieri","year":"2017","unstructured":"Gorrieri, R.: Process Algebras for Petri Nets: The Alphabetization of Distributed Systems. EATCS Monographs in Theoretical Computer Science. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-55559-1"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.jlamp.2017.11.005","volume":"96","author":"R Gorrieri","year":"2018","unstructured":"Gorrieri, R.: Verification of finite-state machines: a distributed approach. J. Log. Algebraic Methods Program. 96, 65\u201380 (2018)","journal-title":"J. Log. Algebraic Methods Program."},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-030-31175-9_2","volume-title":"The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy","author":"R Gorrieri","year":"2019","unstructured":"Gorrieri, R.: Axiomatizing team equivalence for finite-state machines. In: Alvim, M.S., Chatzikokolakis, K., Olarte, C., Valencia, F. (eds.) The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy. LNCS, vol. 11760, pp. 14\u201332. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-31175-9_2"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-96154-5_18","volume-title":"Carl Adam Petri: Ideas, Personality, Impact","author":"R Gorrieri","year":"2019","unstructured":"Gorrieri, R.: Toward distributed computability theory. In: Reisig, W., Rozenberg, G. (eds.) Carl Adam Petri: Ideas, Personality, Impact, pp. 141\u2013146. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-319-96154-5_18"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Gorrieri, R.: A study on team bisimulations for BPP nets (extended abstract). In: Janicki, R., et al. (eds.) Petri Nets 2020. LNCS, vol. 12152, pp. xx\u2013yy. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-51831-8_8"},{"key":"7_CR23","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall International Series in Computer Science (1985)"},{"key":"7_CR24","volume-title":"Introduction to Automata Theory, Languages and Computation","author":"JE Hopcroft","year":"2001","unstructured":"Hopcroft, J.E., Motwani, R., Ullman, J.D.: Introduction to Automata Theory, Languages and Computation, 2nd edn. Addison-Wesley, Boston (2001)","edition":"2"},{"issue":"2","key":"7_CR25","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/0304-3975(95)00037-W","volume":"148","author":"P Janc\u0306ar","year":"1995","unstructured":"Janc\u0306ar, P.: Undecidability of bisimilarity for Petri nets and some related problems. Theor. Comput. Sci. 148(2), 281\u2013301 (1995)","journal-title":"Theor. Comput. Sci."},{"issue":"7","key":"7_CR26","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1145\/360248.360251","volume":"19","author":"R Keller","year":"1976","unstructured":"Keller, R.: Formal verification of parallel programs. Commun. ACM 19(7), 561\u2013572 (1976)","journal-title":"Commun. ACM"},{"key":"7_CR27","volume-title":"Communication and Concurrency","author":"R Milner","year":"1989","unstructured":"Milner, R.: Communication and Concurrency. Prentice-Hall, Upper Saddle River (1989)"},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/3-540-13883-8_66","volume-title":"Foundations of Software Technology and Theoretical Computer Science","author":"M Nielsen","year":"1984","unstructured":"Nielsen, M., Thiagarajan, P.S.: Degrees of non-determinism and concurrency: a Petri net view. In: Joseph, M., Shyamasundar, R. (eds.) FSTTCS 1984. LNCS, vol. 181, pp. 89\u2013117. Springer, Heidelberg (1984). \nhttps:\/\/doi.org\/10.1007\/3-540-13883-8_66"},{"key":"7_CR29","series-title":"LNCS","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23506-6","volume-title":"Correct System Design-Symposium in Honor of Ernst-R\u00fcdiger Olderog on the Occasion of His 60th Birthday","year":"2015","unstructured":"Meyer, R., Platzer, A., Wehrheim, H. (eds.): Correct System Design-Symposium in Honor of Ernst-R\u00fcdiger Olderog on the Occasion of His 60th Birthday. LNCS, vol. 9360. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-23506-6"},{"issue":"6","key":"7_CR30","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1137\/0216062","volume":"16","author":"R Paige","year":"1987","unstructured":"Paige, R., Tarjan, R.E.: Three partition refinement algorithms. SIAM J. Comput. 16(6), 973\u2013989 (1987)","journal-title":"SIAM J. Comput."},{"key":"7_CR31","volume-title":"Petri Net Theory and the Modeling of Systems","author":"JL Peterson","year":"1981","unstructured":"Peterson, J.L.: Petri Net Theory and the Modeling of Systems. Prentice-Hall, Upper Saddle River (1981)"},{"key":"7_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45608-2_1","volume-title":"Foundations of Security Analysis and Design","author":"PYA Ryan","year":"2001","unstructured":"Ryan, P.Y.A.: Mathematical models of computer security. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 1\u201362. Springer, Heidelberg (2001). \nhttps:\/\/doi.org\/10.1007\/3-540-45608-2_1"},{"key":"7_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/3-540-54233-7_158","volume-title":"Automata, Languages and Programming","author":"W Vogler","year":"1991","unstructured":"Vogler, W.: Deciding history preserving bisimilarity. In: Albert, J.L., Monien, B., Artalejo, M.R. (eds.) ICALP 1991. LNCS, vol. 510, pp. 495\u2013505. Springer, Heidelberg (1991). \nhttps:\/\/doi.org\/10.1007\/3-540-54233-7_158"}],"container-title":["Lecture Notes in Computer Science","Application and Theory of Petri Nets and Concurrency"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51831-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T00:05:39Z","timestamp":1593475539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-51831-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030518301","9783030518318"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51831-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"30 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PETRI NETS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Theory of Petri Nets and Concurrency","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"41","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apn2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf-2020.petrinet.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.89","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}