{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:39:56Z","timestamp":1767137996383,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319051185","type":"print"},{"value":"9783319051192","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05119-2_11","type":"book-chapter","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T04:36:28Z","timestamp":1394166988000},"page":"180-198","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Information Flow Analysis for Valued-Indexed Data Security Compartments"],"prefix":"10.1007","author":[{"given":"Lu\u00edsa","family":"Louren\u00e7o","sequence":"first","affiliation":[]},{"given":"Lu\u00eds","family":"Caires","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Banerjee, A., Heintze, N., Riecke, J.G.: A core calculus of dependency. In: Appel, A.W., Aiken, A. (eds.) POPL \u201999, pp. 147\u2013160. ACM (1999)","DOI":"10.1145\/292540.292555"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Multiple facets for dynamic information flow. In: Field, J., Hicks, M. (eds.) POPL 2012, pp. 165\u2013178. ACM (2012)","DOI":"10.1145\/2103621.2103677"},{"key":"11_CR3","series-title":"LNCS","first-page":"484","volume-title":"ECOOP 2011","author":"IG Baltopoulos","year":"2011","unstructured":"Baltopoulos, I.G., Borgstr\u00f6m, J., Gordon, A.D.: Maintaining database integrity with refinement types. In: Mezini, M. (ed.) ECOOP 2011. LNCS, vol. 6813, pp. 484\u2013509. Springer, Heidelberg (2011)"},{"issue":"2","key":"11_CR4","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/1890028.1890031","volume":"33","author":"J Bengtson","year":"2011","unstructured":"Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A.D., Maffeis, S.: Refinement types for secure implementations. ACM Trans. Program. Lang. Syst. 33(2), 8 (2011)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"1","key":"11_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1017\/S0956796812000032","volume":"22","author":"GM Bierman","year":"2012","unstructured":"Bierman, G.M., Gordon, A.D., Hritcu, C., Langworthy, D.E.: Semantic subtyping with an SMT solver. J. Funct. Program. 22(1), 31\u2013105 (2012)","journal-title":"J. Funct. Program."},{"key":"11_CR6","series-title":"LNCS","first-page":"136","volume-title":"ESOP 2011","author":"L Caires","year":"2011","unstructured":"Caires, L., P\u00e9rez, J.A., Seco, J.C., Vieira, H.T., Ferr\u00e3o, L.: Type-based access control in data-centric systems. In: Barthe, G. (ed.) ESOP 2011. LNCS, vol. 6602, pp. 136\u2013155. Springer, Heidelberg (2011)"},{"key":"11_CR7","unstructured":"Cheng, W., Ports, D.R.K., Schultz, D., Popic, V., Blankstein, A., Cowling, J., Curtis, D., Shrira, L., Liskov, B.: Abstractions for usable information flow control in aeolus. In: USENIX Annual Technical Conference (2012)"},{"key":"11_CR8","unstructured":"Chlipala, A.: Static checking of dynamically-varying security policies in database-backed applications. In: Arpaci-Dusseau, R.H., Chen, B. (eds.) OSDI 2010, pp. 105\u2013118. USENIX Association (2010)"},{"key":"11_CR9","series-title":"LNCS","first-page":"266","volume-title":"FMCO 2006","author":"E Cooper","year":"2007","unstructured":"Cooper, E., Lindley, S., Wadler, P., Yallop, J.: Links: web programming without tiers. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2006. LNCS, vol. 4709, pp. 266\u2013296. Springer, Heidelberg (2007)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Corcoran, B.J., Swamy, N., Hicks, M.W.: Cross-tier, label-based security enforcement for web applications. In: \u00c7etintemel, U., Zdonik, S.B., Kossmann, D., Tatbul, N. (eds.) SIGMOD 2009, pp. 269\u2013282. ACM (2009)","DOI":"10.1145\/1559845.1559875"},{"key":"11_CR11","unstructured":"Davis, B., Chen, H.: DBTaint: cross-application information flow tracking via databases. In: WebApps\u201910, p. 12. USENIX Association (2010)"},{"issue":"7","key":"11_CR12","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"DE Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504\u2013513 (1977)","journal-title":"Commun. ACM"},{"key":"11_CR13","unstructured":"Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Arpaci-Dusseau, R.H., Chen, B. (eds.) OSDI 2010, pp. 393\u2013407. USENIX Association (2010)"},{"key":"11_CR14","unstructured":"Giffin, D.B., Levy, A., Stefan, D., Terei, D., Mazi\u00e8res, D., Mitchell, J., Russo, A. : Hails: protecting data privacy in untrusted web applications. In: OSDI 2012, pp. 47\u201360. USENIX (2012)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Goguen, J. A., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and Privacy, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Hedin, D., Sabelfeld, A.: Information-flow security for a core of JavaScript. In: Chong, S. (eds.) CSF 2012, pp. 3\u201318. IEEE (2012)","DOI":"10.1109\/CSF.2012.19"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Heintze, N., Riecke, J.G.: The SLam calculus: programming with secrecy and integrity. In: MacQueen, D.B., Cardelli, L. (eds.) POPL \u201998, pp. 365\u2013377. ACM (1998)","DOI":"10.1145\/268946.268976"},{"key":"11_CR18","unstructured":"Li, P., Zdancewic, S.: Practical information-flow control in web-based information systems. In: CSFW 2005, pp. 2\u201315. IEEE Computer Society (2005)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Liu, J., George, M.D., Vikram, K., Qi, X., Waye, L., Myers, A.C.: Fabric: a platform for secure distributed computation and storage. In: Matthews, J.N., Anderson, T.E. (eds.) SOSP 2009, pp. 321\u2013334. ACM (2009)","DOI":"10.1145\/1629575.1629606"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Louren\u00e7o, L., Caires, L.: Information flow analysis for valued-indexed aata security compartments. Technical report, UNL. http:\/\/ctp.di.fct.unl.pt\/luisal\/resources\/techreportDLIF13.pdf (2013)","DOI":"10.1007\/978-3-319-14128-2_11"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Meijer, E., Beckman, B., Bierman, G.M.: LINQ: reconciling object, relations and XML in the.NET framework. In: Chaudhuri, S., Hristidis, V., Polyzotis, N. (eds.) Proceedings of the ACM SIGMOD International Conference on Management of Data, p. 706. ACM (2006)","DOI":"10.1145\/1142473.1142552"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: practical mostly-static information flow control. In: Appel, A.W., Aiken, A. (eds) POPL \u201999, pp. 228\u2013241. ACM (1999)","DOI":"10.1145\/292540.292561"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Myers, A.C., Liskov, B.: A decentralized model for information flow control. In: SOSP, pp. 129\u2013142 (1997)","DOI":"10.1145\/269005.266669"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Nanevski, A., Banerjee, A., Garg, D.: Verification of information flow and access control policies with dependent types. In: S&P 2011, pp. 165\u2013179. IEEE Computer Society (2011)","DOI":"10.1109\/SP.2011.12"},{"issue":"1","key":"11_CR25","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. (Spec. Issue Formal Methods Secur.) 21(1), 5\u201319 (2003)","journal-title":"IEEE J. Sel. Areas Commun. (Spec. Issue Formal Methods Secur.)"},{"issue":"1","key":"11_CR26","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1023\/A:1011553200337","volume":"14","author":"A Sabelfeld","year":"2001","unstructured":"Sabelfeld, A., Sands, D.: A per model of secure information flow in sequential programs. Higher-Order Symbolic Comput. 14(1), 59\u201391 (2001)","journal-title":"Higher-Order Symbolic Comput."},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Schultz, D., Liskov, B., IFDB: decentralized information flow control for databases. In: Hanz\u00e1lek, Z., H\u00e4rtig, H., Castro, M., Kaashoek, M.F. (eds.) EuroSys 2013. ACM (2013)","DOI":"10.1145\/2465351.2465357"},{"key":"11_CR28","series-title":"LNCS","first-page":"529","volume-title":"ESOP 2010","author":"N Swamy","year":"2010","unstructured":"Swamy, N., Chen, J., Chugh, R.: Enforcing stateful authorization and information flow policies in fine. In: Gordon, A.D. (ed.) ESOP 2010. LNCS, vol. 6012, pp. 529\u2013549. Springer, Heidelberg (2010)"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Swamy, N., Chen, J., Fournet, C., Strub, P-Y., Bhargavan, K., Yang, J.: Secure distributed programming with value-dependent types. In: Chakravarty, M.M.T., Hu, Z., Danvy, O. (eds.) ICFP 2011, pp. 266\u2013278. ACM (2011)","DOI":"10.1145\/2034574.2034811"},{"issue":"1","key":"11_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1290520.1290526","volume":"30","author":"S Tse","year":"2007","unstructured":"Tse, S., Zdancewic, S.: Run-time principals in information-flow type systems. ACM Trans. Program. Lang. Syst. 30(1), 1\u201344 (2007)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"2\/3","key":"11_CR31","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"DM Volpano","year":"1996","unstructured":"Volpano, D.M., Irvine, C.E., Smith, G.: A sound type system for secure flow analysis. J. Comput. Secur. 4(2\/3), 167\u2013188 (1996)","journal-title":"J. Comput. Secur."},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Xi, H., Pfenning, F.: Dependent types in practical programming. In: Appel, A.W., Aiken, A. (eds.) POPL \u201999, pp. 214\u2013227. ACM (1999)","DOI":"10.1145\/292540.292560"},{"key":"11_CR33","unstructured":"Zeldovich, N., Boyd-Wickizer, S., Mazi\u00e8res, D.: Securing distributed systems with information flow control. In: Crowcroft, J., Dahlin, M. (eds.) NSDI 2008, pp. 293\u2013308. USENIX Association (2008)"},{"issue":"2\u20133","key":"11_CR34","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s10207-007-0019-9","volume":"6","author":"L Zheng","year":"2007","unstructured":"Zheng, L., Myers, A.C.: Dynamic security labels and static information flow control. Int. J. Inf. Sec. 6(2\u20133), 67\u201384 (2007)","journal-title":"Int. J. Inf. Sec."}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05119-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:10:26Z","timestamp":1703203826000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05119-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319051185","9783319051192"],"references-count":34,"aliases":["10.1007\/978-3-319-14128-2_11","10.1007\/978-3-319-14128-2_11"],"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05119-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}