{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T14:40:07Z","timestamp":1746369607689,"version":"3.40.4"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118505"},{"type":"electronic","value":"9783319118512"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11851-2_6","type":"book-chapter","created":{"date-parts":[[2014,9,6]],"date-time":"2014-09-06T10:55:22Z","timestamp":1410000922000},"page":"81-96","source":"Crossref","is-referenced-by-count":3,"title":["Ensuring Secure Non-interference of Programs by Game Semantics"],"prefix":"10.1007","author":[{"given":"Aleksandar S.","family":"Dimovski","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Abramsky, S., McCusker, G.: Game Semantics. In: Proceedings of the 1997 Marktoberdorf Summer School: Computational Logic, pp. 1\u201356. Springer (1998)","DOI":"10.1007\/978-3-642-58622-4_1"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Barthe, G., D\u2019Argenio, P.R., Rezk, T.: Secure information flow by self-composition. In: IEEE CSFW 2004, pp. 100\u2013114. IEEE Computer Society Press (2004)","DOI":"10.1109\/CSFW.2004.1310735"},{"issue":"1","key":"6_CR3","first-page":"3","volume":"28","author":"D. Clark","year":"2002","unstructured":"Clark, D., Hankin, C., Hunt, S.: Information flow for Alogol-like languages. Computer Languages\u00a028(1), 3\u201328 (2002)","journal-title":"Computer Languages"},{"key":"6_CR4","volume-title":"Cryptography and Data Security","author":"D.E. Denning","year":"1982","unstructured":"Denning, D.E.: Cryptography and Data Security. Addison-Wesley, Reading (1982)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/11547662_9","volume-title":"Static Analysis","author":"A. Dimovski","year":"2005","unstructured":"Dimovski, A., Ghica, D.R., Lazi\u0107, R.S.: Data-Abstraction Refinement: A Game Semantic Approach. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol.\u00a03672, pp. 102\u2013117. Springer, Heidelberg (2005)"},{"issue":"1","key":"6_CR6","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s10009-006-0005-y","volume":"9","author":"A. Dimovski","year":"2007","unstructured":"Dimovski, A., Lazi\u0107, R.: Compositional Software Verification Based on Game Semantics and Process Algebras. Int. Journal on STTT\u00a09(1), 37\u201351 (2007)","journal-title":"Int. Journal on STTT"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Dimovski, A.: Slot Games for Detecting Timing Leaks of Programs. In: Puppis, G., Villa, T. (eds.) GandALF 2013. EPTCS, vol.\u00a0119, pp. 166\u2013179. Open Publishing Association (2013)","DOI":"10.4204\/EPTCS.119.15"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Dimovski, A.: Program Verification Using Symbolic Game Semantics. In: Theoretical Computer Science (TCS) (January 2014)","DOI":"10.1016\/j.tcs.2014.01.016"},{"issue":"1-3","key":"6_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/S0304-3975(03)00315-3","volume":"309","author":"D.R. Ghica","year":"2003","unstructured":"Ghica, D.R., McCusker, G.: The Regular-Language Semantics of Second-order Idealized Algol. Theoretical Computer Science\u00a0309(1-3), 469\u2013502 (2003)","journal-title":"Theoretical Computer Science"},{"key":"6_CR10","first-page":"85","volume-title":"POPL 2005","author":"D.R. Ghica","year":"1998","unstructured":"Ghica, D.R.: Slot Games: a quantitative model of computation. In: Palsberg, J., Abadi, M. (eds.) POPL 2005, pp. 85\u201397. ACM Press, New York (1998)"},{"key":"6_CR11","first-page":"365","volume-title":"POPL 1998","author":"N. Heintze","year":"1998","unstructured":"Heintze, N., Riecke, J.G.: The SLam calculus: programming with secrecy and integrity. In: MacQueen, D.B., Cardelli, L. (eds.) POPL 1998, pp. 365\u2013377. ACM, New York (1998)"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/S0167-6423(99)00024-6","volume":"37","author":"R. Joshi","year":"2000","unstructured":"Joshi, R., Leino, K.R.M.: A semantic approach to secure information flow. Science of Computer Programming\u00a037, 113\u2013138 (2000)","journal-title":"Science of Computer Programming"},{"key":"6_CR13","first-page":"443","volume-title":"LICS 1999","author":"M. Malacaria","year":"1999","unstructured":"Malacaria, M., Hankin, C.: Non-deterministic games and program analysis: An application to security. In: LICS 1999, pp. 443\u2013452. IEEE Computer Society Press, Los Alamitos (1999)"},{"issue":"1","key":"6_CR14","doi-asserted-by":"crossref","first-page":"37","DOI":"10.3233\/JCS-1992-1103","volume":"1","author":"J. McLean","year":"1992","unstructured":"McLean, J.: Proving noninterference and functional correctness using traces. J. Computer Security\u00a01(1), 37\u201358 (1992)","journal-title":"J. Computer Security"},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2\/3","key":"6_CR16","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. Journal of Computer Security\u00a04(2\/3), 167\u2013188 (1996)","journal-title":"Journal of Computer Security"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Volpano, D., Smith, G.: Eliminating covert flows with minimum typings. In: IEEE Computer Security Foundations Workshop (CSFW), pp. 156\u2013169. IEEE Computer Society Press (1997)","DOI":"10.1109\/CSFW.1997.596807"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11851-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T14:17:33Z","timestamp":1746368253000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11851-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118505","9783319118512"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11851-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}