{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:16:11Z","timestamp":1742912171514,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319170152"},{"type":"electronic","value":"9783319170169"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17016-9_16","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T00:52:41Z","timestamp":1427590361000},"page":"250-265","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automatically Calculating Quantitative Integrity Measures for Imperative Programs"],"prefix":"10.1007","author":[{"given":"Tom","family":"Chothia","sequence":"first","affiliation":[]},{"given":"Chris","family":"Novakovic","sequence":"additional","affiliation":[]},{"given":"Rajiv Ranjan","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,28]]},"reference":[{"key":"16_CR1","unstructured":"BBC: Libor scandal: Seven banks face us questioning. BBC News, 16 August 2012"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1007\/978-3-642-39799-8_49","volume-title":"Computer Aided Verification","author":"F Biondi","year":"2013","unstructured":"Biondi, F., Legay, A., Traonouez, L.-M., Wasowski, A.: QUAIL: a quantitative security analyzer for imperative code. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 702\u2013707. Springer, Heidelberg (2013)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-17714-9_5","volume-title":"Information Systems Security","author":"A Birgisson","year":"2010","unstructured":"Birgisson, A., Russo, A., Sabelfeld, A.: Unifying facets of information integrity. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol. 6503, pp. 48\u201365. Springer, Heidelberg (2010)"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. J. Cryptology 1, 65\u201375 (1988)","journal-title":"J. Cryptology"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-319-11212-1_13","volume-title":"Computer Security - ESORICS 2014","author":"T Chothia","year":"2014","unstructured":"Chothia, T., Kawamoto, Y., Novakovic, C.: LeakWatch: estimating information leakage from java programs. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 219\u2013236. Springer, Heidelberg (2014)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Chothia, T., Kawamoto, Y., Novakovic, C., Parker, D.: Probabilistic point-to-point information leakage. In: Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF 2013), pp. 193\u2013205. IEEE Computer Society, June 2013","DOI":"10.1109\/CSF.2013.20"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.entcs.2004.01.018","volume":"112","author":"D Clark","year":"2005","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantified interference for a while language. Electron. Notes Theor. Comput. Sci. 112, 149\u2013166 (2005)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Schneider, F.B.: Quantification of integrity. In: 2010 23rd IEEE Computer Security Foundations Symposium (CSF), pp. 28\u201343. IEEE (2010)","DOI":"10.1109\/CSF.2010.10"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1017\/S0960129513000595","volume":"25","author":"MR Clarkson","year":"2014","unstructured":"Clarkson, M.R., Schneider, F.B.: Quantification of integrity. Math. Struct. Comput. Sci. 25, 207\u2013258 (2014)","journal-title":"Math. Struct. Comput. Sci."},{"key":"16_CR10","volume-title":"Elements of information theory","author":"TM Cover","year":"2012","unstructured":"Cover, T.M., Thomas, J.A.: Elements of information theory. Wiley, New York (2012)"},{"key":"16_CR11","unstructured":"Mollenkamp, C., Whitehouse, M.: Study casts doubt on key rate. Wall Street J., 29 May 2008"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Mu, C., Clark, D.: A tool: quantitative analyser for programs. In: Proceedings of the 8th Conference on Quantitative Evaluation of Systems (QEST) (2011)","DOI":"10.1109\/QEST.2011.25"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-00596-1_21","volume-title":"Foundations of Software Science and Computational Structures","author":"G Smith","year":"2009","unstructured":"Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288\u2013302. Springer, Heidelberg (2009)"},{"key":"16_CR14","unstructured":"University of Birmingham: $${\\sf CH-IMP-IQ}$$. http:\/\/www.cs.bham.ac.uk\/research\/projects\/infotools\/chimp\/iq"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17016-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T11:22:02Z","timestamp":1674559322000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17016-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319170152","9783319170169"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17016-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}