{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:56:15Z","timestamp":1742928975889,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319231648"},{"type":"electronic","value":"9783319231655"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23165-5_20","type":"book-chapter","created":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T03:57:43Z","timestamp":1440561463000},"page":"427-450","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Discretionary Information Flow Control for Interaction-Oriented Specifications"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Lluch Lafuente","sequence":"first","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,27]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Aananthakrishnan, S., Bronevetsky, G., Gopalakrishnan, G.: Hybrid approach for data-flow analysis of MPI programs. In: Malony, A.D., Nemirovsky, M., Midkiff, S.P. (eds.) International Conference on Supercomputing, ICS 2013, pp. 455\u2013456. ACM, Eugene, OR, USA, 10\u201314 June 2013. http:\/\/doi.acm.org\/10.1145\/2464996.2467286","DOI":"10.1145\/2464996.2467286"},{"key":"20_CR2","unstructured":"Bartoletti, M., Castellani, I., Denielou, P.M., Dezani-Ciancaglini, M., Ghilezan, S., Pantovic, J., P\u00e9rez, J.A., Thiemann, P., Toninho, B., Vieira, H.T.: Combining behavioural types with security analysis, state of The Art Report of WG2 - European Cost Action IC1201 BETTY (Behavioural Types for Reliable Large-Scale Software Systems). http:\/\/www.behavioural-types.eu\/publications\/WG2-State-of-the-Art.pdf\/at_download\/file"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/978-3-642-54833-8_26","volume-title":"Programming Languages and Systems","author":"L Bocchi","year":"2014","unstructured":"Bocchi, L., Melgratti, H., Tuosto, E.: Resolving non-determinism in choreographies. In: Shao, Z. (ed.) ESOP 2014. LNCS, vol. 8410, pp. 493\u2013512. Springer, Heidelberg (2014). http:\/\/dx.doi.org\/10.1007\/978-3-642-54833-8_26"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-642-01465-9_2","volume-title":"Formal Aspects in Security and Trust","author":"G Boudol","year":"2009","unstructured":"Boudol, G.: Secure information flow as a safety property. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 20\u201334. Springer, Heidelberg (2009). http:\/\/dx.doi.org\/10.1007\/978-3-642-01465-9_2"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Bronevetsky, G.: Communication-sensitive static dataflow for parallel message passing applications. In: Proceedings of the CGO 2009, The Seventh International Symposium on Code Generation and Optimization, pp. 1\u201312, Seattle, Washington, USA, 22\u201325 March 2009. IEEE Computer Society (2009). http:\/\/dx.doi.org\/10.1109\/CGO.2009.32","DOI":"10.1109\/CGO.2009.32"},{"issue":"2","key":"20_CR6","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/S0304-3975(01)00318-8","volume":"286","author":"R Bruni","year":"2002","unstructured":"Bruni, R., Gadducci, F., Montanari, U.: Normal forms for algebras of connection. Theor. Comput. Sci. 286(2), 247\u2013292 (2002). http:\/\/dx.doi.org\/10.1016\/S0304-3975(01)00318\u20138","journal-title":"Theor. Comput. Sci."},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.ic.2014.07.005","volume":"238","author":"S Capecchi","year":"2014","unstructured":"Capecchi, S., Castellani, I., Dezani-Ciancaglini, M.: Typing access control and secure information flow in sessions. Inf. Comput. 238, 68\u2013105 (2014). http:\/\/dx.doi.org\/10.1016\/j.ic.2014.07.005","journal-title":"Inf. Comput."},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Carbone, M., Montesi, F.: Deadlock-freedom-by-design: multiparty asynchronous global programming. In: Giacobazzi, R., Cousot, R. (eds.) The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2013), pp. 263\u2013274. ACM (2013). http:\/\/doi.acm.org\/10.1145\/2429069.2429101","DOI":"10.1145\/2429069.2429101"},{"issue":"1","key":"20_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2168\/LMCS-8(1:24)2012","volume":"8","author":"G Castagna","year":"2012","unstructured":"Castagna, G., Dezani-Ciancaglini, M., Padovani, L.: On global types and multi-party session. Log. Methods Comput. Sci. 8(1), 1\u201345 (2012). http:\/\/dx.doi.org\/10.2168\/LMCS-8(1:24)2012","journal-title":"Log. Methods Comput. Sci."},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Cohen, E.: Information transmission in computational systems. In: Sixth ACM Symposium on Operating Systems Principles, SOSP 1977, pp. 133\u2013139. ACM, New York, NY, USA (1977). http:\/\/doi.acm.org\/10.1145\/800214.806556","DOI":"10.1145\/1067625.806556"},{"issue":"4","key":"20_CR11","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1023\/A:1008647417502","volume":"7","author":"A Corradini","year":"1999","unstructured":"Corradini, A., Gadducci, F.: An algebraic presentation of term graphs, via GS-monoidal categories. Appl. Categorical Struct. 7(4), 299\u2013331 (1999). http:\/\/dx.doi.org\/10.1023\/A:1008647417502","journal-title":"Appl. Categorical Struct."},{"issue":"1","key":"20_CR12","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-20775-4_1","volume-title":"Functional and Constraint Logic Programming","author":"M Dezani-Ciancaglini","year":"2010","unstructured":"Dezani-Ciancaglini, M., Ghilezan, S., Jak\u015bi\u0107, S., Pantovi\u0107, J.: Types for role-based access control of dynamic web data. In: Mari\u00f1o, J. (ed.) WFLP 2010. LNCS, vol. 6559, pp. 1\u201329. Springer, Heidelberg (2010)"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.tcs.2012.06.020","volume":"464","author":"M Dezani-Ciancaglini","year":"2012","unstructured":"Dezani-Ciancaglini, M., Horne, R., Sassone, V.: Tracing where and who provenance in linked data: a calculus. Theor. Comput. Sci. 464, 113\u2013129 (2012). http:\/\/dx.doi.org\/10.1016\/j.tcs.2012.06.020","journal-title":"Theor. Comput. Sci."},{"issue":"3","key":"20_CR15","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1017\/S096012950700610X","volume":"17","author":"F Gadducci","year":"2007","unstructured":"Gadducci, F.: Graph rewriting for the pi-calculus. Math. Struct. Comput. Sci. 17(3), 407\u2013437 (2007). http:\/\/dx.doi.org\/10.1017\/S096012950700610X","journal-title":"Math. Struct. Comput. Sci."},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and Privacy, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"issue":"12","key":"20_CR17","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/2043174.2043194","volume":"54","author":"G Gopalakrishnan","year":"2011","unstructured":"Gopalakrishnan, G., Kirby, R.M., Siegel, S.F., Thakur, R., Gropp, W., Lusk, E.L., de Supinski, B.R., Schulz, M., Bronevetsky, G.: Formal analysis of MPI-based parallel programs. Commun. ACM 54(12), 82\u201391 (2011). http:\/\/doi.acm.org\/10.1145\/2043174.2043194","journal-title":"Commun. ACM"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-33518-1_37","volume-title":"Recent Advances in the Message Passing Interface","author":"K Honda","year":"2012","unstructured":"Honda, K., Marques, E.R.B., Martins, F., Ng, N., Vasconcelos, V.T., Yoshida, N.: Verification of MPI programs using session types. In: Tr\u00e4aff, J.L., Benkner, S., Dongarra, J.J. (eds.) EuroMPI 2012. lncs, vol. 7490, pp. 291\u2013293. Springer, Heidelberg (2012). http:\/\/dx.doi.org\/10.1007\/978-3-642-33518-1_37"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. In: Necula, G.C., Wadler, P. (eds.) 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2008), pp. 273\u2013284. ACM (2008). http:\/\/doi.acm.org\/10.1145\/1328438.1328472","DOI":"10.1145\/1328438.1328472"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Lanese, I., Guidi, C., Montesi, F., Zavattaro, G.: Bridging the gap between interaction- and process-oriented choreographies. In: Cerone, A., Gruner, S. (eds.) Sixth IEEE International Conference on Software Engineering and Formal Methods, SEFM 2008, pp. 323\u2013332, Cape Town, South Africa, 10\u201314 November 2008. IEEE Computer Society (2008). http:\/\/dx.doi.org\/10.1109\/SEFM.2008.11","DOI":"10.1109\/SEFM.2008.11"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-25535-9_7","volume-title":"Service-Oriented Computing","author":"N Lohmann","year":"2011","unstructured":"Lohmann, N., Wolf, K.: Decidability results for choreography realization. In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) ICSOC 2011. LNCS, vol. 7084, pp. 92\u2013107. Springer, Heidelberg (2011). http:\/\/dx.doi.org\/10.1007\/978-3-642-25535-9_7"},{"key":"20_CR22","unstructured":"Montesi, F.: Choreographic Programming. Ph.D. thesis, IT University of Copenhagen (2013). http:\/\/www.fabriziomontesi.com\/files\/m13_phdthesis.pdf"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Myers, A.C., Liskov, B.: A decentralized model for information flow control. In: SOSP. pp. 129\u2013142 (1997). http:\/\/doi.acm.org\/10.1145\/268998.266669","DOI":"10.1145\/269005.266669"},{"key":"20_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03811-6","volume-title":"Principles of Program Analysis","author":"F Nielson","year":"1999","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Logic, Rewriting, and Concurrency"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23165-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T13:29:40Z","timestamp":1674566980000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23165-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319231648","9783319231655"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23165-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"27 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}