{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T00:40:10Z","timestamp":1748652010294,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319241760"},{"type":"electronic","value":"9783319241777"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24177-7_25","type":"book-chapter","created":{"date-parts":[[2015,10,9]],"date-time":"2015-10-09T14:47:11Z","timestamp":1444402031000},"page":"500-519","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Factorization of Behavioral Integrity"],"prefix":"10.1007","author":[{"given":"Ximeng","family":"Li","sequence":"first","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,18]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Bossi, A., Piazza, C., Rossi, S.: Modelling downgrading in information flow security. In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28\u201330 June 2004, Pacific Grove, CA, USA, p. 187 (2004)","key":"25_CR1","DOI":"10.1109\/CSFW.2004.1310741"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-642-15375-4_17","volume-title":"CONCUR 2010 - Concurrency Theory","author":"S Capecchi","year":"2010","unstructured":"Capecchi, S., Castellani, I., Dezani-Ciancaglini, M., Rezk, T.: Session types for access and information flow control. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol. 6269, pp. 237\u2013252. Springer, Heidelberg (2010)"},{"issue":"1","key":"25_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.entcs.2007.09.012","volume":"194","author":"I Castellani","year":"2007","unstructured":"Castellani, I.: State-oriented noninterference for CCS. Electron. Notes Theor. Comput. Sci. 194(1), 39\u201360 (2007)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Schneider, F.B.: Quantification of integrity. In: Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF (2010)","key":"25_CR4","DOI":"10.1109\/CSF.2010.10"},{"doi-asserted-by":"crossref","unstructured":"Cohen, E.S.: Information transmission in computational systems. In: SOSP, pp. 133\u2013139 (1977)","key":"25_CR5","DOI":"10.1145\/1067625.806556"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-45608-2_6","volume-title":"Foundations of Security Analysis and Design","author":"R Focardi","year":"2001","unstructured":"Focardi, R., Gorrieri, R.: Classification of security properties. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 331\u2013396. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Goguen, J.A, Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and Privacy, pp. 11\u201320 (1982)","key":"25_CR7","DOI":"10.1109\/SP.1982.10014"},{"issue":"4\u20135","key":"25_CR8","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s00236-005-0179-x","volume":"42","author":"N Kobayashi","year":"2005","unstructured":"Kobayashi, N.: Type-based information flow analysis for the pi-calculus. Acta Inf. 42(4\u20135), 291\u2013347 (2005)","journal-title":"Acta Inf."},{"doi-asserted-by":"crossref","unstructured":"Montagu, B., Pierce, B.C., Pollack, R.: A theory of information-flow labels. In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, 26\u201328 June 2013, pp. 3\u201317 (2013)","key":"25_CR9","DOI":"10.1109\/CSF.2013.8"},{"doi-asserted-by":"crossref","unstructured":"Muller, S., Chong, S.: Towards a practical secure concurrent language. In: Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2012, pp. 57\u201374 (2012)","key":"25_CR10","DOI":"10.1145\/2384616.2384621"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-39698-4_18","volume-title":"Theories of Programming and Formal Methods","author":"HR Nielson","year":"2013","unstructured":"Nielson, H.R., Nielson, F.: Safety versus security in the quality calculus. In: Liu, Z., Woodcock, J., Zhu, H. (eds.) Theories of Programming and Formal Methods. LNCS, vol. 8051, pp. 285\u2013303. Springer, Heidelberg (2013)"},{"key":"25_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-642-35861-6_12","volume-title":"Formal Aspects of Component Software","author":"HR Nielson","year":"2013","unstructured":"Nielson, H.R., Nielson, F., Vigo, R.: A calculus for quality. In: P\u0103s\u0103reanu, C.S., Sala\u00fcn, G. (eds.) FACS 2012. LNCS, vol. 7684, pp. 188\u2013204. Springer, Heidelberg (2013)"},{"doi-asserted-by":"crossref","unstructured":"Rafnsson, W., Hedin, D., Sabelfeld, A.: Securing interactive programs. In: 25th IEEE Computer Security Foundations Symposium, CSF 2012 (2012)","key":"25_CR13","DOI":"10.1109\/CSF.2012.15"},{"key":"25_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-45789-5_27","volume-title":"Static Analysis","author":"A Sabelfeld","year":"2002","unstructured":"Sabelfeld, A., Mantel, H.: Static confidentiality enforcement for distributed programs. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 376\u2013394. Springer, Berlin Heidelberg (2002)"},{"issue":"1","key":"25_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5\u201319 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"25_CR16","doi-asserted-by":"publisher","first-page":"517","DOI":"10.3233\/JCS-2009-0352","volume":"17","author":"A Sabelfeld","year":"2009","unstructured":"Sabelfeld, A., Sands, D.: Declassification: dimensions and principles. J. Comput. Secur. 17(5), 517\u2013548 (2009)","journal-title":"J. Comput. Secur."},{"key":"25_CR17","volume-title":"The Pi-Calculus - A Theory of Mobile Processes","author":"D Sangiorgi","year":"2001","unstructured":"Sangiorgi, D., Walker, D.: The Pi-Calculus - A Theory of Mobile Processes. Cambridge University Press, UK (2001)"},{"unstructured":"van Bakel, S., Vigliotti, M.G.: Note on a simple type system for non-interference. CoRR, abs\/1109.4843 (2011)","key":"25_CR18"}],"container-title":["Lecture Notes in Computer Science","Computer Security -- ESORICS 2015"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24177-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T00:03:45Z","timestamp":1748649825000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24177-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319241760","9783319241777"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24177-7_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"18 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}