{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:10:06Z","timestamp":1742955006509,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_24","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"395-415","source":"Crossref","is-referenced-by-count":0,"title":["An Automatic Inference of Minimal Security Types"],"prefix":"10.1007","author":[{"given":"Dominik","family":"Bollmann","sequence":"first","affiliation":[]},{"given":"Steffen","family":"Lortz","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Mantel","sequence":"additional","affiliation":[]},{"given":"Artem","family":"Starostin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"issue":"2","key":"24_CR1","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1017\/S0956796804005453","volume":"15","author":"A Banerjee","year":"2005","unstructured":"Banerjee, A., Naumann, D.A.: Stack-based access control and secure information flow. J. Funct. Program. 15(2), 131\u2013177 (2005)","journal-title":"J. Funct. Program."},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Barthe, G., Rezk, T., Naumann, D.A.: Deriving an information flow checker and certifying compiler for Java. In: Proceedings of the 27th IEEE Symposium on Security and Privacy (S&P), pp. 230\u2013242. IEEE (2006)","DOI":"10.1109\/SP.2006.13"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-319-05302-8_6","volume-title":"Foundations and Practice of Security","author":"A Bedford","year":"2014","unstructured":"Bedford, A., Desharnais, J., Godonou, T.G., Tawbi, N.: Enforcing information flow by combining static and dynamic analysis. In: Danger, J.-L., Debbabi, M., Marion, J.-Y., Garcia-Alfaro, J., Heywood, N.Z. (eds.) FPS 2013. LNCS, vol. 8352, pp. 83\u2013101. Springer, Heidelberg (2014)"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-319-03542-0_16","volume-title":"Programming Languages and Systems","author":"N Broberg","year":"2013","unstructured":"Broberg, N., van Delft, B., Sands, D.: Paragon for practical programming with information-flow control. In: Shan, C. (ed.) APLAS 2013. LNCS, vol. 8301, pp. 217\u2013232. Springer, Heidelberg (2013)"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Deng, Z., Smith, G.: Type inference and informative error reporting for secure information flow. In: Proceedings of the 44th Annual Southeast Regional Conference (ACM-SE), pp. 543\u2013548. ACM (2006)","DOI":"10.1145\/1185448.1185567"},{"issue":"7","key":"24_CR6","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"DE Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504\u2013513 (1977)","journal-title":"Commun. ACM"},{"issue":"1","key":"24_CR7","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/0167-6423(95)00007-0","volume":"27","author":"D Duggan","year":"1996","unstructured":"Duggan, D., Bent, F.: Explaining type inference. Sci. Comput. Program. 27(1), 37\u201383 (1996)","journal-title":"Sci. Comput. Program."},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Ernst, M.D., Just, R., Millstein, S., Dietl, W.M., Pernsteiner, S., Roesner, F., Koscher, K., Barros, P., Bhoraskar, R., Han, S., Vines, P., Wu, E.X.: Collaborative verification of information flow for high-assurance app store. In: Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), pp. 1092\u20131104. ACM (2014)","DOI":"10.1145\/2660267.2660343"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proceedings of the 3rd IEEE Symposium on Security and Privacy (S&P), pp. 11\u201320. IEEE (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Hristova, K., Rothamel, T., Liu, Y.A., Stoller, S.D.: Efficient type inference for secure information flow. In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security (PLAS), pp. 85\u201394. ACM (2006)","DOI":"10.1145\/1134744.1134759"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-54804-8_10","volume-title":"Fundamental Approaches to Software Engineering","author":"W Huang","year":"2014","unstructured":"Huang, W., Dong, Y., Milanova, A.: Type-based taint analysis for Java web applications. In: Gnesi, S., Rensink, A. (eds.) FASE 2014 (ETAPS). LNCS, vol. 8411, pp. 140\u2013154. Springer, Heidelberg (2014)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Hunt, S., Sands, D.: On flow-sensitive security types. In: Proceedings of the 33rd ACM Symposium on Principles of Programming Languages (POPL), pp. 79\u201390. ACM (2006)","DOI":"10.1145\/1111037.1111045"},{"key":"24_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-642-19718-5_16","volume-title":"Programming Languages and Systems","author":"S Hunt","year":"2011","unstructured":"Hunt, S., Sands, D.: From exponential to polynomial-time security typing via principal types. In: Barthe, G. (ed.) ESOP 2011. LNCS, vol. 6602, pp. 297\u2013316. Springer, Heidelberg (2011)"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-89862-7_4","volume-title":"Information Systems Security","author":"D King","year":"2008","unstructured":"King, D., Hicks, B., Hicks, M.W., Jaeger, T.: Implicit flows: can\u2019t live with \u2018em, can\u2019t live without \u2018em. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 56\u201370. Springer, Heidelberg (2008)"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Lortz, S., Mantel, H., Starostin, A., B\u00e4hr, T., Schneider, D., Weber, A.: Cassandra: towards a certifying app store for android. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp. 93\u2013104. ACM (2014)","DOI":"10.1145\/2666620.2666631"},{"issue":"4","key":"24_CR16","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s13389-011-0021-z","volume":"1","author":"A Lux","year":"2011","unstructured":"Lux, A., Starostin, A.: A tool for static detection of timing channels in Java. J. Cryptographic Eng. 1(4), 303\u2013313 (2011)","journal-title":"J. Cryptographic Eng."},{"issue":"3","key":"24_CR17","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/0022-0000(78)90014-4","volume":"17","author":"R Milner","year":"1978","unstructured":"Milner, R.: A theory of type polymorphism in programming. J. Comput. Syst. Sci. 17(3), 348\u2013375 (1978)","journal-title":"J. Comput. Syst. Sci."},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: practical mostly-static information flow control. In: Proceedings of the 26th ACM Symposium on Principles of Programming Languages (POPL), pp. 228\u2013241. ACM (1999)","DOI":"10.1145\/292540.292561"},{"issue":"1","key":"24_CR19","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/596980.596983","volume":"25","author":"F Pottier","year":"2003","unstructured":"Pottier, F., Simonet, V.: Information flow inference for ML. ACM Trans. Program. Lang. Syst. 25(1), 117\u2013158 (2003)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"1","key":"24_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDSC.2012.73","volume":"10","author":"W Rafnsson","year":"2013","unstructured":"Rafnsson, W., Nakata, K., Sabelfeld, A.: Securing class initialization in Java-like languages. IEEE Trans. Dependable Secure Comput. 10(1), 1\u201313 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"24_CR21","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S0167-6423(99)00011-8","volume":"35","author":"J Rehof","year":"1999","unstructured":"Rehof, J., Mogensen, T.A.: Tractable constraints in finite semilattices. Sci. Comput. Program. 35(2), 191\u2013221 (1999)","journal-title":"Sci. Comput. Program."},{"issue":"1","key":"24_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5\u201319 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Smith, S.F., Thober, M.: Improving usability of information flow security in Java. In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security (PLAS), pp. 11\u201320. ACM (2007)","DOI":"10.1145\/1255329.1255332"},{"key":"24_CR24","unstructured":"Strecker, M.: Formal Analysis of an Information Flow Type System for MicroJava. Technical report, Technische Universit\u00e4t M\u00fcnchen (2003)"},{"key":"24_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/3-540-44716-4_16","volume-title":"Functional and Logic Programming","author":"M Sulzmann","year":"2001","unstructured":"Sulzmann, M.: A general type inference framework for Hindley\/Milner style systems. In: Kuchen, H., Ueda, K. (eds.) FLOPS 2001. LNCS, vol. 2024, pp. 248\u2013263. Springer, Heidelberg (2001)"},{"key":"24_CR26","unstructured":"Sun, Q.: Constraint-Based Modular Secure Information Flow Inference for Object-Oriented Programs. Ph.D. thesis, Stevens Institute of Technology (2008)"},{"key":"24_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-27864-1_9","volume-title":"Static Analysis","author":"Q Sun","year":"2004","unstructured":"Sun, Q., Banerjee, A., Naumann, D.A.: Modular and constraint-based information flow inference for an object-oriented language. In: Giacobazzi, R. (ed.) SAS 2004. LNCS, vol. 3148, pp. 84\u201399. Springer, Heidelberg (2004)"},{"key":"24_CR28","doi-asserted-by":"crossref","unstructured":"Terauchi, T.: A type system for observational determinism. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF), pp. 287\u2013300. IEEE (2008)","DOI":"10.1109\/CSF.2008.9"},{"key":"24_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/978-3-662-46666-7_3","volume-title":"Principles of Security and Trust","author":"B Delft van","year":"2015","unstructured":"van Delft, B., Hunt, S., Sands, D.: Very static enforcement of dynamic policies. In: Focardi, R., Myers, A. (eds.) POST 2015. LNCS, vol. 9036, pp. 32\u201352. Springer, Heidelberg (2015)"},{"issue":"2\/3","key":"24_CR30","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D Volpano","year":"1996","unstructured":"Volpano, D., Irvine, C., Smith, G.: A sound type system for secure flow analysis. J. Comput. Secur. 4(2\/3), 167\u2013188 (1996)","journal-title":"J. Comput. Secur."},{"key":"24_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/BFb0030629","volume-title":"TAPSOFT \u201997: Theory and Practice of Software Development","author":"D Volpano","year":"1997","unstructured":"Volpano, D., Smith, G.: A type-based approach to program security. In: Bidoit, M., Dauchet, M. (eds.) CAAP\/FASE \/TAPSOFT 1997. LNCS, vol. 1214, pp. 607\u2013621. Springer, Heidelberg (1997)"},{"issue":"2","key":"24_CR32","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.scico.2014.03.011","volume":"95","author":"J Weijers","year":"2014","unstructured":"Weijers, J., Hage, J., Holdermans, S.: Security type error diagnosis for higher-order polymorphic languages. Sci. Comput. Program. 95(2), 200\u2013218 (2014)","journal-title":"Sci. Comput. Program."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:03:20Z","timestamp":1559333000000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}