{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:20:53Z","timestamp":1725906053749},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319631202"},{"type":"electronic","value":"9783319631219"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63121-9_1","type":"book-chapter","created":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T08:05:15Z","timestamp":1500883515000},"page":"3-21","source":"Crossref","is-referenced-by-count":7,"title":["Information Flow for Timed Automata"],"prefix":"10.1007","author":[{"given":"Flemming","family":"Nielson","sequence":"first","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Vasilikos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,25]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511814105","volume-title":"Reactive Systems: Modelling, Specification and Verification","author":"L Aceto","year":"2007","unstructured":"Aceto, L., Ingolfsdottir, A., Larsen, K.G., Srba, J.: Reactive Systems: Modelling, Specification and Verification. Cambridge University Press, Cambridge (2007)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Agat, J.: Transforming out timing leaks. In: Proceedings of the POPL, pp. 40\u201353 (2000)","DOI":"10.1145\/325694.325702"},{"issue":"2","key":"1_CR3","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R Alur","year":"1994","unstructured":"Alur, R., Dill, D.L.: A theory of timed automata. Theor. Comput. Sci. 126(2), 183\u2013235 (1994)","journal-title":"Theor. Comput. Sci."},{"issue":"4","key":"1_CR4","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1145\/357146.357150","volume":"3","author":"KR Apt","year":"1981","unstructured":"Apt, K.R.: Ten years of Hoare\u2019s logic: a survey - part 1. ACM Trans. Program. Lang. Syst. 3(4), 431\u2013483 (1981)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-58618-0_56","volume-title":"Computer Security \u2014 ESORICS 1994","author":"J-P Ban\u00e2tre","year":"1994","unstructured":"Ban\u00e2tre, J.-P., Bryce, C., M\u00e9tayer, D.: Compile-time detection of information flow in sequential programs. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 55\u201373. Springer, Heidelberg (1994). doi:\n10.1007\/3-540-58618-0_56"},{"issue":"1\u20132","key":"1_CR6","first-page":"1","volume":"51","author":"R Barbuti","year":"2002","unstructured":"Barbuti, R., De Francesco, N., Santone, A., Tesei, L.: A notion of non-interference for timed automata. Fundam. Inform. 51(1\u20132), 1\u201311 (2002)","journal-title":"Fundam. Inform."},{"issue":"2\u20133","key":"1_CR7","first-page":"137","volume":"54","author":"R Barbuti","year":"2003","unstructured":"Barbuti, R., Tesei, L.: A decidable notion of timed non-interference. Fundam. Inform. 54(2\u20133), 137\u2013150 (2003)","journal-title":"Fundam. Inform."},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-540-31848-4_7","volume-title":"Formal Approaches to Software Testing","author":"B Bordbar","year":"2005","unstructured":"Bordbar, B., Okano, K.: Testing deadlock-freeness in real-time systems: a formal approach. In: Grabowski, J., Nielsen, B. (eds.) FATES 2004. LNCS, vol. 3395, pp. 95\u2013109. Springer, Heidelberg (2005). doi:\n10.1007\/978-3-540-31848-4_7"},{"issue":"7","key":"1_CR9","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"DE Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504\u2013513 (1977)","journal-title":"Commun. ACM"},{"issue":"8","key":"1_CR10","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1145\/360933.360975","volume":"18","author":"EW Dijkstra","year":"1975","unstructured":"Dijkstra, E.W.: Guarded commands, nondeterminacy and formal derivation of programs. Commun. ACM 18(8), 453\u2013457 (1975)","journal-title":"Commun. ACM"},{"issue":"1","key":"1_CR11","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/JSAC.2002.806122","volume":"21","author":"R Focardi","year":"2003","unstructured":"Focardi, R., Gorrieri, R., Martinelli, F.: Real-time information flow analysis. IEEE J. Sel. Areas Commun. 21(1), 20\u201335 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"1_CR12","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.entcs.2005.05.046","volume":"180","author":"G Gardey","year":"2007","unstructured":"Gardey, G., Mullins, J., Roux, O.H.: Non-interference control synthesis for security timed automata. Electr. Notes Theor. Comput. Sci. 180(1), 35\u201353 (2007)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"issue":"5","key":"1_CR13","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1109\/TSE.2010.4","volume":"36","author":"R Lanotte","year":"2010","unstructured":"Lanotte, R., Maggiolo-Schettini, A., Troina, A.: Time and probability-based information flow analysis. IEEE Trans. Softw. Eng. 36(5), 719\u2013734 (2010)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Myers, A.C., Liskov, B.: A decentralized model for information flow control. In: ACM Symposium on Operating System Principles, SOSP 1997, pp. 129\u2013142. ACM (1997)","DOI":"10.1145\/268998.266669"},{"key":"1_CR15","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.jlamp.2016.09.005","volume":"87","author":"Hanne Riis Nielson and Flemming Nielson","year":"2017","unstructured":"Hanne Riis Nielson and Flemming Nielson: Content dependent information flow control. J. Log. Algebr. Meth. Program. 87, 6\u201332 (2017)","journal-title":"J. Log. Algebr. Meth. Program."},{"key":"1_CR16","unstructured":"UPPAAL. \nhttp:\/\/www.uppaal.com\/index.php?sida=200&rubrik=95"},{"issue":"2\/3","key":"1_CR17","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"DM Volpano","year":"1996","unstructured":"Volpano, D.M., Smith, G., Irvine, C.E.: A sound type system for secure flow analysis. J. Comput. Secur. 4(2\/3), 167\u2013188 (1996)","journal-title":"J. Comput. Secur."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Zdancewic, S., Myers, A.C.: Observational determinism for concurrent program security. In: Proceedings of the CSFW, pp. 29\u201343 (2003)","DOI":"10.1109\/CSFW.2003.1212703"}],"container-title":["Lecture Notes in Computer Science","Models, Algorithms, Logics and Tools"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63121-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T08:05:36Z","timestamp":1500883536000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63121-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319631202","9783319631219"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63121-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}