{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:05:32Z","timestamp":1762459532101,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678153"},{"type":"electronic","value":"9783319678160"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67816-0_2","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T06:43:16Z","timestamp":1505198596000},"page":"19-34","source":"Crossref","is-referenced-by-count":2,"title":["Confidentiality of Interactions in Concurrent Object-Oriented Systems"],"prefix":"10.1007","author":[{"given":"Olaf","family":"Owe","sequence":"first","affiliation":[]},{"given":"Toktam","family":"Ramezanifarkhani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-540-88313-5_22","volume-title":"Computer Security - ESORICS 2008","author":"A Askarov","year":"2008","unstructured":"Askarov, A., Hunt, S., Sabelfeld, A., Sands, D.: Termination-insensitive noninterference leaks more than just a bit. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 333\u2013348. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-88313-5_22"},{"issue":"02","key":"2_CR2","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1017\/S0956796804005453","volume":"15","author":"A Banerjee","year":"2005","unstructured":"Banerjee, A., Naumann, D.A.: Stack-based access control and secure information flow. J. Funct. Program. 15(02), 131\u2013177 (2005)","journal-title":"J. Funct. Program."},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-74835-9_2","volume-title":"Computer Security \u2013 ESORICS 2007","author":"G Barthe","year":"2007","unstructured":"Barthe, G., Rezk, T., Russo, A., Sabelfeld, A.: Security of multithreaded programs by compilation. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 2\u201318. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74835-9_2"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"D. Devriese and F. Piessens. Noninterference through secure multi-execution. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 109\u2013124. IEEE (2010)","DOI":"10.1109\/SP.2010.15"},{"issue":"3","key":"2_CR5","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.jlap.2012.01.003","volume":"81","author":"CC Din","year":"2012","unstructured":"Din, C.C., Dovland, J., Johnsen, E.B., Owe, O.: Observable behavior of distributed systems: component reasoning for concurrent objects. J. Logic Algebr. Program. 81(3), 227\u2013256 (2012)","journal-title":"J. Logic Algebr. Program."},{"key":"2_CR6","unstructured":"Erlingsson, U.: The inlined reference monitor approach to security policy enforcement. Ph.D. thesis, Cornell University, Ithaca, NY, USA (2004). AAI3114521"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: IEEE Symposium on Security and Privacy, p. 75 (1984)","DOI":"10.1109\/SP.1984.10019"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Heintze, N., Riecke, J.G.: The SLAM calculus: programming with secrecy and integrity. In: Proceedings of POPL 1998, pp. 365\u2013377. ACM (1998)","DOI":"10.1145\/268946.268976"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4613-1437-0_1","volume-title":"Object Orientation with Parallelism and Persistence","author":"SJ Hodges","year":"1996","unstructured":"Hodges, S.J., Jones, C.B.: Non-interference properties of a concurrent object-based language: proofs based on operational semantics. In: Freitag, B., Jones, C.B., Lengauer, C., Schek, H.J. (eds.) Object Orientation with Parallelism and Persistence, pp. 1\u201322. Springer, Boston (1996). doi: 10.1007\/978-1-4613-1437-0_1"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-35890-6_9","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"F Kamm\u00fcller","year":"2013","unstructured":"Kamm\u00fcller, F.: A semi-lattice model for multi-lateral security. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM\/SETOP -2012. LNCS, vol. 7731, pp. 118\u2013132. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-35890-6_9"},{"issue":"2","key":"2_CR11","first-page":"246","volume":"6","author":"F Kamm\u00fcller","year":"2015","unstructured":"Kamm\u00fcller, F.: Confinement for active objects. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 6(2), 246\u2013260 (2015)","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"},{"issue":"1","key":"2_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s10270-006-0011-2","volume":"6","author":"EB Johnsen","year":"2007","unstructured":"Johnsen, E.B., Owe, O.: An asynchronous communication model for distributed concurrent objects. Softw. Syst. Model. 6(1), 35\u201358 (2007)","journal-title":"Softw. Syst. Model."},{"issue":"1\u20132","key":"2_CR13","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.tcs.2006.07.031","volume":"365","author":"EB Johnsen","year":"2006","unstructured":"Johnsen, E.B., Owe, O., Creol, I.C.Y.: A type-safe object-oriented model for distributed concurrent systems. Theor. Comput. Sci. 365(1\u20132), 23\u201366 (2006)","journal-title":"Theor. Comput. Sci."},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-642-25271-6_8","volume-title":"Formal Methods for Components and Objects","author":"EB Johnsen","year":"2011","unstructured":"Johnsen, E.B., H\u00e4hnle, R., Sch\u00e4fer, J., Schlatte, R., Steffen, M.: ABS: a core language for abstract behavioral specification. In: Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds.) FMCO 2010. LNCS, vol. 6957, pp. 142\u2013164. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-25271-6_8"},{"key":"2_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03811-6","volume-title":"Principles of Program Analysis","author":"F Nielson","year":"1999","unstructured":"Nielson, F., Nielson, H.-R., Hankin, C.L.: Principles of Program Analysis. Springer, Heidelberg (1999). doi: 10.1007\/978-3-662-03811-6"},{"key":"2_CR16","unstructured":"Owe, O., Ramezanifarkhani, T.: Static enforcement of confidentiality of interactions in concurrent object-oriented systems. Technical report, Department of Informatics, University of Oslo, Norway (2017). An extended version of this paper. http:\/\/heim.ifi.uio.no\/olaf\/Papers\/SeCreolReport.pdf"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Ramezanifarkhani, T., Owe, O., Tokas, S.: A secrecy-preserving language for distributed and object-oriented systems, March 2017 (submitted)","DOI":"10.1016\/j.jlamp.2018.04.001"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-45789-5_27","volume-title":"Static Analysis","author":"A Sabelfeld","year":"2002","unstructured":"Sabelfeld, A., Mantel, H.: Static confidentiality enforcement for distributed programs. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 376\u2013394. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45789-5_27"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information flow security. IEEE J. Sel. Areas Commun. 21, 5\u201319 (2003)","journal-title":"IEEE J. Sel. Areas Commun."}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67816-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T06:45:11Z","timestamp":1570085111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67816-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678153","9783319678160"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67816-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}