{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:31Z","timestamp":1740099031006,"version":"3.37.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319897219"},{"type":"electronic","value":"9783319897226"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-89722-6_2","type":"book-chapter","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T14:53:50Z","timestamp":1523631230000},"page":"28-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Secure Information Release in Timed Automata"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6280-6208","authenticated-orcid":false,"given":"Panagiotis","family":"Vasilikos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7362-6176","authenticated-orcid":false,"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2484-5580","authenticated-orcid":false,"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,14]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814105","volume-title":"Reactive Systems: Modelling, Specification and Verification","author":"L Aceto","year":"2007","unstructured":"Aceto, L., Ingolfsdottir, A., Larsen, K.G., Srba, J.: Reactive Systems: Modelling, Specification and Verification. Cambridge University Press, Cambridge (2007)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Agat, J.: Transforming out timing leaks. In: Proceedings of the POPL, pp. 40\u201353 (2000)","DOI":"10.1145\/325694.325702"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Al-Bataineh, O.I., Reynolds, M., French, T.: Finding minimum and maximum termination time of timed automata models with cyclic behaviour. CoRR, abs\/1610.09795 (2016)","DOI":"10.1016\/j.tcs.2016.12.020"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.tcs.2016.12.020","volume":"665","author":"OI Al-Bataineh","year":"2017","unstructured":"Al-Bataineh, O.I., Reynolds, M., French, T.: Finding minimum and maximum termination time of timed automata models with cyclic behaviour. Theor. Comput. Sci. 665, 87\u2013104 (2017)","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"2_CR5","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R Alur","year":"1994","unstructured":"Alur, R., Dill, D.L.: A theory of timed automata. Theor. Comput. Sci. 126(2), 183\u2013235 (1994)","journal-title":"Theor. Comput. Sci."},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Askarov, A., Sabelfeld, A.: Localized delimited release: combining the what and where dimensions of information release. In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, 14 June 2007, pp. 53\u201360 (2007)","DOI":"10.1145\/1255329.1255339"},{"issue":"1\u20132","key":"2_CR7","first-page":"1","volume":"51","author":"R Barbuti","year":"2002","unstructured":"Barbuti, R., De Francesco, N., Santone, A., Tesei, L.: A notion of non-interference for timed automata. Fundam. Inform. 51(1\u20132), 1\u201311 (2002)","journal-title":"Fundam. Inform."},{"issue":"2\u20133","key":"2_CR8","first-page":"137","volume":"54","author":"R Barbuti","year":"2003","unstructured":"Barbuti, R., Tesei, L.: A decidable notion of timed non-interference. Fundam. Inform. 54(2\u20133), 137\u2013150 (2003)","journal-title":"Fundam. Inform."},{"issue":"2","key":"2_CR9","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.entcs.2005.10.031","volume":"153","author":"G Barthe","year":"2006","unstructured":"Barthe, G., Rezk, T., Warnier, M.: Preventing timing leaks through transactional branching instructions. Electron Notes Theor. Comput. Sci. 153(2), 33\u201355 (2006)","journal-title":"Electron Notes Theor. Comput. Sci."},{"issue":"7","key":"2_CR10","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"DE Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504\u2013513 (1977)","journal-title":"Commun. ACM"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00376449","volume":"51","author":"M Franchella","year":"1997","unstructured":"Franchella, M.: On the origins of D\u00e9nes K\u00f6nig\u2019s infinity lemma. Arch. Hist. Exact Sci. 51, 3\u201327 (1997)","journal-title":"Arch. Hist. Exact Sci."},{"issue":"1","key":"2_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.entcs.2005.05.046","volume":"180","author":"G Gardey","year":"2007","unstructured":"Gardey, G., Mullins, J., Roux, O.H.: Non-interference control synthesis for security timed automata. Electron Notes Theor. Comput. Sci. 180(1), 35\u201353 (2007)","journal-title":"Electron Notes Theor. Comput. Sci."},{"key":"2_CR13","unstructured":"Grewe, S., Lux, A., Mantel, H., Sauer, J.: A formalization of declassification with what-and-where-security. Archive of Formal Proofs (2014)"},{"issue":"9\u201310","key":"2_CR14","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/s12243-017-0605-4","volume":"72","author":"BB Gupta","year":"2017","unstructured":"Gupta, B.B., Akhtar, T.: A survey on smart power grid: frameworks, tools, security issues, and solutions. Annales des T\u00e9l\u00e9communications 72(9\u201310), 517\u2013549 (2017)","journal-title":"Annales des T\u00e9l\u00e9communications"},{"issue":"2","key":"2_CR15","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/s10703-011-0133-1","volume":"40","author":"F Herbreteau","year":"2012","unstructured":"Herbreteau, F., Srivathsan, B., Walukiewicz, I.: Efficient emptiness check for timed b\u00fcchi automata. Form. Methods Syst. Des. 40(2), 122\u2013146 (2012)","journal-title":"Form. Methods Syst. Des."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Kashyap, V., Wiedermann, B., Hardekopf, B.: Timing- and termination-sensitive secure information flow: exploring a new approach. In: 32nd IEEE Symposium on Security and Privacy, S&P 2011, 22\u201325 May 2011, Berkeley, California, USA, pp. 413\u2013428 (2011)","DOI":"10.1109\/SP.2011.19"},{"issue":"5","key":"2_CR17","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1109\/TSE.2010.4","volume":"36","author":"R Lanotte","year":"2010","unstructured":"Lanotte, R., Maggiolo-Schettini, A., Troina, A.: Time and probability-based information flow analysis. IEEE Trans. Softw. Eng. 36(5), 719\u2013734 (2010)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"2_CR18","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/357062.357071","volume":"1","author":"T Lengauer","year":"1979","unstructured":"Lengauer, T., Tarjan, R.E.: A fast algorithm for finding dominators in a flowgraph. ACM Trans. Program. Lang. Syst. 1(1), 121\u2013141 (1979)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-31113-0_4","volume-title":"Mathematics of Program Construction","author":"A Lux","year":"2012","unstructured":"Lux, A., Mantel, H., Perner, M.: Scheduler-independent declassification. In: Gibbons, J., Nogueira, P. (eds.) MPC 2012. LNCS, vol. 7342, pp. 25\u201347. Springer, Heidelberg (2012)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-642-25318-8_18","volume-title":"Programming Languages and Systems","author":"J Magazinius","year":"2011","unstructured":"Magazinius, J., Askarov, A., Sabelfeld, A.: Decentralized delimited release. In: Yang, H. (ed.) APLAS 2011. LNCS, vol. 7078, pp. 220\u2013237. Springer, Heidelberg (2011)"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-30477-7_9","volume-title":"Programming Languages and Systems","author":"H Mantel","year":"2004","unstructured":"Mantel, H., Sands, D.: Controlled declassification based on intransitive noninterference. In: Chin, W.-N. (ed.) APLAS 2004. LNCS, vol. 3302, pp. 129\u2013145. Springer, Heidelberg (2004)"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/978-3-319-24174-6_23","volume-title":"Computer Security \u2013 ESORICS 2015","author":"H Mantel","year":"2015","unstructured":"Mantel, H., Starostin, A.: Transforming out timing leaks, more or less. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 447\u2013467. Springer, Cham (2015)"},{"issue":"2","key":"2_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00784ED1V01Y201706SPT021","volume":"9","author":"Bruce McMillin","year":"2017","unstructured":"McMillin, B.M., Roth, T.P.: Cyber-Physical Security and Privacy in the Electric Smart Grid. Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool Publishers, San Rafael (2017)","journal-title":"Synthesis Lectures on Information Security, Privacy, and Trust"},{"issue":"2","key":"2_CR24","doi-asserted-by":"publisher","first-page":"157","DOI":"10.3233\/JCS-2006-14203","volume":"14","author":"AC Myers","year":"2006","unstructured":"Myers, A.C., Sabelfeld, A., Zdancewic, S.: Enforcing robust declassification and qualified robustness. J. Comput. Secur. 14(2), 157\u2013196 (2006)","journal-title":"J. Comput. Secur."},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-63121-9_1","volume-title":"Models, Algorithms, Logics and Tools","author":"F Nielson","year":"2017","unstructured":"Nielson, F., Nielson, H.R., Vasilikos, P.: Information flow for timed automata. In: Aceto, L., Bacci, G., Bacci, G., Ing\u00f3lfsd\u00f3ttir, A., Legay, A., Mardare, R. (eds.) Models, Algorithms, Logics and Tools. LNCS, vol. 10460, pp. 3\u201321. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63121-9_1"},{"issue":"1","key":"2_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5\u201319 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"2_CR27","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1109\/COMST.2015.2425958","volume":"17","author":"I Baumgart","year":"2015","unstructured":"Baumgart, I., Finster, S.: Privacy-aware smart metering: a survey. IEEE Commun. Surv. Tutor. 17(2), 1088\u20131101 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"2_CR28","unstructured":"UPPAAL. http:\/\/www.uppaal.com\/index.php?sida=200&rubrik=95"},{"issue":"2\/3","key":"2_CR29","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"DM Volpano","year":"1996","unstructured":"Volpano, D.M., Smith, G., Irvine, C.E.: A sound type system for secure flow analysis. J. Comput. Secur. 4(2\/3), 167\u2013188 (1996)","journal-title":"J. Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Principles of Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-89722-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T14:38:45Z","timestamp":1660919925000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-89722-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319897219","9783319897226"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-89722-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}