{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:34:42Z","timestamp":1725564882526},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540222361"},{"type":"electronic","value":"9783540277934"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27793-4_1","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T22:49:31Z","timestamp":1283726971000},"page":"1-16","source":"Crossref","is-referenced-by-count":6,"title":["Positive Non-interference in Elementary and Trace Nets"],"prefix":"10.1007","author":[{"given":"Nadia","family":"Busi","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Gorrieri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1007\/BF01186645","volume":"32","author":"E. Badouel","year":"1995","unstructured":"Badouel, E., Darondeau, P.: Trace nets and process automata. Acta Informatica\u00a032, 647\u2013679 (1995)","journal-title":"Acta Informatica"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/3-540-65306-6_22","volume-title":"Lectures on Petri Nets I: Basic Models","author":"E. Badouel","year":"1998","unstructured":"Badouel, E., Darondeau, P.: Theory of regions. In: Reisig, W., Rozenberg, G. (eds.) APN 1998. LNCS, vol.\u00a01491, pp. 529\u2013586. Springer, Heidelberg (1998)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Bossi, A., Focardi, R., Macedonio, D., Piazza, C., Rossi, S.: Unwinding in Information Flow Security. ENTCS (to appear)","DOI":"10.1016\/j.entcs.2004.02.006"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Busi, N., Gorrieri, R.: Structural Non-Interference with Petri Nets. In: Workshop on Issues in the Theory of Security (WITS 2004) (2004)","DOI":"10.1007\/978-3-540-27755-2_8"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-540-27755-2_8","volume-title":"Lectures on Concurrency and Petri Nets","author":"N. Busi","year":"2003","unstructured":"Busi, N., Gorrieri, R.: A Survey on Non-Interference with Petri Nets. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) Lectures on Concurrency and Petri Nets. LNCS, vol.\u00a03098, pp. 328\u2013344. Springer, Heidelberg (2003) (to appear)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","volume-title":"Elementary Net Systems Lectures on Petri Nets I: Basic Models","author":"J. Engelfriet","year":"1998","unstructured":"Engelfriet, J., Rozenberg, G.: APN 1998. LNCS, vol.\u00a01491. Springer, Heidelberg (1998)"},{"issue":"1","key":"1_CR7","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","volume":"3","author":"R. Focardi","year":"1995","unstructured":"Focardi, R., Gorrieri, R.: A Classification of Security Properties. Journal of Computer Security\u00a03(1), 5\u201333 (1995)","journal-title":"Journal of Computer Security"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-45608-2_6","volume-title":"Foundations of Security Analysis and Design","author":"R. Focardi","year":"2001","unstructured":"Focardi, R., Gorrieri, R.: Classification of Security Properties (Part I: Information Flow). In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 331\u2013396. Springer, Heidelberg (2001)"},{"key":"1_CR9","first-page":"11","volume-title":"Proc. of Symposium on Security and Privacy","author":"J.A. Goguen","year":"1982","unstructured":"Goguen, J.A., Meseguer, J.: Security Policy and Security Models. In: Proc. of Symposium on Security and Privacy, pp. 11\u201320. IEEE CS Press, Los Alamitos (1982)"},{"key":"1_CR10","unstructured":"Petri, C.A.: Kommunikation mit Automaten, PhD Thesis, Institut f\u00fcr Instrumentelle Mathematik, Bonn, Germany (1962)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Petri Nets 1985","author":"W. Reisig","year":"1985","unstructured":"Reisig, W.: Petri Nets: An Introduction. In: Rozenberg, G. (ed.) APN 1985. LNCS, vol.\u00a0222. Springer, Heidelberg (1985)"},{"key":"1_CR12","first-page":"114","volume-title":"Proc. of IEEE Symposium on Security and Privacy","author":"A.W. Roscoe","year":"1995","unstructured":"Roscoe, A.W.: CSP and Determinism in Security Modelling. In: Proc. of IEEE Symposium on Security and Privacy, pp. 114\u2013127. IEEE CS Press, Los Alamitos (1995)"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45608-2_1","volume-title":"Foundations of Security Analysis and Design","author":"P.Y.A. Ryan","year":"2001","unstructured":"Ryan, P.Y.A.: Mathematical Models of Computer Security. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 1\u201362. Springer, Heidelberg (2001)"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1109\/CSFW.1999.779775","volume-title":"Proc. of 12th Computer Security Foundations Workshop","author":"P.Y.A. Ryan","year":"1999","unstructured":"Ryan, P.Y.A., Schneider, S.: Process Algebra and Noninterference. In: Proc. of 12th Computer Security Foundations Workshop, pp. 214\u2013227. IEEE CS Press, Los Alamitos (1999)"}],"container-title":["Lecture Notes in Computer Science","Applications and Theory of Petri Nets 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27793-4_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:20:29Z","timestamp":1605759629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27793-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540222361","9783540277934"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27793-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}