{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:16:32Z","timestamp":1725574592038},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540253884"},{"type":"electronic","value":"9783540319825"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31982-5_19","type":"book-chapter","created":{"date-parts":[[2011,1,14]],"date-time":"2011-01-14T02:29:02Z","timestamp":1294972142000},"page":"299-315","source":"Crossref","is-referenced-by-count":17,"title":["Bridging Language-Based and Process Calculi Security"],"prefix":"10.1007","author":[{"given":"Riccardo","family":"Focardi","sequence":"first","affiliation":[]},{"given":"Sabina","family":"Rossi","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/BFb0055109","volume-title":"Automata, Languages and Programming","author":"M. Abadi","year":"1998","unstructured":"Abadi, M.: Protection in programming-language translations. In: Larsen, K.G., Skyum, S., Winskel, G. (eds.) ICALP 1998. LNCS, vol.\u00a01443, pp. 868\u2013883. Springer, Heidelberg (1998)"},{"issue":"1","key":"19_CR2","first-page":"3","volume":"28","author":"D. Clark","year":"2002","unstructured":"Clark, D., Hankin, C., Hunt, S.: Information flow for Algol-like languages. Journal of Computer Languages\u00a028(1), 3\u201328 (2002)","journal-title":"Journal of Computer Languages"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Dam, M., Giambiagi, P.: Confidentiality for mobile code: The case of a simple payment protocol. In: Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 233\u2013244 (2000)","DOI":"10.1109\/CSFW.2000.856940"},{"issue":"7","key":"19_CR4","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D.E. Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Comm. of the ACM"},{"issue":"1","key":"19_CR5","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","volume":"3","author":"R. Focardi","year":"1995","unstructured":"Focardi, R., Gorrieri, R.: A Classification of Security Properties for Process Algebras. Journal of Computer Security\u00a03(1), 5\u201333 (1994\/1995)","journal-title":"Journal of Computer Security"},{"issue":"9","key":"19_CR6","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/32.629493","volume":"23","author":"R. Focardi","year":"1997","unstructured":"Focardi, R., Gorrieri, R.: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering\u00a023(9), 550\u2013571 (1997)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-45608-2_6","volume-title":"Foundations of Security Analysis and Design","author":"R. Focardi","year":"2001","unstructured":"Focardi, R., Gorrieri, R.: Classification of Security Properties (Part I: Information Flow). In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 331\u2013396. Springer, Heidelberg (2001)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Focardi, R., Gorrieri, R., Martinelli, F.: Information flow analysis in a discrete-time process algebra. In: Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 170\u2013184 (2000)","DOI":"10.1109\/CSFW.2000.856935"},{"key":"19_CR9","first-page":"307","volume-title":"Proc. of the IEEE Computer Security Foundations Workshop","author":"R. Focardi","year":"2002","unstructured":"Focardi, R., Rossi, S.: Information Flow Security in Dynamic Contexts. In: Proc. of the IEEE Computer Security Foundations Workshop, pp. 307\u2013319. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"19_CR10","unstructured":"Focardi, R., Rossi, S., Sabelfeld, A.: Bridging Language-Based and Process Calculi Security. Technical Report CS-2004-14, Dipartimento di Informatica, Universit\u00e0 Ca\u2019 Foscari di Venezia, Italy (2004), http:\/\/www.dsi.unive.it\/ricerca\/TR\/index.htm"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-36575-3_11","volume-title":"Programming Languages and Systems","author":"P. Giambiagi","year":"2003","unstructured":"Giambiagi, P., Dam, M.: On the secure implementation of security protocols. In: Degano, P. (ed.) ESOP 2003. LNCS, vol.\u00a02618, pp. 144\u2013158. Springer, Heidelberg (2003)"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proc. IEEE Symp. on Security and Privacy, April 1982, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"issue":"5","key":"19_CR13","first-page":"566","volume":"24","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Information flow vs. resource access in the asynchronous pi-calculus. resource access in the asynchronous pi-calculus\u00a024(5), 566\u2013591 (2002)","journal-title":"resource access in the asynchronous pi-calculus"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/3-540-46425-5_12","volume-title":"Programming Languages and Systems","author":"K. Honda","year":"2000","unstructured":"Honda, K., Vasconcelos, V., Yoshida, N.: Secure information flow as typed process behaviour. In: Smolka, G. (ed.) ESOP 2000. LNCS, vol.\u00a01782, pp. 180\u2013199. Springer, Heidelberg (2000)"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Honda, K., Yoshida, N.: A uniform type structure for secure information flow. In: Proc. ACM Symp. on Principles of Programming Languages, January 2002, pp. 81\u201392 (2002)","DOI":"10.1145\/503272.503281"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Honda, K., Yoshida, N.: Noninterference through flow analysis. Journal of Functional Programming (2005) (to appear)","DOI":"10.1017\/S0956796804005477"},{"issue":"1\u20133","key":"19_CR17","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/S0167-6423(99)00024-6","volume":"37","author":"R. Joshi","year":"2000","unstructured":"Joshi, R., Leino, K.R.M.: A semantic approach to secure information flow. Science of Computer Programming\u00a037(1\u20133), 113\u2013138 (2000)","journal-title":"Science of Computer Programming"},{"key":"19_CR18","unstructured":"Kobayashi, N.: Type-based information flow analysis for the pi-calculus. Technical Report TR03-0007, Tokyo Institute of Technology (October 2003)"},{"issue":"10","key":"19_CR19","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B.W. Lampson","year":"1973","unstructured":"Lampson, B.W.: A note on the confinement problem. Comm. of the ACM\u00a016(10), 613\u2013615 (1973)","journal-title":"Comm. of the ACM"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Mantel, H.: Possibilistic definitions of security \u2013 An assembly kit \u2013. In: Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 185\u2013199 (2000)","DOI":"10.1109\/CSFW.2000.856936"},{"issue":"4","key":"19_CR21","doi-asserted-by":"crossref","first-page":"615","DOI":"10.3233\/JCS-2003-11406","volume":"11","author":"H. Mantel","year":"2003","unstructured":"Mantel, H., Sabelfeld, A.: A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security\u00a011(4), 615\u2013676 (2003)","journal-title":"J. Computer Security"},{"key":"19_CR22","volume-title":"Communication and Concurrency","author":"R. Milner","year":"1989","unstructured":"Milner, R.: Communication and Concurrency. Prentice-Hall, Englewood Cliffs (1989)"},{"key":"19_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-24730-2_11","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"C. Piazza","year":"2004","unstructured":"Piazza, C., Pivato, E., Rossi, S.: CoPS - Checker of Persistent Security. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 144\u2013152. Springer, Heidelberg (2004)"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Pottier, F.: A simple view of type-secure information flow in the pi-calculus. In: Proc. IEEE Computer Security Foundations Workshop, June 2002, pp. 320\u2013330 (2002)","DOI":"10.1109\/CSFW.2002.1021826"},{"key":"19_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45608-2_1","volume-title":"Foundations of Security Analysis and Design","author":"P. Ryan","year":"2001","unstructured":"Ryan, P.: Mathematical models of computer security\u2014tutorial lectures. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 1\u201362. Springer, Heidelberg (2001)"},{"key":"19_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-45789-5_27","volume-title":"Static Analysis","author":"A. Sabelfeld","year":"2002","unstructured":"Sabelfeld, A., Mantel, H.: Static confidentiality enforcement for distributed programs. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 376\u2013394. Springer, Heidelberg (2002)"},{"issue":"1","key":"19_CR27","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 200\u2013214 (2000)","DOI":"10.1109\/CSFW.2000.856937"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proc. ACM Symp. on Principles of Programming Languages, January 1998, pp. 355\u2013364 (1998)","DOI":"10.1145\/268946.268975"},{"key":"19_CR30","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3054.001.0001","volume-title":"The Formal Semantics of Programming Languages: An Introduction","author":"G. Winskel","year":"1993","unstructured":"Winskel, G.: The Formal Semantics of Programming Languages: An Introduction. MIT Press, Cambridge (1993)"},{"key":"19_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-45931-6_29","volume-title":"Foundations of Software Science and Computation Structures","author":"N. Yoshida","year":"2002","unstructured":"Yoshida, N., Honda, K., Berger, M.: Linearity and bisimulation. In: Nielsen, M., Engberg, U. (eds.) FOSSACS 2002. LNCS, vol.\u00a02303, pp. 417\u2013433. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Software Science and Computational Structures"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31982-5_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:32:53Z","timestamp":1605742373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31982-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540253884","9783540319825"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31982-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}