{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:19:14Z","timestamp":1775053154286,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540208136","type":"print"},{"value":"9783540398660","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39866-0_27","type":"book-chapter","created":{"date-parts":[[2010,10,25]],"date-time":"2010-10-25T16:30:09Z","timestamp":1288024209000},"page":"260-273","source":"Crossref","is-referenced-by-count":12,"title":["Confidentiality for Multithreaded Programs via Bisimulation"],"prefix":"10.1007","author":[{"given":"Andrei","family":"Sabelfeld","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Agat, J.: Transforming out timing leaks. In: Proc. ACM Symp. on Principles of Programming Languages, January 2000, pp. 40\u201353 (2000)","DOI":"10.1145\/325694.325702"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/3-540-44685-0_11","volume-title":"CONCUR 2001 - Concurrency Theory","author":"A. Aldini","year":"2001","unstructured":"Aldini, A.: Probabilistic information flow in a process algebra. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol.\u00a02154, pp. 152\u2013168. Springer, Heidelberg (2001)"},{"key":"27_CR3","unstructured":"Aldini, A., Bravetti, M., Gorrieri, R.: A process algebraic approach for the analysis of probabilistic non-interference. Technical Report UBLCS-2002-02, University of Bologna, Bologna, Italy (2002)"},{"key":"27_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/3-540-48224-5_32","volume-title":"Automata, Languages and Programming","author":"G. Boudol","year":"2001","unstructured":"Boudol, G., Castellani, I.: Noninterference for concurrent programs. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol.\u00a02076, pp. 382\u2013395. Springer, Heidelberg (2001)"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","first-page":"302","volume-title":"Computer Aided Verification","author":"K. Cerans","year":"1992","unstructured":"Cerans, K.: Decidability of bisimulation equivalences for parallel timer processes. In: Probst, D.K., von Bochmann, G. (eds.) CAV 1992. LNCS, vol.\u00a0663, pp. 302\u2013315. Springer, Heidelberg (1992)"},{"issue":"7","key":"27_CR6","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D.E. Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Comm. of the ACM"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Felten, E.W., Schneider, M.A.: Timing attacks on web privacy. In: ACM Conference on Computer and Communications Security, pp. 25\u201332 (2000)","DOI":"10.1145\/352600.352606"},{"issue":"1","key":"27_CR8","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","volume":"3","author":"R. Focardi","year":"1995","unstructured":"Focardi, R., Gorrieri, R.: A classification of security properties for process algebras. J. Computer Security\u00a03(1), 5\u201333 (1995)","journal-title":"J. Computer Security"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Focardi, R., Gorrieri, R., Martinelli, F.: Information flow analysis in a discretetime process algebra. In: Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 170\u2013184 (2000)","DOI":"10.1109\/CSFW.2000.856935"},{"issue":"1","key":"27_CR10","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/JSAC.2002.806122","volume":"21","author":"R. Focardi","year":"2003","unstructured":"Focardi, R., Gorrieri, R., Martinelli, F.: Real-time information flow analysis. IEEE J. Selected Areas in Communications\u00a021(1), 20\u201335 (2003)","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"27_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-36575-3_11","volume-title":"Programming Languages and Systems","author":"P. Giambiagi","year":"2003","unstructured":"Giambiagi, P., Dam, M.: On the secure implementation of security protocols. In: Degano, P. (ed.) ESOP 2003. LNCS, vol.\u00a02618, pp. 144\u2013158. Springer, Heidelberg (2003)"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proc. IEEE Symp. on Security and Privacy, April 1982, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Gray III., J.W.: Probabilistic interference. In: Proc. IEEE Symp. on Security and Privacy, May 1990, pp. 170\u2013179 (1990)","DOI":"10.1109\/RISP.1990.63848"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Honda, K., Yoshida, N.: A uniform type structure for secure information flow. In: Proc. ACM Symp. on Principles of Programming Languages, January 2002, pp. 81\u201392 (2002)","DOI":"10.1145\/503272.503281"},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/3-540-44618-4_29","volume-title":"CONCUR 2000 - Concurrency Theory","author":"J. J\u00fcrjens","year":"2000","unstructured":"J\u00fcrjens, J.: Secure information flow for concurrent processes. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol.\u00a01877, pp. 395\u2013409. Springer, Heidelberg (2000)"},{"key":"27_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"27_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/3-540-48340-3_26","volume-title":"Mathematical Foundations of Computer Science 1999","author":"D. Kozen","year":"1999","unstructured":"Kozen, D.: Language-based security. In: Kuty\u0142owski, M., Wierzbicki, T., Pacholski, L. (eds.) MFCS 1999. LNCS, vol.\u00a01672, pp. 284\u2013298. Springer, Heidelberg (1999)"},{"issue":"1","key":"27_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(91)90030-6","volume":"94","author":"K.G. Larsen","year":"1991","unstructured":"Larsen, K.G., Skou, A.: Bisimulation through probabilistic testing. Information and Computation\u00a094(1), 1\u201328 (1991)","journal-title":"Information and Computation"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Mantel, H.: On the composition of secure systems. In: Proc. IEEE Symp. on Security and Privacy, May 2002, pp. 81\u201394 (2002)","DOI":"10.1109\/SECPRI.2002.1004364"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Mantel, H., Sabelfeld, A.: A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security (2003) (to appear)","DOI":"10.3233\/JCS-2003-11406"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"McCullough, D.: Specifications for multi-level security and hook-up property. In: Proc. IEEE Symp. on Security and Privacy, April 1987, pp. 161\u2013166 (1987)","DOI":"10.1109\/SP.1987.10009"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"McLean, J.: Security models and information flow. In: Proc. IEEE Symp. on Security and Privacy, May 1990, pp. 180\u2013187 (1990)","DOI":"10.21236\/ADA462529"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"McLean, J.: A general theory of composition for trace sets closed under selective interleaving functions. In: Proc. IEEE Symp. on Security and Privacy, May 1994, pp. 79\u201393 (1994)","DOI":"10.1109\/RISP.1994.296590"},{"key":"27_CR24","unstructured":"Ryan, P., Schneider, S.: Composing and decomposing systems under security properties. In: Proc. IEEE Computer Security Foundations Workshop, March 1995, pp. 9\u201315 (1995)"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Ryan, P., Schneider, S.: Process algebra and non-interference. In: Proc. IEEE Computer Security Foundations Workshop, June 1999, pp. 214\u2013227 (1999)","DOI":"10.1109\/CSFW.1999.779775"},{"key":"27_CR26","series-title":"Lecture Notes in Computer Science","first-page":"227","volume-title":"Perspectives of System Informatics","author":"A. Sabelfeld","year":"2001","unstructured":"Sabelfeld, A.: The impact of synchronisation on secure information flow in concurrent programs. In: Bj\u00f8rner, D., Broy, M., Zamulin, A.V. (eds.) PSI 2001. LNCS, vol.\u00a02244, pp. 227\u2013241. Springer, Heidelberg (2001)"},{"key":"27_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-45789-5_27","volume-title":"Static Analysis","author":"A. Sabelfeld","year":"2002","unstructured":"Sabelfeld, A., Mantel, H.: Static confidentiality enforcement for distributed programs. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 376\u2013394. Springer, Heidelberg (2002)"},{"issue":"1","key":"27_CR28","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"27_CR29","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 200\u2013214 (2000)","DOI":"10.1109\/CSFW.2000.856937"},{"issue":"1","key":"27_CR30","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1023\/A:1011553200337","volume":"14","author":"A. Sabelfeld","year":"2001","unstructured":"Sabelfeld, A., Sands, D.: A per model of secure information flow in sequential programs. Higher Order and Symbolic Computation\u00a014(1), 59\u201391 (2001)","journal-title":"Higher Order and Symbolic Computation"},{"key":"27_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/3-540-44577-3_6","volume-title":"Informatics","author":"F.B. Schneider","year":"2001","unstructured":"Schneider, F.B., Morrisett, G., Harper, R.: A language-based approach to security. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol.\u00a02000, pp. 86\u2013101. Springer, Heidelberg (2001)"},{"key":"27_CR32","unstructured":"Schneider, S.: May testing, non-interference, and compositionality. Technical Report CSD-TR-00-02, Royal Holloway, University of London (January 2001)"},{"key":"27_CR33","doi-asserted-by":"crossref","unstructured":"Smith, G.: A new type system for secure information flow. In: Proc. IEEE Computer Security Foundations Workshop, June 2001, pp. 115\u2013125 (2001)","DOI":"10.1109\/CSFW.2001.930141"},{"key":"27_CR34","doi-asserted-by":"crossref","unstructured":"Volpano, D., Smith, G.: Verifying secrets and relative secrecy. In: Proc. ACM Symp. on Principles of Programming Languages, January 2000, pp. 268\u2013276 (2000)","DOI":"10.1145\/325694.325729"},{"issue":"3","key":"27_CR35","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. Computer Security\u00a04(3), 167\u2013187 (1996)","journal-title":"J. Computer Security"},{"key":"27_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1007\/BFb0039080","volume-title":"CONCUR \u201990","author":"Y. Wang","year":"1990","unstructured":"Wang, Y.: Real-time behaviour of asynchronous agents. In: Baeten, J.C.M., Klop, J.W. (eds.) CONCUR 1990. LNCS, vol.\u00a0458, pp. 502\u2013520. Springer, Heidelberg (1990)"}],"container-title":["Lecture Notes in Computer Science","Perspectives of System Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39866-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T21:22:36Z","timestamp":1559769756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39866-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208136","9783540398660"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39866-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}