{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:57:02Z","timestamp":1725512222397},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540708803"},{"type":"electronic","value":"9783540708810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-70881-0_43","type":"book-chapter","created":{"date-parts":[[2007,8,3]],"date-time":"2007-08-03T20:07:32Z","timestamp":1186171652000},"page":"474-480","source":"Crossref","is-referenced-by-count":15,"title":["Security for Multithreaded Programs Under Cooperative Scheduling"],"prefix":"10.1007","author":[{"given":"Alejandro","family":"Russo","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"43_CR1","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0304-3975(02)00010-5","volume":"281","author":"G. Boudol","year":"2002","unstructured":"Boudol, G., Castellani, I.: Non-interference for concurrent programs and thread systems. Theoretical Computer Science\u00a0281(1), 109\u2013130 (2002)","journal-title":"Theoretical Computer Science"},{"issue":"7","key":"43_CR2","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D.E. Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Comm. of the ACM"},{"key":"43_CR3","unstructured":"Engelschall, R.S.: Gnu pth - the gnu portable threads (Nov. 2005), http:\/\/www.gnu.org\/software\/pth\/"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proc. IEEE Symp. on Security and Privacy, Apr. 1982, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"43_CR5","unstructured":"Huisman, M., Worah, P., Sunesen, K.: A temporal logic characterisation of observational determinism. In: Proc. IEEE Computer Security Foundations Workshop (July 2006)"},{"key":"43_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-540-30477-7_9","volume-title":"Programming Languages and Systems","author":"H. Mantel","year":"2004","unstructured":"Mantel, H., Sands, D.: Controlled downgrading based on intransitive (non)interference. In: Chin, W.-N. (ed.) APLAS 2004. LNCS, vol.\u00a03302, pp. 129\u2013145. Springer, Heidelberg (2004)"},{"key":"43_CR7","unstructured":"Myers, A.C., et al.: Jif: Java information flow. Software release (July 2001\u20132006), http:\/\/www.cs.cornell.edu\/jif"},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Russo, A., Sabelfeld, A.: Securing interaction between threads and the scheduler. In: Proc. IEEE Computer Security Foundations Workshop, July 2006, pp. 177\u2013189 (2006)","DOI":"10.1109\/CSFW.2006.29"},{"key":"43_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/3-540-45575-2_22","volume-title":"Perspectives of System Informatics","author":"A. Sabelfeld","year":"2001","unstructured":"Sabelfeld, A.: The impact of synchronisation on secure information flow in concurrent programs. In: Bj\u00f8rner, D., Broy, M., Zamulin, A.V. (eds.) PSI 2001. LNCS, vol.\u00a02244, pp. 225\u2013239. Springer, Heidelberg (2001)"},{"key":"43_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/978-3-540-39866-0_27","volume-title":"Perspectives of System Informatics","author":"A. Sabelfeld","year":"2004","unstructured":"Sabelfeld, A.: Confidentiality for multithreaded programs via bisimulation. In: Broy, M., Zamulin, A.V. (eds.) PSI 2003. LNCS, vol.\u00a02890, pp. 260\u2013273. Springer, Heidelberg (2004)"},{"key":"43_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-45789-5_27","volume-title":"Static Analysis","author":"A. Sabelfeld","year":"2002","unstructured":"Sabelfeld, A., Mantel, H.: Static confidentiality enforcement for distributed programs. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 376\u2013394. Springer, Heidelberg (2002)"},{"issue":"1","key":"43_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 200\u2013214 (2000)","DOI":"10.1109\/CSFW.2000.856937"},{"key":"43_CR14","unstructured":"Simonet, V.: The Flow Caml system. Software release (July 2003), Located at http:\/\/cristal.inria.fr\/~simonet\/soft\/flowcaml\/"},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Smith, G.: A new type system for secure information flow. In: Proc. IEEE Computer Security Foundations Workshop, June 2001, pp. 115\u2013125 (2001)","DOI":"10.1109\/CSFW.2001.930141"},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Smith, G.: Probabilistic noninterference through weak probabilistic bisimulation. In: Proc. IEEE Computer Security Foundations Workshop, pp. 3\u201313 (2003)","DOI":"10.1109\/CSFW.2003.1212701"},{"key":"43_CR17","doi-asserted-by":"crossref","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proc. ACM Symp. on Principles of Programming Languages, Jan. 1998, pp. 355\u2013364 (1998)","DOI":"10.1145\/268946.268975"},{"issue":"2\u20133","key":"43_CR18","doi-asserted-by":"crossref","first-page":"231","DOI":"10.3233\/JCS-1999-72-305","volume":"7","author":"D. Volpano","year":"1999","unstructured":"Volpano, D., Smith, G.: Probabilistic noninterference in a concurrent language. J. Computer Security\u00a07(2\u20133), 231\u2013253 (1999)","journal-title":"J. Computer Security"},{"issue":"3","key":"43_CR19","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. Computer Security\u00a04(3), 167\u2013187 (1996)","journal-title":"J. Computer Security"},{"key":"43_CR20","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3054.001.0001","volume-title":"The Formal Semantics of Programming Languages: An Introduction","author":"G. Winskel","year":"1993","unstructured":"Winskel, G.: The Formal Semantics of Programming Languages: An Introduction. MIT Press, Cambridge (1993)"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Zdancewic, S., Myers, A.C.: Observational determinism for concurrent program security. In: Proc. IEEE Computer Security Foundations Workshop, June 2003, pp. 29\u201343 (2003)","DOI":"10.1109\/CSFW.2003.1212703"}],"container-title":["Lecture Notes in Computer Science","Perspectives of Systems Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70881-0_43.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:11:06Z","timestamp":1605762666000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70881-0_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540708803","9783540708810"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70881-0_43","relation":{},"subject":[]}}