{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:56:07Z","timestamp":1725512167845},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540713159"},{"type":"electronic","value":"9783540713227"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71322-7_15","type":"book-chapter","created":{"date-parts":[[2007,6,4]],"date-time":"2007-06-04T11:05:59Z","timestamp":1180955159000},"page":"311-327","source":"Crossref","is-referenced-by-count":5,"title":["Data Flow Analysis for CCS"],"prefix":"10.1007","author":[{"given":"Hanne Riis","family":"Nielson","sequence":"first","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","volume-title":"Compilers: Principles, Techniques, and Tools","author":"A.V. Aho","year":"2006","unstructured":"Aho, A.V., et al.: Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading (2006)"},{"key":"15_CR2","doi-asserted-by":"crossref","first-page":"347","DOI":"10.3233\/JCS-2005-13302","volume":"13","author":"C. Bodei","year":"2005","unstructured":"Bodei, C., et al.: Static validation of protocol narration. Journal of Computer Security\u00a013, 347\u2013390 (2005)","journal-title":"Journal of Computer Security"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1006\/inco.2000.3020","volume":"168","author":"C. Bodei","year":"2001","unstructured":"Bodei, C., et al.: Static analysis for the \u03c0-calculus with applications to security. Information and Computation\u00a0168, 68\u201392 (2001)","journal-title":"Information and Computation"},{"issue":"6","key":"15_CR4","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1016\/S0167-739X(02)00047-X","volume":"18","author":"C. Bodei","year":"2002","unstructured":"Bodei, C., et al.: Flow logic for Dolev-Yao secrecy in cryptographic processes. FGCS\u00a018(6), 747\u2013756 (2002)","journal-title":"FGCS"},{"key":"15_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for authentication and key establishment","author":"C. Boyd","year":"2003","unstructured":"Boyd, C., Mathuria, A.: Protocols for authentication and key establishment. Springer, Heidelberg (2003)"},{"key":"15_CR6","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10207-004-0036-x","volume":"2","author":"M. Buchholz","year":"2004","unstructured":"Buchholz, M., Riis Nielson, H., Nielson, F.: A calculus for control flow analysis of security protocols. International Journal of Information Security\u00a02, 145\u2013167 (2004)","journal-title":"International Journal of Information Security"},{"key":"15_CR7","first-page":"269","volume-title":"Symposium on Principles of Programming Languages","author":"P. Cousot","year":"1979","unstructured":"Cousot, P., Cousot, R.: Systematic design of program analysis frameworks. In: Symposium on Principles of Programming Languages, pp. 269\u2013282. ACM Press, New York (1979)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K. Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V.T., Kubo, M.: Language primitives and type discipline for structured communication-based programming. In: Hankin, C. (ed.) ESOP 1998 and ETAPS 1998. LNCS, vol.\u00a01381, pp. 122\u2013138. Springer, Heidelberg (1998)"},{"key":"15_CR9","volume-title":"Communicating and Mobile Systems: The pi-Calculus","author":"R. Milner","year":"1999","unstructured":"Milner, R.: Communicating and Mobile Systems: The pi-Calculus. Cambridge University Press, Cambridge (1999)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/978-3-540-24836-1_5","volume-title":"Practical Aspects of Declarative Languages","author":"M. Neubauer","year":"2004","unstructured":"Neubauer, M., Thiemann, P.: An implementation of session types. In: Jayaraman, B. (ed.) PADL 2004. LNCS, vol.\u00a03057, pp. 56\u201370. Springer, Heidelberg (2004)"},{"key":"15_CR11","volume-title":"Principles of Program Analysis","author":"F. Nielson","year":"2005","unstructured":"Nielson, F., Riis Nielson, H., Hankin, C.L.: Principles of Program Analysis (Second printing). Springer, Heidelberg (2005)"},{"issue":"2","key":"15_CR12","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/S0304-3975(01)00140-2","volume":"283","author":"F. Nielson","year":"2002","unstructured":"Nielson, F., Riis Nielson, H., Hansen, R.R.: Validating firewalls using flow logics. Theoretical Computer Science\u00a0283(2), 381\u2013418 (2002)","journal-title":"Theoretical Computer Science"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S1571-0661(04)00316-0","volume":"62","author":"F. Nielson","year":"2002","unstructured":"Nielson, F., Riis Nielson, H., Seidl, H.: Cryptographic analysis in cubic time. Electronic Notes of Theoretical Computer Science\u00a062, 7\u201323 (2002)","journal-title":"Electronic Notes of Theoretical Computer Science"},{"key":"15_CR14","first-page":"233","volume":"8","author":"H. Riis Nielson","year":"2001","unstructured":"Riis Nielson, H., Nielson, F.: Shape analysis for mobile ambients. Nordic Journal of Computing\u00a08, 233\u2013275 (2001)","journal-title":"Nordic Journal of Computing"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-3-540-24631-2_6","volume-title":"Foundations of Security Analysis and Design II","author":"H. Riis Nielson","year":"2004","unstructured":"Riis Nielson, H., Nielson, F., Buchholtz, M.: Security for Mobility. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2001. LNCS, vol.\u00a02946, pp. 207\u2013266. Springer, Heidelberg (2004)"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Static Analysis","author":"H. Riis Nielson","year":"2004","unstructured":"Riis Nielson, H., Nielson, F., Pilegaard, H.: Spatial analysis of BioAmbients. In: Giacobazzi, R. (ed.) SAS 2004. LNCS, vol.\u00a03148, Springer, Heidelberg (2004)"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11535294_8","volume-title":"Parallel Computing Technologies","author":"T.K. Tolstrup","year":"2005","unstructured":"Tolstrup, T.K., Nielson, F., Riis Nielson, H.: Information flow analysis for VHDL. In: Malyshkin, V.E. (ed.) PaCT 2005. LNCS, vol.\u00a03606, Springer, Heidelberg (2005)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1007\/978-3-540-28644-8_32","volume-title":"CONCUR 2004 - Concurrency Theory","author":"V.T. Vasconcelos","year":"2004","unstructured":"Vasconcelos, V.T., Ravara, A., Gay, S.J.: Session types for functional multithreading. In: Gardner, P., Yoshida, N. (eds.) CONCUR 2004. LNCS, vol.\u00a03170, pp. 497\u2013511. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Program Analysis and Compilation, Theory and Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71322-7_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:18:30Z","timestamp":1605745110000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71322-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540713159","9783540713227"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71322-7_15","relation":{},"subject":[]}}