{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:32:43Z","timestamp":1743057163108,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748342"},{"type":"electronic","value":"9783540748359"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74835-9_18","type":"book-chapter","created":{"date-parts":[[2007,9,7]],"date-time":"2007-09-07T10:03:08Z","timestamp":1189159388000},"page":"267-282","source":"Crossref","is-referenced-by-count":5,"title":["Dynamic Information Flow Control Architecture for Web Applications"],"prefix":"10.1007","author":[{"given":"Sachiko","family":"Yoshihama","sequence":"first","affiliation":[]},{"given":"Takeo","family":"Yoshizawa","sequence":"additional","affiliation":[]},{"given":"Yuji","family":"Watanabe","sequence":"additional","affiliation":[]},{"given":"Michiharu","family":"Kudoh","sequence":"additional","affiliation":[]},{"given":"Kazuko","family":"Oyanagi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Myers, A.C.: Language-Based Information Flow Security. IEEE Journal on Selected Areas in Communications\u00a021(1) (2003)","DOI":"10.1109\/JSAC.2002.806121"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Computer Systems Architecture","author":"V. Haldar","year":"2005","unstructured":"Haldar, V., Chandra, D., Franz, M.: Dynamic Taint Propagation for Java. In: Srikanthan, T., Xue, J., Chang, C.-H. (eds.) ACSAC 2005. LNCS, vol.\u00a03740, Springer, Heidelberg (2005)"},{"key":"18_CR3","unstructured":"Haldar, V., Chandra, D., Franz, M.: Practical, Dynamic Information Flow for Virtual Machines. In: PLID (2005)"},{"key":"18_CR4","unstructured":"Franz, M.: Moving Trust Out of Application Programs: A Software Architecture Based on Multi-Level Security Virtual Machines (TR. 06-10), UC Irvine (2006)"},{"key":"18_CR5","volume-title":"IEEE Sympo. on S&P","author":"U. Erlingsson","year":"2000","unstructured":"Erlingsson, U., Schneider, F.B.: IRM Enforcement of Java Stack Inspection. In: IEEE Sympo. on S&P, IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"18_CR6","unstructured":"Application Privacy Monitoring for JDBC (APM4JDBC): IBM AlphaWorks"},{"key":"18_CR7","unstructured":"Biba, K.: Integrity Considerations for Secure Computer Systems (MTR-3153). Technical report, MITRE (1975)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure Computer System: Unified Exposition and Multics Interpretation (MTR-2997 Rev. 1). Technical report, MITRE (1976)","DOI":"10.21236\/ADA023588"},{"issue":"5","key":"18_CR9","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: The lattice model of secure information flow. Communications of the ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Communications of the ACM"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: Practical Mostly-Static Information Flow Control. In: POPL (1999)","DOI":"10.1145\/292540.292561"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Beres, Y., Dalton, C.: Dynamic Label Binding at Run-time. In: New Security Paradigms Workshop (NSPW) (2003)","DOI":"10.1145\/986655.986662"},{"key":"18_CR12","volume-title":"The Java Virtual Machine Specification","author":"T. Lindholm","year":"1999","unstructured":"Lindholm, T., Yellin, F.: The Java Virtual Machine Specification. Addison-Wesley, Reading (1999)"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Li, P., Zdancewic, S.: Downgrading policies and relaxed noninterference. In: POPL\u201905. Symposium on Principles of Programming Languages (2005)","DOI":"10.1145\/1040305.1040319"},{"key":"18_CR14","unstructured":"Apache Byte Code Engineering Library (BCEL), \n                      \n                        http:\/\/jakarta.apache.org\/bcel\/"},{"key":"18_CR15","unstructured":"Kobayashi, N., Shirane, K.: Type-based Information Flow Analysis for Low-Level Languages. In: APLAS 2002 (2002)"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"G. Barthe","year":"2004","unstructured":"Barthe, G., Basu, A., Rezk, T.: Security Types Preserving Compilation. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol.\u00a02937, Springer, Heidelberg (2004)"},{"key":"18_CR17","volume-title":"IEEE Sympo. on S&P","author":"G. Barthe","year":"2006","unstructured":"Barthe, G., Naumann, D.A., Rezk, T.: Deriving an Information Flow Checker and Certifying Compiler for Java. In: IEEE Sympo. on S&P, IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"18_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"S. Genaim","year":"2005","unstructured":"Genaim, S., Spoto, F.: Information Flow Analysis for Java Bytecode. In: Cousot, R. (ed.) VMCAI 2005. LNCS, vol.\u00a03385, Springer, Heidelberg (2005)"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Zdancewic, S., et al.: Untrusted Hosts and Confidentiality: Secure Program Partitioning. In: SOSP. Symposium on Operating Systems Principles (2001)","DOI":"10.1145\/502034.502036"},{"key":"18_CR20","volume-title":"IEEE Sympo. on S&P","author":"L. Zheng","year":"2003","unstructured":"Zheng, L., Chong, S., Myers, A.C., Zdancewic, S.: Using replication and partitioning to build secure distributed systems. In: IEEE Sympo. on S&P, IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11859802_31","volume-title":"Advances in Computer Systems Architecture","author":"B. Hicks","year":"2006","unstructured":"Hicks, B., et al.: From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, vol.\u00a04186, Springer, Heidelberg (2006)"},{"key":"18_CR22","unstructured":"Li, P., Zdancewic, S.: Practical Information-flow Control in Web-based Information Systems. In: CSFW (2005)"},{"key":"18_CR23","unstructured":"Myers, A.C., Sabelfeld, A.: Enforcing Robust Declassification. In: CSFW (2004)"},{"key":"18_CR24","unstructured":"Gong, L., et al.: Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2, USITS (1997)"},{"key":"18_CR25","unstructured":"Guernic, G.L., et al.: Automata-based Confidentiality Monitoring. In: ASIAN\u201906. Annual Asian Computing Science Conference (2006)"},{"key":"18_CR26","volume-title":"IEEE Computer Security Foundations Symposium","author":"P. Shroff","year":"2007","unstructured":"Shroff, P., Smith, S.F., Thober, M.: Dynamic Dependency Monitoring to Secure Information Flow. In: IEEE Computer Security Foundations Symposium, IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Barthe, G., Rezk, T.: Non-interference for a JVM-like language. In: TLDI (2005)","DOI":"10.1145\/1040294.1040304"},{"key":"18_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11693024_12","volume-title":"Programming Languages and Systems","author":"D. Yu","year":"2006","unstructured":"Yu, D., Islam, N.: A Typed Assembly Language for Confidentiality. In: Sestoft, P. (ed.) ESOP 2006 and ETAPS 2006. LNCS, vol.\u00a03924, Springer, Heidelberg (2006)"},{"key":"18_CR29","volume-title":"Cryptography and Data Security","author":"D.E. Denning","year":"1982","unstructured":"Denning, D.E.: Cryptography and Data Security. Addison-Wesley, Reading (1982)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74835-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:11:30Z","timestamp":1559506290000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74835-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748342","9783540748359"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74835-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}