{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:05:32Z","timestamp":1743084332829,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748342"},{"type":"electronic","value":"9783540748359"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74835-9_2","type":"book-chapter","created":{"date-parts":[[2007,9,7]],"date-time":"2007-09-07T10:03:08Z","timestamp":1189159388000},"page":"2-18","source":"Crossref","is-referenced-by-count":7,"title":["Security of Multithreaded Programs by Compilation"],"prefix":"10.1007","author":[{"given":"Gilles","family":"Barthe","sequence":"first","affiliation":[]},{"given":"Tamara","family":"Rezk","sequence":"additional","affiliation":[]},{"given":"Alejandro","family":"Russo","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","first-page":"40","volume-title":"Proc. ACM Symp. on Principles of Programming Languages","author":"J. Agat","year":"2000","unstructured":"Agat, J.: Transforming out timing leaks. In: Proc. ACM Symp. on Principles of Programming Languages, pp. 40\u201353. ACM Press, New York (2000)"},{"key":"2_CR2","unstructured":"Matos, A.A.: Typing secure information flow: declassification and mobility. PhD thesis, Ecole Nationale Sup\u00e9rieure des Mines de Paris (2006)"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"European Symposium on Programming","author":"G. Barthe","year":"2007","unstructured":"Barthe, G., Pichardie, D., Rezk, T.: A certified lightweight non-interference java bytecode verifier. In: Niccola, R.D. (ed.) European Symposium on Programming. LNCS, Springer, Heidelberg (2007)"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/1040294.1040304","volume-title":"Proceedings of TLDI 2005","author":"G. Barthe","year":"2005","unstructured":"Barthe, G., Rezk, T.: Non-interference for a JVM-like language. In: F\u00e4hndrich, M. (ed.) Proceedings of TLDI 2005, pp. 103\u2013112. ACM Press, New York (2005)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Barthe, G., Rezk, T., Basu, A.: Security types preserving compilation. Journal of Computer Languages, Systems and Structures (2007)","DOI":"10.1016\/j.cl.2005.05.002"},{"key":"2_CR6","first-page":"230","volume-title":"S&P 2006","author":"G. Barthe","year":"2006","unstructured":"Barthe, G., Rezk, T., Naumann, D.: Deriving an information flow checker and certifying compiler for java. In: S&P 2006. SP \u201906: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 230\u2013242. IEEE Computer Society, Los Alamitos (2006)"},{"key":"2_CR7","unstructured":"Barthe, G., Rezk, T., Russo, A., Sabelfeld, A.: Security of multithreaded programs by compilation. Technical report, Chalmers University of Technology (2007), located at \n                    \n                      http:\/\/www.cs.chalmers.se\/~russo\/esorics07full.pdf"},{"issue":"1","key":"2_CR8","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0304-3975(02)00010-5","volume":"281","author":"G. Boudol","year":"2002","unstructured":"Boudol, G., Castellani, I.: Noninterference for concurrent programs and thread systems. Theoretical Computer Science\u00a0281(1), 109\u2013130 (2002)","journal-title":"Theoretical Computer Science"},{"issue":"7","key":"2_CR9","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D.E. Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Comm. of the ACM"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1007\/978-3-540-30579-8_23","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"S. Genaim","year":"2005","unstructured":"Genaim, S., Spoto, F.: Information Flow Analysis for Java Bytecode. In: Cousot, R. (ed.) VMCAI 2005. LNCS, vol.\u00a03385, pp. 346\u2013362. Springer, Heidelberg (2005)"},{"key":"2_CR11","first-page":"11","volume-title":"Proc. IEEE Symp. on Security and Privacy","author":"J.A. Goguen","year":"1982","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proc. IEEE Symp. on Security and Privacy, pp. 11\u201320. IEEE Computer Society Press, Los Alamitos (April 1982)"},{"key":"2_CR12","volume-title":"Proc. IEEE Computer Security Foundations Workshop","author":"M. Huisman","year":"2006","unstructured":"Huisman, M., Worah, P., Sunesen, K.: A temporal logic characterisation of observational determinism. In: Proc. IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Los Alamitos (July 2006)"},{"key":"2_CR13","unstructured":"Knudsen, J.: Networking, user experience, and threads. Sun Technical Articles and Tips (2002), \n                    \n                      http:\/\/developers.sun.com\/techtopics\/mobility\/midp\/articles\/threading\/"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/11679219_5","volume-title":"Formal Aspects in Security and Trust","author":"B. K\u00f6pf","year":"2006","unstructured":"K\u00f6pf, B., Mantel, H.: Eliminating implicit information leaks by transformational typing and unification. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2005. LNCS, vol.\u00a03866, pp. 47\u201362. Springer, Heidelberg (2006)"},{"key":"2_CR15","unstructured":"Mahmoud, Q.H.: Preventing screen lockups of blocking operations. Sun Technical Articles and Tips (2004), \n                    \n                      http:\/\/developers.sun.com\/techtopics\/mobility\/midp\/ttips\/screenlock\/"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/11560586_29","volume-title":"Theoretical Computer Science","author":"R. Medel","year":"2005","unstructured":"Medel, R., Compagnoni, A., Bonelli, E.: A typed assembly language for non-interference. In: Coppo, M., Lodi, E., Pinna, G.M. (eds.) ICTCS 2005. LNCS, vol.\u00a03701, pp. 360\u2013374. Springer, Heidelberg (2005)"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","volume-title":"Asian Computing Science Conference (ASIAN 2006)","author":"A. Russo","year":"2007","unstructured":"Russo, A., Hughes, J., Naumann, D., Sabelfeld, A.: Closing internal timing channels by transformation. In: Asian Computing Science Conference (ASIAN 2006). LNCS, Springer, Heidelberg (2007)"},{"key":"2_CR18","first-page":"177","volume-title":"Proc. IEEE Computer Security Foundations Workshop","author":"A. Russo","year":"2006","unstructured":"Russo, A., Sabelfeld, A.: Securing interaction between threads and the scheduler. In: Proc. IEEE Computer Security Foundations Workshop, pp. 177\u2013189. IEEE Computer Society Press, Los Alamitos (July 2006)"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70881-0_43","volume-title":"Perspectives of Systems Informatics","author":"A. Russo","year":"2007","unstructured":"Russo, A., Sabelfeld, A.: Security for multithreaded programs under cooperative scheduling. In: Virbitskaite, I., Voronkov, A. (eds.) PSI 2006. LNCS, vol.\u00a04378, Springer, Heidelberg (2007)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/3-540-45575-2_22","volume-title":"Perspectives of System Informatics","author":"A. Sabelfeld","year":"2001","unstructured":"Sabelfeld, A.: The impact of synchronisation on secure information flow in concurrent programs. In: Bj\u00f8rner, D., Broy, M., Zamulin, A.V. (eds.) PSI 2001. LNCS, vol.\u00a02244, pp. 225\u2013239. Springer, Heidelberg (2001)"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-45789-5_27","volume-title":"Static Analysis","author":"A. Sabelfeld","year":"2002","unstructured":"Sabelfeld, A., Mantel, H.: Static confidentiality enforcement for distributed programs. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 376\u2013394. Springer, Heidelberg (2002)"},{"issue":"1","key":"2_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"2_CR23","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/CSFW.2000.856937","volume-title":"Proc. IEEE Computer Security Foundations Workshop","author":"A. Sabelfeld","year":"2000","unstructured":"Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: Proc. IEEE Computer Security Foundations Workshop, pp. 200\u2013214. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/CSFW.2001.930141","volume-title":"Proc. IEEE Computer Security Foundations Workshop","author":"G. Smith","year":"2001","unstructured":"Smith, G.: A new type system for secure information flow. In: Proc. IEEE Computer Security Foundations Workshop, pp. 115\u2013125. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"2_CR25","first-page":"3","volume-title":"Proc. IEEE Computer Security Foundations Workshop","author":"G. Smith","year":"2003","unstructured":"Smith, G.: Probabilistic noninterference through weak probabilistic bisimulation. In: Proc. IEEE Computer Security Foundations Workshop, pp. 3\u201313. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"2_CR26","first-page":"355","volume-title":"Proc. ACM Symp. on Principles of Programming Languages","author":"G. Smith","year":"1998","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proc. ACM Symp. on Principles of Programming Languages, pp. 355\u2013364. ACM Press, New York (1998)"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Tsai, T.C., Russo, A., Hughes, J.: A library for secure multi-threaded information flow in Haskell. In: Proc. of the 20th IEEE Computer Security Foundations Symposium, July 2007, IEEE Computer Society Press, Los Alamitos (to appear)","DOI":"10.1109\/CSF.2007.6"},{"issue":"2\u20133","key":"2_CR28","doi-asserted-by":"crossref","first-page":"231","DOI":"10.3233\/JCS-1999-72-305","volume":"7","author":"D. Volpano","year":"1999","unstructured":"Volpano, D., Smith, G.: Probabilistic noninterference in a concurrent language. J. Computer Security\u00a07(2\u20133), 231\u2013253 (1999)","journal-title":"J. Computer Security"},{"issue":"3","key":"2_CR29","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. Computer Security\u00a04(3), 167\u2013187 (1996)","journal-title":"J. Computer Security"},{"key":"2_CR30","first-page":"29","volume-title":"Proc. IEEE Computer Security Foundations Workshop","author":"S. Zdancewic","year":"2003","unstructured":"Zdancewic, S., Myers, A.C.: Observational determinism for concurrent program security. In: Proc. IEEE Computer Security Foundations Workshop, pp. 29\u201343. IEEE Computer Society Press, Los Alamitos (2003)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74835-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:10:01Z","timestamp":1559506201000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74835-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748342","9783540748359"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74835-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}