{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:09Z","timestamp":1725491829320},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540752264"},{"type":"electronic","value":"9783540752271"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75227-1_10","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T01:32:47Z","timestamp":1189647167000},"page":"143-157","source":"Crossref","is-referenced-by-count":6,"title":["Maintaining Information Flow Security Under Refinement and Transformation"],"prefix":"10.1007","author":[{"given":"Fredrik","family":"Seehusen","sequence":"first","affiliation":[]},{"given":"Ketil","family":"St\u00f8len","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","first-page":"44","volume-title":"SEFM 2003","author":"A. Bossi","year":"2003","unstructured":"Bossi, A., Focardi, R., Piazza, C., Rossi, S.: Refinement operators and information flow security. In: SEFM 2003. 1st International Conference on Software Engineering and Formal Methods, pp. 44\u201353. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"10_CR2","volume-title":"FOCUS on streams, interface, and refinement","author":"M. Broy","year":"2001","unstructured":"Broy, M., St\u00f8len, K.: Specification and development of interactive systems. In: FOCUS on streams, interface, and refinement, Springer, Heidelberg (2001)"},{"key":"10_CR3","volume-title":"Cambridge tracts on theoretical computer science","author":"W.-P. Roever de","year":"1998","unstructured":"de Roever, W.-P., Engelhardt, K.: Data Refinement: Model-Oriented Proof Methods and their Comparison. In: Cambridge tracts on theoretical computer science, vol.\u00a047, Cambridge University Press, Cambridge (1998)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-45608-2_6","volume-title":"Foundations of Security Analysis and Design","author":"R. Focardi","year":"2001","unstructured":"Focardi, R., Gorrieri, R.: Classification of security properties (part i: Information flow). In: Focardi, R., Gorrieri, R. (eds.) Foundations of Security Analysis and Design. LNCS, vol.\u00a02171, pp. 331\u2013396. Springer, Heidelberg (2001)"},{"key":"10_CR5","first-page":"11","volume-title":"IEEE Symposium on Security and Privacy","author":"J.A. Goguen","year":"1982","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and Privacy, pp. 11\u201320. IEEE Computer Socity Press, Los Alamitos (1982)"},{"key":"10_CR6","first-page":"35","volume-title":"On the refinement of non-interference","author":"J. Graham-Cumming","year":"1991","unstructured":"Graham-Cumming, J., Sanders, J.W.: On the refinement of non-interference. In: Proceedings of the IEEE Computer Security Foundations Workshop, pp. 35\u201342. IEEE Computer Society Press, Los Alamitos (1991)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Haugen, \u00d8., Husa, K.E., Runde, R.K., St\u00f8len, K.: Why timed sequence diagrams require three-event semantics. Research Report 309, Department of Informatics, University of Oslo (2004)","DOI":"10.1007\/11495628_1"},{"issue":"4","key":"10_CR8","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/s10270-005-0087-0","volume":"4","author":"\u00d8. Haugen","year":"2005","unstructured":"Haugen, \u00d8., Husa, K.E., Runde, R.K., St\u00f8len, K.: STAIRS towards formal design with sequence diagrams. Journal of Software and Systems Modeling 4(4), 355\u2013367 (2005)","journal-title":"Journal of Software and Systems Modeling"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Haugen, \u00d8., St\u00f8len, K.: STAIRS\u2013 steps to analyse interactions with refinement semantics. In: Stevens, P., Whittle, J., Booch, G. (eds.) UML 2003 - The Unified Modeling Language. Modeling Languages and Applications. LNCS, vol.\u00a02863, pp. 388\u2013402. Springer, Heidelberg (2003)","DOI":"10.1007\/978-3-540-45221-8_33"},{"key":"10_CR10","first-page":"295","volume-title":"CSFW-14 2001","author":"M. Heisel","year":"2001","unstructured":"Heisel, M., Pfitzmann, A., Santen, T.: Confidentiality-preserving refinement. In: CSFW-14 2001. 14th IEEE Computer Security Foundations Workshop, pp. 295\u2013306. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"10_CR11","series-title":"Series in computer science","volume-title":"Communicating Sequential Processes","author":"C.A.R. Hoare","year":"1985","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Series in computer science. Prentice-Hall, Englewood Cliffs (1985)"},{"issue":"2","key":"10_CR12","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/0020-0190(87)90224-9","volume":"25","author":"C.A.R. Hoare","year":"1987","unstructured":"Hoare, C.A.R., He, J., Sanders, J.W.: Prespecification in data refinement. Information Processing Letters\u00a025(2), 71\u201376 (1987)","journal-title":"Information Processing Letters"},{"key":"10_CR13","first-page":"242","volume-title":"On the derivation of secure components","author":"J. Jacob","year":"1989","unstructured":"Jacob, J.: On the derivation of secure components. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 242\u2013247. IEEE Computer Society Press, Los Alamitos (1989)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/3-540-45251-6_8","volume-title":"FME 2001: Formal Methods for Increasing Software Productivity","author":"J. J\u00fcrjens","year":"2001","unstructured":"J\u00fcrjens, J.: Secrecy-preserving refinement. In: Oliveira, J.N., Zave, P. (eds.) FME 2001. LNCS, vol.\u00a02021, pp. 135\u2013152. Springer, Heidelberg (2001)"},{"key":"10_CR15","volume-title":"Secure systems development with UML","author":"J. J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure systems development with UML. Springer, Heidelberg (2005)"},{"key":"10_CR16","first-page":"185","volume-title":"CSFW 2000","author":"H. Mantel","year":"2000","unstructured":"Mantel, H.: Possibilistic definitions of security - an assembly kit. In: CSFW 2000. IEEE Compuer Security Foundations Workshop, pp. 185\u2013199. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"10_CR17","first-page":"78","volume-title":"Preserving information flow properties under refinement","author":"H. Mantel","year":"2001","unstructured":"Mantel, H.: Preserving information flow properties under refinement. In: IEEE Symposium on Security and Privacy, pp. 78\u201391. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"10_CR18","unstructured":"Object Management Group.: Architecture\u00a0Board ORMSC. Model Driven Architecture (MDA). Document number ormsc\/2001-07-01 (2001)"},{"key":"10_CR19","first-page":"114","volume-title":"CSP and determinism in security modelling","author":"A. Roscoe","year":"1995","unstructured":"Roscoe, A.: CSP and determinism in security modelling. In: IEEE Symposium on Security and Privacy, pp. 114\u2013127. IEEE Computer Society Press, Los Alamitos (1995)"},{"issue":"2","key":"10_CR20","first-page":"157","volume":"12","author":"R.K. Runde","year":"2005","unstructured":"Runde, R.K., Haugen, \u00d8., St\u00f8len, K.: Refining uml interactions with underspecification and nondeterminism. Nordic Journal of Computing\u00a012(2), 157\u2013188 (2005)","journal-title":"Nordic Journal of Computing"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1145\/1133058.1133080","volume-title":"SACMAT 2006","author":"F. Seehusen","year":"2006","unstructured":"Seehusen, F., St\u00f8len, K.: Information flow property preserving transformation of UML interaction diagrams. In: SACMAT 2006. 11th ACM Symposium on Access Control Models and Technologies, pp. 150\u2013159. ACM Press, New York (2006)"},{"key":"10_CR22","unstructured":"Seehusen, F., St\u00f8len, K.: Maintaining information flow security under refinement and transformation. Technical report SINTEF A311, SINTEF ICT (2006)"},{"issue":"4\/5","key":"10_CR23","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s002360000041","volume":"37","author":"R.J. Glabbeek van","year":"2001","unstructured":"van Glabbeek, R.J., Goltz, U.: Refinement of actions and equivalence notions for concurrent systems. Acta Informatica\u00a037(4\/5), 229\u2013327 (2001)","journal-title":"Acta Informatica"},{"key":"10_CR24","first-page":"94","volume-title":"A general theory of security properties","author":"A. Zakinthinos","year":"1997","unstructured":"Zakinthinos, A., Lee, E.S.: A general theory of security properties. In: Proc. of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 94\u2013102. IEEE Computer Society Press, Los Alamitos (1997)"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects in Security and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75227-1_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:56:32Z","timestamp":1619520992000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75227-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540752264","9783540752271"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75227-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}