{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:06:53Z","timestamp":1725502013332},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775041"},{"type":"electronic","value":"9783540775058"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77505-8_10","type":"book-chapter","created":{"date-parts":[[2008,1,24]],"date-time":"2008-01-24T12:56:35Z","timestamp":1201179395000},"page":"120-135","source":"Crossref","is-referenced-by-count":17,"title":["Closing Internal Timing Channels by Transformation"],"prefix":"10.1007","author":[{"given":"Alejandro","family":"Russo","sequence":"first","affiliation":[]},{"given":"John","family":"Hughes","sequence":"additional","affiliation":[]},{"given":"David","family":"Naumann","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Report on resource and information flow security requirements, Deliverable D1.1 of the EU IST FET GC2 MOBIUS project, (March 2006), http:\/\/mobius.inria.fr\/"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Agat, J.: Transforming out timing leaks. In: Proc. POPL 2002, pp. 40\u201353 (January 2000)","DOI":"10.1145\/325694.325702"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/3-540-48224-5_32","volume-title":"Automata, Languages and Programming","author":"G. Boudol","year":"2001","unstructured":"Boudol, G., Castellani, I.: Noninterference for concurrent programs. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol.\u00a02076, pp. 382\u2013395. Springer, Heidelberg (2001)"},{"issue":"1","key":"10_CR4","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0304-3975(02)00010-5","volume":"281","author":"G. Boudol","year":"2002","unstructured":"Boudol, G., Castellani, I.: Non-interference for concurrent programs and thread systems. Theoretical Computer Science\u00a0281(1), 109\u2013130 (2002)","journal-title":"Theoretical Computer Science"},{"issue":"7","key":"10_CR5","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D.E. Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Comm. of the ACM"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-45608-2_6","volume-title":"Foundations of Security Analysis and Design","author":"R. Focardi","year":"2001","unstructured":"Focardi, R., Gorrieri, R.: Classification of security properties (part I: Information flow). In: Focardi, R., Gorrieri, R. (eds.) Foundations of Security Analysis and Design. LNCS, vol.\u00a02171, pp. 331\u2013396. Springer, Heidelberg (2001)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46425-5_12","volume-title":"Programming Languages and Systems","author":"K. Honda","year":"2000","unstructured":"Honda, K., Vasconcelos, V., Yoshida, N.: Secure information flow as typed process behaviour. In: Smolka, G. (ed.) ESOP 2000 and ETAPS 2000. LNCS, vol.\u00a01782, Springer, Heidelberg (2000)"},{"key":"10_CR8","first-page":"81","volume-title":"Proc. ACM Symp. on Principles of Programming Languages","author":"K. Honda","year":"2002","unstructured":"Honda, K., Yoshida, N.: A uniform type structure for secure information flow. In: Proc. ACM Symp. on Principles of Programming Languages, pp. 81\u201392. ACM Press, New York (2002)"},{"key":"10_CR9","unstructured":"Huisman, M., Worah, P., Sunesen, K.: A temporal logic characterisation of observational determinism. In: Proc. IEEE Computer Security Foundations Workshop (July 2006)"},{"key":"10_CR10","unstructured":"JSR 118 Expert Group. Mobile information device profile (MIDP), version 2.0. Java specification request, Java Community Process (November 2002)"},{"key":"10_CR11","unstructured":"JSR 179 Expert Group. Location API for J2ME. Java specification request, Java Community Process (September 2003)"},{"key":"10_CR12","unstructured":"Knudsen, J.: Networking, user experience, and threads. Sun Technical Articles and Tips, (2002), http:\/\/developers.sun.com\/techtopics\/mobility\/midp\/articles\/threading\/"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11679219_5","volume-title":"Formal Aspects in Security and Trust","author":"B. K\u00f6pf","year":"2006","unstructured":"K\u00f6pf, B., Mantel, H.: Eliminating implicit information leaks by transformational typing and unification. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2005. LNCS, vol.\u00a03866, Springer, Heidelberg (2006)"},{"key":"10_CR14","unstructured":"Mahmoud, Q.H.: Preventing screen lockups of blocking operations. Sun Technical Articles and Tips (2004), http:\/\/developers.sun.com\/techtopics\/mobility\/midp\/ttips\/screenlock\/"},{"key":"10_CR15","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/CSFW.2002.1021826","volume-title":"Proc. IEEE Computer Security Foundations Workshop","author":"F. Pottier","year":"2002","unstructured":"Pottier, F.: A simple view of type-secure information flow in the pi-calculus. In: Proc. IEEE Computer Security Foundations Workshop, pp. 320\u2013330. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"10_CR16","first-page":"177","volume-title":"Proc. IEEE Computer Security Foundations Workshop","author":"A. Russo","year":"2006","unstructured":"Russo, A., Sabelfeld, A.: Securing interaction between threads and the scheduler. In: Proc. IEEE Computer Security Foundations Workshop, pp. 177\u2013189. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70881-0_43","volume-title":"Perspectives of Systems Informatics","author":"A. Russo","year":"2007","unstructured":"Russo, A., Sabelfeld, A.: Security for multithreaded programs under cooperative scheduling. In: Virbitskaite, I., Voronkov, A. (eds.) PSI 2006. LNCS, vol.\u00a04378, Springer, Heidelberg (2007)"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b97772","volume-title":"Foundations of Security Analysis and Design II","author":"P. Ryan","year":"2004","unstructured":"Ryan, P.: Mathematical models of computer security\u2014tutorial lectures. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2001. LNCS, vol.\u00a02946, Springer, Heidelberg (2004)"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"Perspectives of System Informatics","author":"A. Sabelfeld","year":"2001","unstructured":"Sabelfeld, A.: The impact of synchronisation on secure information flow in concurrent programs. In: Bj\u00f8rner, D., Broy, M., Zamulin, A.V. (eds.) PSI 2001. LNCS, vol.\u00a02244, Springer, Heidelberg (2001)"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45789-5_27","volume-title":"Static Analysis","author":"A. Sabelfeld","year":"2002","unstructured":"Sabelfeld, A., Mantel, H.: Static confidentiality enforcement for distributed programs. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, Springer, Heidelberg (2002)"},{"issue":"1","key":"10_CR21","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"10_CR22","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/CSFW.2000.856937","volume-title":"Proc. IEEE Computer Security Foundations Workshop","author":"A. Sabelfeld","year":"2000","unstructured":"Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: Proc. IEEE Computer Security Foundations Workshop, pp. 200\u2013214. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"10_CR23","first-page":"115","volume-title":"Proc. IEEE Computer Security Foundations Workshop","author":"G. Smith","year":"2001","unstructured":"Smith, G.: A new type system for secure information flow. In: Proc. IEEE Computer Security Foundations Workshop, pp. 115\u2013125. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"10_CR24","first-page":"3","volume-title":"Proc. IEEE Computer Security Foundations Workshop","author":"G. Smith","year":"2003","unstructured":"Smith, G.: Probabilistic noninterference through weak probabilistic bisimulation. In: Proc. IEEE Computer Security Foundations Workshop, pp. 3\u201313. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"10_CR25","first-page":"355","volume-title":"Proc. ACM Symp. on Principles of Programming Languages","author":"G. Smith","year":"1998","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proc. ACM Symp. on Principles of Programming Languages, pp. 355\u2013364. ACM Press, New York (1998)"},{"key":"10_CR26","first-page":"75","volume-title":"PLAS 2006","author":"S.F. Smith","year":"2006","unstructured":"Smith, S.F., Thober, M.: Refactoring programs to secure information flows. In: PLAS 2006, pp. 75\u201384. ACM Press, New York (2006)"},{"issue":"2\u20133","key":"10_CR27","doi-asserted-by":"publisher","first-page":"231","DOI":"10.3233\/JCS-1999-72-305","volume":"7","author":"D. Volpano","year":"1999","unstructured":"Volpano, D., Smith, G.: Probabilistic noninterference in a concurrent language. J. Computer Security\u00a07(2\u20133), 231\u2013253 (1999)","journal-title":"J. Computer Security"},{"issue":"3","key":"10_CR28","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. Computer Security\u00a04(3), 167\u2013187 (1996)","journal-title":"J. Computer Security"},{"key":"10_CR29","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3054.001.0001","volume-title":"The Formal Semantics of Programming Languages: An Introduction","author":"G. Winskel","year":"1993","unstructured":"Winskel, G.: The Formal Semantics of Programming Languages: An Introduction. MIT Press, Cambridge (1993)"},{"key":"10_CR30","first-page":"29","volume-title":"Proc. IEEE Computer Security Foundations Workshop","author":"S. Zdancewic","year":"2003","unstructured":"Zdancewic, S., Myers, A.C.: Observational determinism for concurrent program security. In: Proc. IEEE Computer Security Foundations Workshop, pp. 29\u201343. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"10_CR31","first-page":"236","volume-title":"Proc. IEEE Symp. on Security and Privacy","author":"L. Zheng","year":"2003","unstructured":"Zheng, L., Chong, S., Myers, A.C., Zdancewic, S.: Using replication and partitioning to build secure distributed systems. In: Proc. IEEE Symp. on Security and Privacy, pp. 236\u2013250. IEEE Computer Society Press, Los Alamitos (2003)"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77505-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T04:47:47Z","timestamp":1588308467000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77505-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775041","9783540775058"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77505-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}