{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:12:14Z","timestamp":1725520334856},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881933"},{"type":"electronic","value":"9783540881940"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88194-0_3","type":"book-chapter","created":{"date-parts":[[2008,10,17]],"date-time":"2008-10-17T14:56:21Z","timestamp":1224255381000},"page":"3-4","source":"Crossref","is-referenced-by-count":0,"title":["Contract-Based Reasoning for Verification and Certification of Secure Information Flow Policies in Industrial Workflows"],"prefix":"10.1007","author":[{"given":"John","family":"Hatcliff","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Amtoft, T., Bandhakavi, S., Banerjee, A.: A logic for information flow in object-oriented programs. In: 33rd Principles of Programming Languages (POPL), pp. 91\u2013102 (2006)","DOI":"10.1145\/1111037.1111046"},{"issue":"1","key":"3_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.scico.2006.03.002","volume":"64","author":"T. Amtoft","year":"2007","unstructured":"Amtoft, T., Banerjee, A.: A logic for information flow analysis with an application to forward slicing of simple imperative programs. Science of Comp. Prog.\u00a064(1), 3\u201328 (2007)","journal-title":"Science of Comp. Prog."},{"key":"#cr-split#-3_CR3.1","doi-asserted-by":"crossref","unstructured":"Amtoft, T., Banerjee, A.: Verification condition generation for conditional information flow. In: 5th ACM Workshop on Formal Methods in Security Engineering (FMSE), pp. 2???11 (2007);","DOI":"10.1145\/1314436.1314438"},{"key":"#cr-split#-3_CR3.2","unstructured":"A long version, with proofs, appears as technical report KSU CIS TR 2007-2"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"FM 2008: Formal Methods","author":"T. Amtoft","year":"2008","unstructured":"Amtoft, T., Hatcliff, J., Rodr\u00edguez, E., Robby,, Hoag, J., Greve, D.: Specification and checking of software contracts for conditional information flow. In: Cuellar, J., Maibaum, T.S.E. (eds.) FM 2008. LNCS, vol.\u00a05014. Springer, Heidelberg (2008)"},{"key":"3_CR5","first-page":"39","volume-title":"SIGAda 2004","author":"R. Chapman","year":"2004","unstructured":"Chapman, R., Hilton, A.: Enforcing security and safety models with an information flow analysis tool. In: SIGAda 2004, Atlanta, Georgia, pp. 39\u201346. ACM Press, New York (2004)"},{"key":"3_CR6","unstructured":"Greve, D., Wilding, M., Vanfleet, W.M.: A separation kernel formal security policy. In: 4th International Workshop on the ACL2 Prover and its Applications (ACL2 2003) (2003)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Heitmeyer, C.L., Archer, M., Leonard, E.I., McLean, J.: Formal specification and verification of data separation in a separation kernel for an embedded system. In: 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 346\u2013355 (2006)","DOI":"10.1145\/1180405.1180448"},{"key":"#cr-split#-3_CR8.1","doi-asserted-by":"crossref","unstructured":"Ranganath, V.P., Amtoft, T., Banerjee, A., Hatcliff, J., Dwyer, M.B.: A new foundation for control dependence and slicing for modern program structures. TOPLAS??29(5) (August 2007);","DOI":"10.1145\/1275497.1275502"},{"key":"#cr-split#-3_CR8.2","unstructured":"In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol.??3444. Springer, Heidelberg (2005)"},{"issue":"5-6","key":"3_CR9","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/s10009-007-0043-0","volume":"9","author":"V.P. Ranganath","year":"2007","unstructured":"Ranganath, V.P., Hatcliff, J.: Slicing concurrent Java programs using Indus and Kaveri. International Journal on Software Tools for Technology Transfer (STTT)\u00a09(5-6), 489\u2013504 (2007); Special section FASE 2004\/2005.","journal-title":"International Journal on Software Tools for Technology Transfer (STTT)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Rushby, J.: The design and verification of secure systems. In: 8th ACM Symposium on Operating Systems Principles, vol.\u00a015(5), pp. 12\u201321 (1981)","DOI":"10.1145\/800216.806586"},{"key":"3_CR11","unstructured":"Rushby, J., DeLong, R.: Compositional security evaluation: The MILS approach, http:\/\/www.csl.sri.com\/~rushby\/slides\/iccc07.pdf"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88194-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T19:08:02Z","timestamp":1557860882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88194-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540881933","9783540881940"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88194-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}