{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:46:55Z","timestamp":1743108415205,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642011863"},{"type":"electronic","value":"9783642011870"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01187-0_22","type":"book-chapter","created":{"date-parts":[[2009,5,4]],"date-time":"2009-05-04T16:53:15Z","timestamp":1241455995000},"page":"252-266","source":"Crossref","is-referenced-by-count":10,"title":["Verification of Information Flow in Agent-Based Systems"],"prefix":"10.1007","author":[{"given":"Khair Eddin","family":"Sabri","sequence":"first","affiliation":[]},{"given":"Ridha","family":"Khedri","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Jaskolka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"22_CR1","first-page":"111","volume":"38","author":"K. Alghathbar","year":"2006","unstructured":"Alghathbar, K., Farkas, C., Wijesekera, D.: Securing UML information flow using FlowUML. Journal of Research and Practice in Information Technology\u00a038(1), 111\u2013120 (2006)","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Bell, D.E., La Padula, L.J.: Secure computer system: Unified exposition and multics interpretation. Technical Report ESD-TR-75-306, The MITRE Corporation (March 1976)","DOI":"10.21236\/ADA023588"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Brewer, D.F.C., Nash, M.J.: The Chinese Wall security policy. In: IEEE Symposium on Security and Privacy, May 1989, pp. 206\u2013214 (1989)","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-71316-6_2","volume-title":"Programming Languages and Systems","author":"M. Carbone","year":"2007","unstructured":"Carbone, M., Honda, K., Yoshida, N.: Structured communication-centred programming for web services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol.\u00a04421, pp. 2\u201317. Springer, Heidelberg (2007)"},{"key":"22_CR5","series-title":"second edition","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809088","volume-title":"Introduction to Lattices and Order","author":"B.A. Davey","year":"2002","unstructured":"Davey, B.A., Priestley, H.A.: Introduction to Lattices and Order. second edition. Cambridge University Press, Cambridge (2002)"},{"issue":"9","key":"22_CR6","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/32.629493","volume":"23","author":"R. Focardi","year":"1997","unstructured":"Focardi, R., Gorrieri, R.: The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering\u00a023(9), 550\u2013571 (1997)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"10","key":"22_CR7","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1145\/363235.363259","volume":"12","author":"C.A.R. Hoare","year":"1969","unstructured":"Hoare, C.A.R.: An axiomatic basis for computer programming. Communications of the ACM\u00a012(10), 576\u2013580 (1969)","journal-title":"Communications of the ACM"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/1134744.1134759","volume-title":"PLAS 2006: Proceedings of the 2006 workshop on Programming languages and analysis for security","author":"K. Hristova","year":"2006","unstructured":"Hristova, K., Rothamel, T., Liu, Y.A., Stoller, S.D.: Efficient type inference for secure information flow. In: PLAS 2006: Proceedings of the 2006 workshop on Programming languages and analysis for security, pp. 85\u201394. ACM, New York (2006)"},{"issue":"4","key":"22_CR9","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s00236-005-0179-x","volume":"42","author":"N. Kobayashi","year":"2005","unstructured":"Kobayashi, N.: Type-based information flow analysis for the \u03c0-calculus. Acta Informatica\u00a042(4), 291\u2013347 (2005)","journal-title":"Acta Informatica"},{"issue":"1","key":"22_CR10","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11787-006-0007-2","volume":"1","author":"J. Kohlas","year":"2007","unstructured":"Kohlas, J., St\u00e4rk, R.F.: Information algebras and consequence operators. Logica Universalis\u00a01(1), 139\u2013165 (2007)","journal-title":"Logica Universalis"},{"key":"22_CR11","unstructured":"Sabri, K.E., Khedri, R.: A mathematical framework to capture agent explicit knowledge in cryptographic protocols. Technical Report CAS-07-04-RK, department of Computing and Software, Faculty of Engineering, McMaster University (October 2007), http:\/\/www.cas.mcmaster.ca\/cas\/0template1.php?601 (accessed January 19, 2008)"},{"key":"22_CR12","unstructured":"Sabri, K.E., Khedri, R., Jaskolka, J.: Specification of agent explicit knowledge in cryptographic protocols. In: CESSE 2008: International Conference on Computer, Electrical, and Systems Science, and Engineering, Venice, Canada, October 2008, vol.\u00a035, pp. 447\u2013454. World Academy of Science, Engineering and Technology (2008)"},{"key":"22_CR13","unstructured":"Sabri, K.E., Khedri, R., Jaskolka, J.: Automated verification of information flow in agent-based systems. Technical Report CAS-09-01-RK, department of Computing and Software, Faculty of Engineering, McMaster University (January 2009), http:\/\/www.cas.mcmaster.ca\/cas\/0template1.php?601 (accessed January 19, 2009)"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Varadharajan, V.: Petri net based modelling of information flow security requirements. In: Computer Security Foundations Workshop III, pp. 51\u201361 (June 1990)","DOI":"10.1109\/CSFW.1990.128185"},{"issue":"2-3","key":"22_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Irvine, C., Smith, G.: A sound type system for secure flow analysis. Journal of Computer Security\u00a04(2-3), 167\u2013187 (1996)","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Business Information Processing","E-Technologies: Innovation in an Open World"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01187-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T07:44:20Z","timestamp":1739087060000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01187-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642011863","9783642011870"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01187-0_22","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2009]]}}}