{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:43:13Z","timestamp":1774946593875,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642014642","type":"print"},{"value":"9783642014659","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01465-9_4","type":"book-chapter","created":{"date-parts":[[2009,4,4]],"date-time":"2009-04-04T00:56:06Z","timestamp":1238806566000},"page":"50-66","source":"Crossref","is-referenced-by-count":19,"title":["Non-Interference for Deterministic Interactive Programs"],"prefix":"10.1007","author":[{"given":"David","family":"Clark","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Hunt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"NATO Science Series","volume-title":"Logic and Computation: Proc. 1997 Marktoberdorf Summer School","author":"S. Abramksy","year":"1998","unstructured":"Abramksy, S., McCusker, G.: Game semantics. In: Berger, U., Schwichtenberg, H. (eds.) Logic and Computation: Proc. 1997 Marktoberdorf Summer School. NATO Science Series. Springer, Heidelberg (1998)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Abramsky, S., Jagadeesan, R., Malacaria, P.: Full abstraction for pcf. Information and Computation, 409\u2013470 (December 2000)","DOI":"10.1006\/inco.2000.2930"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/3-540-44685-0_11","volume-title":"CONCUR 2001 - Concurrency Theory","author":"A. Aldini","year":"2001","unstructured":"Aldini, A.: Probabilistic information flow in a process algebra. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol.\u00a02154, pp. 152\u2013168. Springer, Heidelberg (2001)"},{"issue":"2","key":"4_CR4","doi-asserted-by":"publisher","first-page":"191","DOI":"10.3233\/JCS-2004-12202","volume":"12","author":"A. Aldini","year":"2004","unstructured":"Aldini, A., Bravetti, M., Gorrieri, R.: A process-algebraic approach for the analysis of probabilistic noninterference. J. Comput. Secur.\u00a012(2), 191\u2013245 (2004)","journal-title":"J. Comput. Secur."},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_22","volume-title":"Computer Security - ESORICS 2008","author":"A. Askarov","year":"2008","unstructured":"Askarov, A., Hunt, S., Sabelfeld, A., Sands, D.: Termination-insensitive noninterference leaks more than just a bit. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283. Springer, Heidelberg (2008)"},{"issue":"5","key":"4_CR6","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Comm. of the ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Comm. of the ACM"},{"issue":"1","key":"4_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","volume":"3","author":"R. Focardi","year":"1995","unstructured":"Focardi, R., Gorrieri, R.: A classification of security properties for process algebras. J. Computer Security\u00a03(1), 5\u201333 (1995)","journal-title":"J. Computer Security"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Symposium on Security and Privacy, April 1982, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"4_CR9","first-page":"422","volume-title":"Proceedings of the Fourteenth Annual Symposium on Logic in Computer Science, LICS 1999","author":"R. Harmer","year":"1999","unstructured":"Harmer, R., Mccusker, G.: A fully abstract game semantics for finite nondeterminism. In: Proceedings of the Fourteenth Annual Symposium on Logic in Computer Science, LICS 1999, pp. 422\u2013430. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. In: Principles Of Programming Languages (January 2008)","DOI":"10.1145\/1328438.1328472"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-78739-6_19","volume-title":"Programming Languages and Systems","author":"S. Hunt","year":"2008","unstructured":"Hunt, S., Sands, D.: Just forget it \u2013 the semantics and enforcement of information erasure. In: Drossopoulou, S. (ed.) ESOP 2008. LNCS, vol.\u00a04960, pp. 239\u2013253. Springer, Heidelberg (2008)"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/RISP.1991.130769","volume-title":"Proc. of the 1991 Symposium on Security and Privacy","author":"J.W. Gray III","year":"1991","unstructured":"Gray III, J.W.: Toward a mathematical foundation for information flow security. In: Proc. of the 1991 Symposium on Security and Privacy, pp. 21\u201335. IEEE, Los Alamitos (1991)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/3-540-44618-4_29","volume-title":"CONCUR 2000 - Concurrency Theory","author":"J. J\u00fcrjens","year":"2000","unstructured":"J\u00fcrjens, J.: Secure information flow for concurrent processes. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol.\u00a01877, pp. 395\u2013409. Springer, Heidelberg (2000)"},{"key":"4_CR14","first-page":"190","volume-title":"CSFW","author":"K.R. O\u2019Neill","year":"2006","unstructured":"O\u2019Neill, K.R., Clarkson, M.R., Chong, S.: Information-flow security for interactive programs. In: CSFW, pp. 190\u2013201. IEEE Computer Society, Los Alamitos (2006)"},{"issue":"4","key":"4_CR15","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1147\/rd.24.0289","volume":"2","author":"C.E. Shannon","year":"1958","unstructured":"Shannon, C.E.: Channels with side information at the transmitter. IBM journal of Research and Development\u00a02(4), 289\u2013293 (1958)","journal-title":"IBM journal of Research and Development"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Wittbold, J.T., Johnson, D.M.: Information flow in nondeterministic systems. In: IEEE Symposium on Security and Privacy, pp. 144\u2013161 (1990)","DOI":"10.1109\/RISP.1990.63846"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01465-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T04:57:17Z","timestamp":1551934637000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01465-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642014642","9783642014659"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01465-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}