{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T02:57:48Z","timestamp":1770433068710,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642034657","type":"print"},{"value":"9783642034664","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03466-4_3","type":"book-chapter","created":{"date-parts":[[2009,8,3]],"date-time":"2009-08-03T03:20:54Z","timestamp":1249269654000},"page":"61-78","source":"Crossref","is-referenced-by-count":7,"title":["The Secret Art of Computer Programming"],"prefix":"10.1007","author":[{"given":"Annabelle K.","family":"McIver","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/3-540-44929-9_1","volume-title":"Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics","author":"M. Abadi","year":"2000","unstructured":"Abadi, M., Rogoway, P.: Reconciling two views of crytography (the computational soundness of formal encrytion). In: Watanabe, O., Hagiya, M., Ito, T., van Leeuwen, J., Mosses, P.D. (eds.) TCS 2000. LNCS, vol.\u00a01872, pp. 3\u201322. Springer, Heidelberg (2000)"},{"key":"3_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511624162","volume-title":"The B Book: Assigning Programs to Meanings","author":"J.-R. Abrial","year":"1996","unstructured":"Abrial, J.-R.: The B Book: Assigning Programs to Meanings. Cambridge University Press, Cambridge (1996)"},{"key":"3_CR3","unstructured":"Back, R.-J.R.: Correctness preserving program refinements: Proof theory and applications. Tract 131, Mathematisch Centrum, Amsterdam (1980)"},{"issue":"6","key":"3_CR4","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1999","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. J. ACM\u00a045(6), 965\u2013982 (1999)","journal-title":"J. ACM"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/3-540-45653-8_9","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"K. Engelhardt","year":"2001","unstructured":"Engelhardt, K., van der Meyden, R., Moses, Y.: A refinement theory that supports reasoning about knowledge and time. In: Nieuwenhuis, R., Voronkov, A. (eds.) LPAR 2001. LNCS, vol.\u00a02250, pp. 125\u2013141. Springer, Heidelberg (2001)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: Proc IEEE Symp on Security and Privacy, pp. 75\u201386 (1984)","DOI":"10.1109\/SP.1984.10019"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Jacob, J.: Security specifications. In: IEEE Symposium on Security and Privacy, pp. 14\u201323 (1988)","DOI":"10.1109\/SECPRI.1988.8094"},{"issue":"1\u20133","key":"3_CR8","first-page":"113","volume":"37","author":"K.R.M. Leino","year":"2000","unstructured":"Leino, K.R.M., Joshi, R.: A semantic approach to secure information flow. Science of Computer Programming\u00a037(1\u20133), 113\u2013138 (2000)","journal-title":"Science of Computer Programming"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Mantel, H.: Preserving information flow properties under refinement. In: Proc IEEE Symp. Security and Privacy, pp. 78\u201391 (2001)","DOI":"10.1109\/SECPRI.2001.924289"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"McIver, A.K., Morgan, C.C.: Sums and lovers: Case studies in security, compositionality and refinement. Submitted to Formal Methods 2009 (2009)","DOI":"10.1007\/978-3-642-05089-3_19"},{"key":"3_CR11","series-title":"Tech. Mono Comp. Sci","volume-title":"Abstraction, Refinement and Proof for Probabilistic Systems","author":"A.K. McIver","year":"2005","unstructured":"McIver, A.K., Morgan, C.C.: Abstraction, Refinement and Proof for Probabilistic Systems. Tech. Mono Comp. Sci. Springer, New York (2005)"},{"key":"3_CR12","volume-title":"Programming from Specifications","author":"C.C. Morgan","year":"1994","unstructured":"Morgan, C.C.: Programming from Specifications, 2nd edn. Prentice-Hall, Englewood Cliffs (1994), web.comlab.ox.ac.uk\/oucl\/publications\/books\/PfS\/","edition":"2"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/11783596_21","volume-title":"Mathematics of Program Construction","author":"C.C. Morgan","year":"2006","unstructured":"Morgan, C.C.: The Shadow Knows: Refinement of ignorance in sequential programs. In: Uustalu, T. (ed.) MPC 2006. LNCS, vol.\u00a04014, pp. 359\u2013378. Springer, Heidelberg (2006); Treats Dining Cryptographers"},{"key":"#cr-split#-3_CR14.1","doi-asserted-by":"crossref","unstructured":"Morgan, C.C.: The Shadow Knows: Refinement of ignorance in sequential programs. Science of Computer Programming??74(8) (2009);","DOI":"10.1016\/j.scico.2007.09.003"},{"key":"#cr-split#-3_CR14.2","unstructured":"Treats Oblivious Transfer"},{"issue":"1","key":"3_CR15","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1023\/A:1011553200337","volume":"14","author":"A. Sabelfeld","year":"2001","unstructured":"Sabelfeld, A., Sands, D.: A PER model of secure information flow. Higher-Order and Symbolic Computation\u00a014(1), 59\u201391 (2001)","journal-title":"Higher-Order and Symbolic Computation"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing - ICTAC 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03466-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T16:36:12Z","timestamp":1558456572000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03466-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642034657","9783642034664"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03466-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}