{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:51:53Z","timestamp":1725537113797},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040801"},{"type":"electronic","value":"9783642040818"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04081-8_5","type":"book-chapter","created":{"date-parts":[[2009,8,31]],"date-time":"2009-08-31T16:27:08Z","timestamp":1251736028000},"page":"53-68","source":"Crossref","is-referenced-by-count":3,"title":["Flow Policy Awareness for Distributed Mobile Code"],"prefix":"10.1007","author":[{"given":"Ana","family":"Almeida Matos","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Almeida Matos, A.: Typing Secure Information Flow: Declassification and Mobility. PhD thesis, \u00c9cole Nationale Sup\u00e9rieure des Mines de Paris (2006)"},{"key":"5_CR2","unstructured":"Almeida Matos, A.: Flow policy awareness for distributed mobile code (proofs). Technical report, Instituto Superior T\u00e9cnico de Lisboa (2008)"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/CSFW.2005.21","volume-title":"18th IEEE Computer Security Foundations Workshop","author":"A. Almeida Matos","year":"2005","unstructured":"Almeida Matos, A., Boudol, G.: On declassification and the non-disclosure policy. In: 18th IEEE Computer Security Foundations Workshop, pp. 226\u2013240. IEEE Computer Society, Los Alamitos (2005)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-31794-4_11","volume-title":"Global Computing","author":"G. Boudol","year":"2005","unstructured":"Boudol, G.: A generic membrane model. In: Priami, C., Quaglia, P. (eds.) GC 2004. LNCS, vol.\u00a03267, pp. 208\u2013222. Springer, Heidelberg (2005)"},{"issue":"1-2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0304-3975(02)00010-5","volume":"281","author":"G. Boudol","year":"2002","unstructured":"Boudol, G., Castellani, I.: Noninterference for concurrent programs and thread systems. Theoretical Computer Science\u00a0281(1-2), 109\u2013130 (2002)","journal-title":"Theoretical Computer Science"},{"key":"5_CR6","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-540-73986-9_7","volume-title":"Computer Network Security","author":"G. Boudol","year":"2007","unstructured":"Boudol, G., Kolundzija, M.: Access Control and Declassification. In: Computer Network Security. CCIS, vol.\u00a01, pp. 85\u201398. Springer, Heidelberg (2007)"},{"key":"5_CR7","series-title":"ENTCS","first-page":"76","volume-title":"Workshop on Foundations of Wide Area Network Computing","author":"S. Crafa","year":"2002","unstructured":"Crafa, S., Bugliesi, M., Castagna, G.: Information flow security for boxed ambients. In: Sassone, V. (ed.) Workshop on Foundations of Wide Area Network Computing. ENTCS, vol.\u00a066, pp. 76\u201397. Elsevier, Amsterdam (2002)"},{"issue":"5","key":"5_CR8","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Communications of the ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Communications of the ACM"},{"key":"5_CR9","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/SP.1982.10014","volume-title":"1982 IEEE Symp. on Security and Privacy","author":"J.A. Goguen","year":"1982","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: 1982 IEEE Symp. on Security and Privacy, pp. 11\u201320. IEEE Computer Society, Los Alamitos (1982)"},{"key":"5_CR10","series-title":"ENTCS","first-page":"23","volume-title":"Foundations of Global Ubiquitous Computing, FGUC 2004","author":"D. Gorla","year":"2005","unstructured":"Gorla, D., Hennessy, M., Sassone, V.: Security policies as membranes in systems for global computing. In: Foundations of Global Ubiquitous Computing, FGUC 2004. ENTCS, pp. 23\u201342. Elsevier, Amsterdam (2005)"},{"key":"5_CR11","unstructured":"Hicks, M., Tse, S., Hicks, B., Zdancewic, S.: Dynamic updating of information-flow policies. In: Workshop on Foundations of Comp. Security, pp. 7\u201318 (2005)"},{"key":"5_CR12","first-page":"47","volume-title":"15th ACM Symp. on Principles of Programming Languages","author":"J.M. Lucassen","year":"1988","unstructured":"Lucassen, J.M., Gifford, D.K.: Polymorphic effect systems. In: 15th ACM Symp. on Principles of Programming Languages, pp. 47\u201357. ACM Press, New York (1988)"},{"issue":"4","key":"5_CR13","doi-asserted-by":"publisher","first-page":"615","DOI":"10.3233\/JCS-2003-11406","volume":"11","author":"H. Mantel","year":"2003","unstructured":"Mantel, H., Sabelfeld, A.: A unifying approach to the security of distributed and multi-threaded programs. Journal of Computer Security\u00a011(4), 615\u2013676 (2003)","journal-title":"Journal of Computer Security"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/11580850_7","volume-title":"Trustworthy Global Computing","author":"F. Martins","year":"2005","unstructured":"Martins, F., Vasconcelos, V.T.: History-based access control for distributed processes. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, vol.\u00a03705, pp. 98\u2013115. Springer, Heidelberg (2005)"},{"key":"5_CR15","first-page":"106","volume-title":"Proceedings of the 24th ACM Symposium on Principles of Programming Languages","author":"G.C. Necula","year":"1997","unstructured":"Necula, G.C.: Proof-carrying code. In: Proceedings of the 24th ACM Symposium on Principles of Programming Languages, pp. 106\u2013119. ACM, New York (1997)"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"5_CR17","unstructured":"Sabelfeld, A., Sands, D.: Declassification: Dimensions and principles. Journal of Computer Security (2007) (to appear)"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1109\/SECPRI.2004.1301323","volume-title":"IEEE 2004 Symposium on Security and Privacy","author":"S. Tse","year":"2004","unstructured":"Tse, S., Zdancewic, S.: Run-time principals in information-flow type systems. In: IEEE 2004 Symposium on Security and Privacy, pp. 179\u2013193. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"5_CR19","unstructured":"Zdancewic, S.: Challenges for information-flow security. In: 1st International Workshop on the Programming Language Interference and Dependence (2004)"},{"issue":"3","key":"5_CR20","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1145\/566340.566343","volume":"20","author":"S. Zdancewic","year":"2002","unstructured":"Zdancewic, S., Zheng, L., Nystrom, N., Myers, A.: Secure program partitioning. ACM Transactions on Computer Systems\u00a020(3), 283\u2013328 (2002)","journal-title":"ACM Transactions on Computer Systems"},{"key":"5_CR21","first-page":"27","volume-title":"Proc. 2nd Workshop on Formal Aspects in Security and Trust","author":"L. Zheng","year":"2004","unstructured":"Zheng, L., Myers, A.: Dynamic security labels and noninterference. In: Proc. 2nd Workshop on Formal Aspects in Security and Trust, pp. 27\u201340. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","CONCUR 2009 - Concurrency Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04081-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,21]],"date-time":"2020-05-21T22:19:04Z","timestamp":1590099544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04081-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040801","9783642040818"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04081-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}