{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:49:27Z","timestamp":1773931767277,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642117466","type":"print"},{"value":"9783642117473","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11747-3_4","type":"book-chapter","created":{"date-parts":[[2010,1,25]],"date-time":"2010-01-25T01:03:02Z","timestamp":1264381382000},"page":"44-60","source":"Crossref","is-referenced-by-count":20,"title":["Experiences with PDG-Based IFC"],"prefix":"10.1007","author":[{"given":"Christian","family":"Hammer","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"4_CR1","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/59287.59293","volume":"11","author":"H. A\u00eft-Kaci","year":"1989","unstructured":"A\u00eft-Kaci, H., Boyer, R., Lincoln, P., Nasr, R.: Efficient implementation of lattice operations. ACM TOPLAS\u00a011(1), 115\u2013146 (1989)","journal-title":"ACM TOPLAS"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1111037.1111046","volume-title":"POPL 2006","author":"T. Amtoft","year":"2006","unstructured":"Amtoft, T., Bandhakavi, S., Banerjee, A.: A logic for information flow in object-oriented programs. In: POPL 2006, pp. 91\u2013102. ACM, New York (2006)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/11555827_12","volume-title":"Computer Security \u2013 ESORICS 2005","author":"A. Askarov","year":"2005","unstructured":"Askarov, A., Sabelfeld, A.: Security-typed languages for implementation of cryptographic protocols: A case study. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 197\u2013221. Springer, Heidelberg (2005)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-71316-6_10","volume-title":"Programming Languages and Systems","author":"G. Barthe","year":"2007","unstructured":"Barthe, G., Pichardie, D., Rezk, T.: A certified lightweight non-interference Java bytecode verifier. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol.\u00a04421, pp. 125\u2013140. Springer, Heidelberg (2007)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-45165-X_3","volume-title":"Java on Smart Cards: Programming and Security","author":"P. Bieber","year":"2001","unstructured":"Bieber, P., Cazin, J., Marouani, A.E., Girard, P., Lanet, J.L., Wiels, V., Zanon, G.: The PACAP prototype: a tool for detecting Java Card illegal flow. In: Attali, I., Jensen, T. (eds.) JavaCard 2000. LNCS, vol.\u00a02041, pp. 25\u201337. Springer, Heidelberg (2001)"},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1290520.1290523","volume":"30","author":"D. Binkley","year":"2007","unstructured":"Binkley, D., Harman, M., Krinke, J.: Empirical study of optimization techniques for massive slicing. ACM TOPLAS\u00a030(1), 3 (2007)","journal-title":"ACM TOPLAS"},{"key":"4_CR7","first-page":"463","volume-title":"23rd Annual Computer Security Applications Conference","author":"D. Chandra","year":"2007","unstructured":"Chandra, D., Franz, M.: Fine-grained information flow analysis and enforcement in a Java virtual machine. In: 23rd Annual Computer Security Applications Conference, pp. 463\u2013475. IEEE, Los Alamitos (2007)"},{"issue":"3","key":"4_CR8","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J. Ferrante","year":"1987","unstructured":"Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM TOPLAS\u00a09(3), 319\u2013349 (1987)","journal-title":"ACM TOPLAS"},{"issue":"5","key":"4_CR9","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/69.317709","volume":"6","author":"D.D. Ganguly","year":"1994","unstructured":"Ganguly, D.D., Mohan, C.K., Ranka, S.: A space-and-time-efficient coding algorithm for lattice computations. IEEE Trans. on Knowl. and Data Eng.\u00a06(5), 819\u2013829 (1994)","journal-title":"IEEE Trans. on Knowl. and Data Eng."},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1007\/978-3-540-30579-8_23","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"S. Genaim","year":"2005","unstructured":"Genaim, S., Spoto, F.: Information flow analysis for Java bytecode. In: Cousot, R. (ed.) VMCAI 2005. LNCS, vol.\u00a03385, pp. 346\u2013362. Springer, Heidelberg (2005)"},{"key":"4_CR11","first-page":"75","volume-title":"Symposium on Security and Privacy","author":"J.A. Goguen","year":"1984","unstructured":"Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: Symposium on Security and Privacy, pp. 75\u201386. IEEE, Los Alamitos (1984)"},{"key":"4_CR12","unstructured":"Hammer, C.: Information flow control for Java - a comprehensive approach based on path conditions in dependence graphs. Ph.D. thesis, Universit\u00e4t Karlsruhe (TH), Fak. f. Informatik (2009), URN\u00a0urn=urn:nbn:de:0072-120494"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/1375696.1375704","volume-title":"PLAS 2008","author":"C. Hammer","year":"2008","unstructured":"Hammer, C., Schaade, R., Snelting, G.: Static path conditions for Java. In: PLAS 2008, pp. 57\u201366. ACM, New York (2008)"},{"issue":"6","key":"4_CR14","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10207-009-0086-1","volume":"8","author":"C. Hammer","year":"2009","unstructured":"Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. Int. Journal of Information Security\u00a08(6), 399\u2013422 (2009)","journal-title":"Int. Journal of Information Security"},{"issue":"1","key":"4_CR15","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/77606.77608","volume":"12","author":"S. Horwitz","year":"1990","unstructured":"Horwitz, S., Reps, T., Binkley, D.: Interprocedural slicing using dependence graphs. ACM TOPLAS\u00a012(1), 26\u201360 (1990)","journal-title":"ACM TOPLAS"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/1512475.1512484","volume-title":"PASTE 2008","author":"L. Hubert","year":"2008","unstructured":"Hubert, L.: A non-null annotation inferencer for Java bytecode. In: PASTE 2008, pp. 36\u201342. ACM, New York (2008)"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/1111037.1111045","volume-title":"POPL 2006","author":"S. Hunt","year":"2006","unstructured":"Hunt, S., Sands, D.: On flow-sensitive security types. In: POPL 2006, pp. 79\u201390. ACM, New York (2006)"},{"key":"4_CR18","unstructured":"Myers, A.C., Chong, S., Nystrom, N., Zheng, L., Zdancewic, S.: Jif: Java information flow, \n                    \n                      http:\/\/www.cs.cornell.edu\/jif\/"},{"issue":"4","key":"4_CR19","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1145\/363516.363526","volume":"9","author":"A.C. Myers","year":"2000","unstructured":"Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM TOSEM\u00a09(4), 410\u2013442 (2000)","journal-title":"ACM TOSEM"},{"issue":"1","key":"4_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"4_CR21","doi-asserted-by":"crossref","first-page":"517","DOI":"10.3233\/JCS-2009-0352","volume":"17","author":"A. Sabelfeld","year":"2009","unstructured":"Sabelfeld, A., Sands, D.: Declassification: Dimensions and principles. Journal of Computer Security\u00a017(5), 517\u2013548 (2009)","journal-title":"Journal of Computer Security"},{"key":"4_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1255329.1255332","volume-title":"PLAS 2007","author":"S.F. Smith","year":"2007","unstructured":"Smith, S.F., Thober, M.: Improving usability of information flow security in Java. In: PLAS 2007, pp. 11\u201320. ACM, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11747-3_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:57:07Z","timestamp":1619783827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11747-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117466","9783642117473"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11747-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}