{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:50:28Z","timestamp":1756000228809},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642119569"},{"type":"electronic","value":"9783642119576"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11957-6_18","type":"book-chapter","created":{"date-parts":[[2010,3,8]],"date-time":"2010-03-08T00:55:38Z","timestamp":1268009738000},"page":"327-344","source":"Crossref","is-referenced-by-count":12,"title":["Automating Security Mediation Placement"],"prefix":"10.1007","author":[{"given":"Dave","family":"King","sequence":"first","affiliation":[]},{"given":"Susmit","family":"Jha","sequence":"additional","affiliation":[]},{"given":"Divya","family":"Muthukumaran","sequence":"additional","affiliation":[]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[]},{"given":"Sanjit A.","family":"Seshia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"18_CR1","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/0196-6774(81)90020-1","volume":"2","author":"R. Bar-Yehuda","year":"1981","unstructured":"Bar-Yehuda, R., Even, S.: A linear-time approximation algorithm for the weighted vertex cover problem. Journal of Algorithms\u00a02(2), 198\u2013203 (1981)","journal-title":"Journal of Algorithms"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, May 2008, pp. 354\u2013368 (2008)","DOI":"10.1109\/SP.2008.32"},{"issue":"6","key":"18_CR3","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/1323293.1294295","volume":"41","author":"J. Criswell","year":"2007","unstructured":"Criswell, J., Lenharth, A., Dhurjati, D., Adve, V.: Secure virtual architecture: a safe execution environment for commodity operating systems. SIGOPS Oper. Syst. Rev.\u00a041(6), 351\u2013366 (2007)","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"4","key":"18_CR4","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1145\/115372.115320","volume":"13","author":"R. Cytron","year":"1991","unstructured":"Cytron, R., Ferrante, J., Rosen, B.K., Wegman, M.N., Zadeck, F.K.: Efficiently computing static single assignment form and the control dependence graph. ACM Transactions on Programming Languages and Systems\u00a013(4), 451\u2013490 (1991)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1145\/1185448.1185567","volume-title":"ACM-SE 44: Proceedings of the 44th annual Southeast regional conference","author":"Z. Deng","year":"2006","unstructured":"Deng, Z., Smith, G.: Type inference and informative error reporting for secure information flow. In: ACM-SE 44: Proceedings of the 44th annual Southeast regional conference, pp. 543\u2013548. ACM, New York (2006)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Fahndrich, M., Foster, J.S., Su, Z., Aiken, A.: Partial online cycle elimination in inclusion constraint graphs. In: Proceedings of PLDI 1998, pp. 85\u201396 (1998)","DOI":"10.1145\/277650.277667"},{"issue":"5","key":"18_CR7","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/249069.231387","volume":"31","author":"C. Flanagan","year":"1996","unstructured":"Flanagan, C., Flatt, M., Krishnamurthi, S., Weirich, S., Felleisen, M.: Catching bugs in the web of program invariants. SIGPLAN Not.\u00a031(5), 23\u201332 (1996)","journal-title":"SIGPLAN Not."},{"key":"18_CR8","first-page":"3","volume-title":"Proceedings of PLAS 2006","author":"T. Fraser","year":"2006","unstructured":"Fraser, T., Petroni Jr., N.L., Arbaugh, W.A.: Applying flow-sensitive CQUAL to verify minix authorization check placement. In: Proceedings of PLAS 2006, pp. 3\u20136. ACM, New York (2006)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proceedings of the 1982 IEEE Symposium on Security and Privacy, April 1982, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"18_CR10","unstructured":"Halperin, E.: Improved approximation algorithms for the vertex cover problem in graphs and hypergraphs. In: SODA 2000: Proceedings of the 11th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 329\u2013337. Society for Industrial and Applied Mathematics (2000)"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Heintze, N., Tardieu, O.: Ultra-fast aliasing analysis using CLA: A million lines of C code in a second. In: Proceedings of PLDI 2001, June 2001, pp. 254\u2013263 (2001)","DOI":"10.1145\/378795.378855"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Hicks, B., Ahmadizadeh, K., McDaniel, P.: From languages to systems: Understanding practical application development in security-typed languages. In: ACSAC 2006: Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 153\u2013164. IEEE Computer Society, Los Alamitos (2006)","DOI":"10.1109\/ACSAC.2006.30"},{"key":"18_CR13","unstructured":"Hicks, B., Rueda, S., Jaeger, T., McDaniel, P.: From trusted to secure: Building and executing applications that enforce system security. In: Proceedings of the USENIX Annual Technical Conference, June 2007, pp. 1\u201314 (2007)"},{"issue":"2","key":"18_CR14","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.dam.2006.04.032","volume":"155","author":"L. Khachiyan","year":"2007","unstructured":"Khachiyan, L., Boros, E., Elbassioni, K., Gurvich, V., Makino, K.: Enumerating disjunctions and conjunctions of paths and cuts in reliability theory. Discrete Appl. Math.\u00a0155(2), 137\u2013149 (2007)","journal-title":"Discrete Appl. Math."},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1145\/1453101.1453135","volume-title":"SIGSOFT 2008\/FSE-16: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering","author":"D. King","year":"2008","unstructured":"King, D., Jaeger, T., Jha, S., Seshia, S.A.: Effective blame for information-flow violations. In: SIGSOFT 2008\/FSE-16: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 250\u2013260. ACM, New York (2008)"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"King, D., Jha, S., Muthukumaran, D., Jaeger, T., Jha, S., Seshia, S.: Automating Security Mediation Placement. Tech. Rep. NAS-TR-0123-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA (January 2010)","DOI":"10.1007\/978-3-642-11957-6_18"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1145\/1375581.1375606","volume-title":"Proceedings of PLDI 2008","author":"S. McCamant","year":"2008","unstructured":"McCamant, S., Ernst, M.D.: Quantitative information flow as network flow capacity. In: Proceedings of PLDI 2008, pp. 193\u2013205. ACM, New York (2008)"},{"key":"18_CR18","volume-title":"Advanced Compiler Design and Implementation","author":"S.S. Muchnick","year":"1997","unstructured":"Muchnick, S.S.: Advanced Compiler Design and Implementation. Morgan Kaufmann, San Francisco (1997)"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Myers, A., Liskov, B.: Complete, safe information flow with decentralized labels. In: Proceedings of the IEEE Symposium on Security & Privacy, May 1998, pp. 186\u2013197 (1998)","DOI":"10.1109\/SECPRI.1998.674834"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: Practical mostly-static information flow control. In: Proceedings of POPL 1999, January 1999, pp. 228\u2013241 (1999)","DOI":"10.1145\/292540.292561"},{"issue":"3","key":"18_CR21","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1145\/1065887.1065892","volume":"27","author":"G.C. Necula","year":"2005","unstructured":"Necula, G.C., Condit, J., Harren, M., McPeak, S., Weimer, W.: CCured: type-safe retrofitting of legacy software. ACM Transactions on Programming Languages and Systems\u00a027(3), 477\u2013526 (2005)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"18_CR22","first-page":"319","volume-title":"Proceedings of POPL 2002","author":"F. Pottier","year":"2002","unstructured":"Pottier, F., Simonet, V.: Information flow inference for ML. In: Proceedings of POPL 2002, pp. 319\u2013330. ACM Press, New York (2002)"},{"issue":"2-3","key":"18_CR23","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S0167-6423(99)00011-8","volume":"35","author":"J. Rehof","year":"1999","unstructured":"Rehof, J., Mogensen, T.A.: Tractable constraints in finite semilattices. Science of Computer Programming\u00a035(2-3), 191\u2013221 (1999)","journal-title":"Science of Computer Programming"},{"key":"18_CR24","first-page":"255","volume-title":"CSFW 2005: Proceedings of the 18th IEEE Workshop on Computer Security Foundations","author":"A. Sabelfeld","year":"2005","unstructured":"Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. In: CSFW 2005: Proceedings of the 18th IEEE Workshop on Computer Security Foundations, pp. 255\u2013269. IEEE Computer Society, Los Alamitos (2005)"},{"key":"18_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/263699.263703","volume-title":"Proceedings of POPL 1997","author":"M. Shapiro","year":"1997","unstructured":"Shapiro, M., Horwitz, S.: Fast and accurate flow-insensitive points-to analysis. In: Proceedings of POPL 1997, pp. 1\u201314. ACM, New York (1997)"},{"issue":"1","key":"18_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/366378.366379","volume":"10","author":"F. Tip","year":"2001","unstructured":"Tip, F., Dinesh, T.B.: A slicing-based approach for locating type errors. ACM Trans. Softw. Eng. Methodol.\u00a010(1), 5\u201355 (2001)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"3","key":"18_CR27","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. Journal of Computer Security\u00a04(3), 167\u2013187 (1996)","journal-title":"Journal of Computer Security"},{"key":"18_CR28","unstructured":"Walsh, E.: Integrating X.Org with Security-Enhanced Linux. In: Proceedings of the Third Annual Security Enhanced Linux Symposium, March 2007, pp. 33\u201340 (2007)"},{"key":"18_CR29","unstructured":"Wheeler, D.A.: Software\/dbus, http:\/\/www.freedesktop.org\/wiki\/Software\/dbus"},{"key":"18_CR30","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3054.001.0001","volume-title":"The Formal Semantics of Programming Languages: An Introduction","author":"G. Winskel","year":"1993","unstructured":"Winskel, G.: The Formal Semantics of Programming Languages: An Introduction. MIT Press, Cambridge (1993)"},{"key":"18_CR31","unstructured":"Wright, C., Cowan, C., Morris, J., Smalley, S., Kroah-Hartman, G.: Linux security modules: General security support for the linux kernel. In: Proceedings of the 11th USENIX Security Symposium, August 2002, pp. 17\u201331 (2002)"},{"key":"18_CR32","unstructured":"Zhang, X., Edwards, A., Jaeger, T.: Using CQUAL for static analysis of authorization hook placement. In: Proceedings of the 11th USENIX Security Symposium, August 2002, pp. 33\u201348 (2002)"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11957-6_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:45:42Z","timestamp":1606185942000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11957-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642119569","9783642119576"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11957-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}