{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:04Z","timestamp":1763467984955},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642124587"},{"type":"electronic","value":"9783642124594"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12459-4_8","type":"book-chapter","created":{"date-parts":[[2010,4,29]],"date-time":"2010-04-29T06:49:38Z","timestamp":1272523778000},"page":"96-110","source":"Crossref","is-referenced-by-count":13,"title":["Applied Quantitative Information Flow and Statistical Databases"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Heusser","sequence":"first","affiliation":[]},{"given":"Pasquale","family":"Malacaria","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Babi\u0107, D., Hutter, F.: Spear Theorem Prover. In: Proc. of the SAT 2008 Race (2008)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., K\u00f6pf, B., Rybalchenko, A.: Automatic Discovery and Quantification of Information Leaks. In: Proc. 30th IEEE Symposium on Security and Privacy, S& P 2009 (2009) (to appear)","DOI":"10.1109\/SP.2009.18"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Barthe, G., D\u2019Argenio, P.R., Rezk, T.: Secure Information Flow by Self-Composition. In: Proceedings of the 17th IEEE workshop on Computer Security Foundations CSFW (2004)","DOI":"10.1109\/CSFW.2004.1310735"},{"key":"8_CR4","unstructured":"Bayardo, R., Schrag, R.: Using CSP look-back techniques to solve real-world SAT instances. In: Proc. of AAAI 1997, pp. 203\u2013208. AAAI Press\/The MIT Press (1997)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security\u00a015(3) (2007)","DOI":"10.3233\/JCS-2007-15302"},{"issue":"2","key":"8_CR6","first-page":"181","volume":"18","author":"D. Clark","year":"2005","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation, Special Issue on Lambda-calculus, type theory and natural language\u00a018(2), 181\u2013199 (2005)","journal-title":"Journal of Logic and Computation, Special Issue on Lambda-calculus, type theory and natural language"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-540-24730-2_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E. Clarke","year":"2004","unstructured":"Clarke, E., Kroening, D., Lerda, F.: A Tool for Checking ANSI-C Programs. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 168\u2013176. Springer, Heidelberg (2004)"},{"key":"8_CR8","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1613\/jair.989","volume":"17","author":"A. Darwiche","year":"2002","unstructured":"Darwiche, A., Marquis, P.: A Knowledge Compilation Map. Journal of Artificial Intelligence Research\u00a017, 229\u2013264 (2002)","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"1","key":"8_CR9","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/320128.320138","volume":"5","author":"D.E. Denning","year":"1980","unstructured":"Denning, D.E., Schl\u0161rer, J.: A fast procedure for finding a tracker in a statistical database. ACM Transactions on Database Systems\u00a05(1), 88\u2013102 (1980)","journal-title":"ACM Transactions on Database Systems"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/320064.320068","volume":"4","author":"D. Dobkin","year":"1979","unstructured":"Dobkin, D., Jones, A.K., Lipton, R.J.: Secure databases: Protection against user influence. ACM Transactions on Database Systems\u00a04, 97\u2013106 (1979)","journal-title":"ACM Transactions on Database Systems"},{"key":"8_CR11","unstructured":"Chauhan, P., Clarke, E.M., Kroening, D.: Using SAT based Image Computation for Reachability. Carnegie Mellon University, Technical Report CMU-CS-03-151 (2003)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., Basin, D.: An information-theoretic model for adaptive side-channel attacks. In: Proceedings of the 14th ACM conference on Computer and communications security CCS 2007, pp. 286\u2013296 (2007)","DOI":"10.1145\/1315245.1315282"},{"key":"8_CR13","volume-title":"Proc. of the IEEE Computer Security Foundations Workshop","author":"J. Landauer","year":"1993","unstructured":"Landauer, J., Redmond, T.: A Lattice of Information. In: Proc. of the IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1993)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Malacaria, P.: Assessing security threats of looping constructs. In: Proc. ACM Symposium on Principles of Programming Language (2007)","DOI":"10.1145\/1190216.1190251"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Malacaria, P.: Risk Assessment of Security Threats for Looping Constructs. To appear in the Journal Of Computer Security (2009)","DOI":"10.3233\/JCS-2010-0360"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"443","DOI":"10.2996\/kmj\/1138846220","volume":"22","author":"Y. Nakamura","year":"1970","unstructured":"Nakamura, Y.: Entropy and Semivaluations on Semilattices. Kodai Math. Sem. Rep.\u00a022, 443\u2013468 (1970)","journal-title":"Kodai Math. Sem. Rep."},{"key":"8_CR17","unstructured":"McCamant, S.A.: Quantitative Information-Flow Tracking for Real Systems. MIT Department of Electrical Engineering and Computer Science, Ph.D., Cambridge, MA (2008)"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/11547662_24","volume-title":"Static Analysis","author":"T. Terauchi","year":"2005","unstructured":"Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol.\u00a03672, pp. 352\u2013367. Springer, Heidelberg (2005)"},{"issue":"5","key":"8_CR19","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12459-4_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:54:14Z","timestamp":1606186454000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12459-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642124587","9783642124594"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12459-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}