{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:50:56Z","timestamp":1725562256453},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642152399"},{"type":"electronic","value":"9783642152405"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15240-5_25","type":"book-chapter","created":{"date-parts":[[2010,8,4]],"date-time":"2010-08-04T15:30:15Z","timestamp":1280935815000},"page":"340-354","source":"Crossref","is-referenced-by-count":2,"title":["A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis"],"prefix":"10.1007","author":[{"given":"Michele","family":"Boreale","sequence":"first","affiliation":[]},{"given":"David","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Gorla","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Aldini, A., Di Pierro, A.: A quantitative approach to noninterference for probabilistic systems. ENTC, vol. 99 (2004)","DOI":"10.1016\/j.entcs.2004.02.007"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Askarov, A., Sabelfeld, A.: Tight enforcement of information-release policies for dynamic languages. In: Proc. of IEEE CSF (2009)","DOI":"10.1109\/CSF.2009.22"},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/11555827_20","volume-title":"Computer Security \u2013 ESORICS 2005","author":"M. Backes","year":"2005","unstructured":"Backes, M.: Quantifying probabilistic information flow in computational reactive systems. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 336\u2013354. Springer, Heidelberg (2005)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Backes, M., Kopf, B., Ribalchenko, A.: Automatic discovery and quantification of information leaks. In: IEEE Symposium on Security and Privacy (2009)","DOI":"10.1109\/SP.2009.18"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-04081-8_11","volume-title":"CONCUR 2009 - Concurrency Theory","author":"F. Bonchi","year":"2009","unstructured":"Bonchi, F., Bonsangue, M.M., Rutten, J.J.M.M., Silva, A.: Deriving syntax and axioms for quantitative regular behaviours. In: Bravetti, M., Zavattaro, G. (eds.) CONCUR 2009. LNCS, vol.\u00a05710, pp. 146\u2013162. Springer, Heidelberg (2009)"},{"issue":"6","key":"25_CR6","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1016\/j.ic.2008.12.007","volume":"207","author":"M. Boreale","year":"2009","unstructured":"Boreale, M.: Quantifying information leakage in process calculi. Information and Computation\u00a0207(6), 699\u2013725 (2009)","journal-title":"Information and Computation"},{"issue":"1-3","key":"25_CR7","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1016\/j.tcs.2006.05.030","volume":"360","author":"M. Boreale","year":"2006","unstructured":"Boreale, M., Gadducci, F.: Processes as formal power series: A coinductive approach to denotational semantics. Theoretical Computer Science\u00a0360(1-3), 440\u2013458 (2006)","journal-title":"Theoretical Computer Science"},{"key":"25_CR8","unstructured":"Boreale, M., Clark, D., Gorla, D.: A Semiring-based Trace Semantics for Processes with Applications to Information Leakage Analysis. Extended version of the present paper, http:\/\/www.dsi.uniroma1.it\/~gorla\/papers"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-540-75336-0_18","volume-title":"Trustworthy Global Computing","author":"K. Chatzikokolakis","year":"2007","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. In: Montanari, U., Sannella, D., Bruni, R. (eds.) TGC 2006. LNCS, vol.\u00a04661, pp. 281\u2013300. Springer, Heidelberg (2007)"},{"issue":"5","key":"25_CR10","doi-asserted-by":"crossref","first-page":"531","DOI":"10.3233\/JCS-2008-0333","volume":"16","author":"K. Chatzikokolakis","year":"2008","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: On the bayes risk in information-hiding protocols. Journal of Computer Security\u00a016(5), 531\u2013571 (2008)","journal-title":"Journal of Computer Security"},{"key":"25_CR11","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1255329.1255335","volume-title":"Proc. of PLAS","author":"H. Chen","year":"2007","unstructured":"Chen, H., Malacaria, P.: Quantitative analysis of leakage for multi-threaded programs. In: Proc. of PLAS, pp. 31\u201340. ACM, New York (2007)"},{"key":"25_CR12","first-page":"189","volume-title":"Proc. of CCS","author":"S. Chong","year":"2004","unstructured":"Chong, S., Myers, A.C.: Security policies for downgrading. In: Proc. of CCS, pp. 189\u2013209. ACM, New York (2004)"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. ENTCS, vol. 59 (2002)","DOI":"10.1016\/S1571-0661(04)00290-7"},{"issue":"3","key":"25_CR14","doi-asserted-by":"crossref","first-page":"321","DOI":"10.3233\/JCS-2007-15302","volume":"15","author":"D. Clark","year":"2007","unstructured":"Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security\u00a015(3), 321\u2013371 (2007)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"25_CR15","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","volume":"3","author":"R. Focardi","year":"1995","unstructured":"Focardi, R., Gorrieri, R.: A classification of security properties for process algebras. Journal of Computer Security\u00a03(1), 5\u201333 (1995)","journal-title":"Journal of Computer Security"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Goguen, J., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and Privacy, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"25_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511569951","volume-title":"A Compositional Approach to Performance Modelling","author":"J. Hillston","year":"1996","unstructured":"Hillston, J.: A Compositional Approach to Performance Modelling. Cambridge University Press, Cambridge (1996)"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Kuich, W., Salomaa, A.: Semirings, automata, languages. Theoretical Computer Science\u00a05 (1986)","DOI":"10.1007\/978-3-642-69959-7_2"},{"key":"25_CR19","volume-title":"Proc. of CSFW","author":"G. Lowe","year":"2002","unstructured":"Lowe, G.: Quantifying information flow. In: Proc. of CSFW. IEEE, Los Alamitos (2002)"},{"key":"25_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/978-3-642-11145-7_17","volume-title":"ICICS 2009","author":"C. Mu","year":"2009","unstructured":"Mu, C.: Measuring information flow in reactive processes. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol.\u00a05927, pp. 211\u2013225. Springer, Heidelberg (2009)"},{"key":"25_CR21","volume-title":"Proc. of QAPL","author":"C. Mu","year":"2009","unstructured":"Mu, C., Clark, D.: An abstraction quantifying information flow over probabilistic semantics. In: Proc. of QAPL. Elsevier, Amsterdam (2009)"},{"key":"25_CR22","volume-title":"Proc. of ARES","author":"C. Mu","year":"2009","unstructured":"Mu, C., Clark, D.: Quantitative analysis of secure information flow via probabilistic semantics. In: Proc. of ARES. IEEE, Los Alamitos (2009)"},{"issue":"1-3","key":"25_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0304-3975(02)00895-2","volume":"308","author":"J.J.M.M. Rutten","year":"2003","unstructured":"Rutten, J.J.M.M.: Behavioural differential equations: a coinductive calculus of streams, automata, and power series. Theoretical Computer Science\u00a0308(1-3), 1\u201353 (2003)","journal-title":"Theoretical Computer Science"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE Journal on Selelcted Areas in Communications\u00a021(1) (2003)","DOI":"10.1109\/JSAC.2002.806121"},{"key":"25_CR25","first-page":"255","volume-title":"Proc. of CSFW","author":"A. Sabelfeld","year":"2005","unstructured":"Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. In: Proc. of CSFW, pp. 255\u2013269. IEEE, Los Alamitos (2005)"},{"key":"25_CR26","first-page":"144","volume-title":"Proc. IEEE Symp. on Security and Privacy","author":"J.T. Wittbold","year":"1990","unstructured":"Wittbold, J.T., Johnson, D.M.: Information flow in nondeterministic systems. In: Proc. IEEE Symp. on Security and Privacy, pp. 144\u2013161. IEEE, Los Alamitos (1990)"}],"container-title":["IFIP Advances in Information and Communication Technology","Theoretical Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15240-5_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T16:03:40Z","timestamp":1685721820000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15240-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642152399","9783642152405"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15240-5_25","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2010]]}}}