{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:12:24Z","timestamp":1725563544992},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642153747"},{"type":"electronic","value":"9783642153754"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15375-4_8","type":"book-chapter","created":{"date-parts":[[2010,8,20]],"date-time":"2010-08-20T18:04:18Z","timestamp":1282327458000},"page":"102-116","source":"Crossref","is-referenced-by-count":11,"title":["Information Flow in Interactive Systems"],"prefix":"10.1007","author":[{"given":"M\u00e1rio S.","family":"Alvim","sequence":"first","affiliation":[]},{"given":"Miguel E.","family":"Andr\u00e9s","sequence":"additional","affiliation":[]},{"given":"Catuscia","family":"Palamidessi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Alvim, M.S., Andr\u00e9s, M.E., Palamidessi, C.: Information Flow in Interactive Systems (2010), http:\/\/hal.archives-ouvertes.fr\/inria-00479672\/en\/","DOI":"10.1007\/978-3-642-15375-4_8"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/978-3-642-12002-2_32","volume-title":"TACAS 2010","author":"M.E. Andr\u00e9s","year":"2010","unstructured":"Andr\u00e9s, M.E., Palamidessi, C., van Rossum, P., Smith, G.: Computing the leakage of information-hiding systems. In: Esparza, J., Majumdar, R. (eds.) TACAS 2010. LNCS, vol.\u00a06015, pp. 373\u2013389. Springer, Heidelberg (2010)"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/1653662.1653673","volume-title":"Proc. of CCS","author":"A. Bohannon","year":"2009","unstructured":"Bohannon, A., Pierce, B.C., Sj\u00f6berg, V., Weirich, S., Zdancewic, S.: Reactive noninterference. In: Proc. of CCS, pp. 79\u201390. ACM, New York (2009)"},{"issue":"2-4","key":"8_CR4","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.ic.2007.07.003","volume":"206","author":"K. Chatzikokolakis","year":"2008","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Inf. and Comp.\u00a0206(2-4), 378\u2013401 (2008)","journal-title":"Inf. and Comp."},{"key":"8_CR5","series-title":"ENTCS","first-page":"149","volume-title":"Proc. of QAPL 2004","author":"D. Clark","year":"2005","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantified interference for a while language. In: Proc. of QAPL 2004. ENTCS, vol.\u00a0112, pp. 149\u2013166. Elsevier, Amsterdam (2005)"},{"key":"8_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T.M. Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. J. Wiley & Sons, Inc., Chichester (1991)"},{"key":"8_CR7","series-title":"ENTCS","first-page":"79","volume-title":"Proc. of QAPL","author":"Y. Deng","year":"2006","unstructured":"Deng, Y., Chothia, T., Palamidessi, C., Pang, J.: Metrics for action-labelled quantitative transition systems. In: Proc. of QAPL. ENTCS, vol.\u00a0153, pp. 79\u201396. Elsevier, Amsterdam (2006)"},{"key":"8_CR8","first-page":"413","volume-title":"Proc. of LICS","author":"J. Desharnais","year":"2002","unstructured":"Desharnais, J., Jagadeesan, R., Gupta, V., Panangaden, P.: The metric analogue of weak bisimulation for probabilistic processes. In: Proc. of LICS, pp. 413\u2013422. IEEE, Los Alamitos (2002)"},{"key":"8_CR9","unstructured":"Ebay website, http:\/\/www.ebay.com\/"},{"key":"8_CR10","unstructured":"Ebid website, http:\/\/www.ebid.net\/"},{"issue":"1","key":"8_CR11","first-page":"1","volume":"5","author":"L. Kantorovich","year":"1942","unstructured":"Kantorovich, L.: On the transfer of masses (in Russian). Doklady Akademii Nauk\u00a05(1), 1\u20134 (1942); Translated in Management Science 5(1), 1\u20134 (1958)","journal-title":"Doklady Akademii Nauk"},{"key":"8_CR12","first-page":"225","volume-title":"Proc. of POPL","author":"P. Malacaria","year":"2007","unstructured":"Malacaria, P.: Assessing security threats of looping constructs. In: Proc. of POPL, pp. 225\u2013235. ACM, New York (2007)"},{"key":"8_CR13","unstructured":"Massey, J.L.: Causality, feedback and directed information. In: Proc. of the 1990 Intl. Symposium on Information Theory and its Applications (1990)"},{"key":"8_CR14","unstructured":"Mercadolibre website, http:\/\/www.mercadolibre.com\/"},{"key":"8_CR15","unstructured":"Segala, R.: Modeling and Verification of Randomized Distributed Real-Time Systems. PhD thesis. Tech. Rep. MIT\/LCS\/TR-676 (1995)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-00596-1_21","volume-title":"Foundations of Software Science and Computational Structures","author":"G. Smith","year":"2009","unstructured":"Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol.\u00a05504, pp. 288\u2013302. Springer, Heidelberg (2009)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.J.: The cocaine auction protocol: On the power of anonymous broadcast. In: Information Hiding, pp. 434\u2013447 (1999)","DOI":"10.1007\/10719724_30"},{"key":"8_CR18","first-page":"204","volume-title":"Proc. of SRDS","author":"S. Subramanian","year":"1998","unstructured":"Subramanian, S.: Design and verification of a secure electronic auction protocol. In: Proc. of SRDS, pp. 204\u2013210. IEEE, Los Alamitos (1998)"},{"issue":"1","key":"8_CR19","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1109\/TIT.2008.2008147","volume":"55","author":"S. Tatikonda","year":"2009","unstructured":"Tatikonda, S., Mitter, S.K.: The capacity of channels with feedback. IEEE Transactions on Information Theory\u00a055(1), 323\u2013349 (2009)","journal-title":"IEEE Transactions on Information Theory"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/3-540-48224-5_35","volume-title":"Automata, Languages and Programming","author":"F. Breugel van","year":"2001","unstructured":"van Breugel, F., Worrell, J.: Towards quantitative verification of probabilistic transition systems. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol.\u00a02076, pp. 421\u2013432. Springer, Heidelberg (2001)"},{"issue":"1","key":"8_CR21","doi-asserted-by":"publisher","first-page":"8","DOI":"10.2307\/2977633","volume":"16","author":"W. Vickrey","year":"1961","unstructured":"Vickrey, W.: Counterspeculation, Auctions, and Competitive Sealed Tenders. The Journal of Finance\u00a016(1), 8\u201337 (1961)","journal-title":"The Journal of Finance"}],"container-title":["Lecture Notes in Computer Science","CONCUR 2010 - Concurrency Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15375-4_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:05:44Z","timestamp":1606187144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15375-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642153747","9783642153754"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15375-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}