{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T05:36:01Z","timestamp":1740807361912,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":50,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642177132"},{"type":"electronic","value":"9783642177149"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17714-9_5","type":"book-chapter","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T13:27:24Z","timestamp":1291728444000},"page":"48-65","source":"Crossref","is-referenced-by-count":16,"title":["Unifying Facets of Information Integrity"],"prefix":"10.1007","author":[{"given":"Arnar","family":"Birgisson","sequence":"first","affiliation":[]},{"given":"Alejandro","family":"Russo","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-540-88313-5_22","volume-title":"Computer Security - ESORICS 2008","author":"A. Askarov","year":"2008","unstructured":"Askarov, A., Hunt, S., Sabelfeld, A., Sands, D.: Termination-insensitive noninterference leaks more than just a bit. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 333\u2013348. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Amtoft, T., Bandhakavi, S., Banerjee, A.: A logic for information flow in object-oriented programs. In: Proc. ACM Symp. on Principles of Programming Languages, pp. 91\u2013102 (2006)","key":"5_CR2","DOI":"10.1145\/1111037.1111046"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-642-11957-6_5","volume-title":"Programming Languages and Systems","author":"A. Askarov","year":"2010","unstructured":"Askarov, A., Myers, A.C.: A semantic framework for declassification and endorsement. In: Gordon, A.D. (ed.) Programming Languages and Systems. LNCS, vol.\u00a06012, pp. 64\u201384. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Askarov, A., Sabelfeld, A.: Gradual release: Unifying declassification, encryption and key release policies. In: Proc. IEEE Symp. on Security and Privacy, pp. 207\u2013221 (May 2007)","key":"5_CR4","DOI":"10.1109\/SP.2007.22"},{"doi-asserted-by":"crossref","unstructured":"Askarov, A., Sabelfeld, A.: Tight enforcement of information-release policies for dynamic languages. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)","key":"5_CR5","DOI":"10.1109\/CSF.2009.22"},{"doi-asserted-by":"crossref","unstructured":"Banerjee, A., Naumann, D., Rosenberg, S.: Expressive declassification policies and modular static enforcement. In: Proc. IEEE Symp. on Security and Privacy (May 2008)","key":"5_CR6","DOI":"10.1109\/SP.2008.20"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1017\/S0956796804005453","volume":"15","author":"A. Banerjee","year":"2005","unstructured":"Banerjee, A., Naumann, D.A.: Stack-based access control and secure information flow. Journal of Functional Programming\u00a015(2), 131\u2013177 (2005)","journal-title":"Journal of Functional Programming"},{"doi-asserted-by":"crossref","unstructured":"Barthe, G., D\u2019Argenio, P., Rezk, T.: Secure information flow by self-composition. In: Proc. IEEE Computer Security Foundations Workshop, pp. 100\u2013114 (June 2004)","key":"5_CR8","DOI":"10.1109\/CSFW.2004.1310735"},{"unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations. Technical Report MTR-2547, Vol. 1, MITRE Corp., Bedford, MA (1973)","key":"5_CR9"},{"unstructured":"Biba, K.J.: Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324) (April 1977)","key":"5_CR10"},{"key":"5_CR11","series-title":"Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/978-3-540-73986-9_7","volume-title":"Proc. Mathematical Methods, Models, and Architectures for Computer Networks Security","author":"G. Boudol","year":"2007","unstructured":"Boudol, G., Kolundzija, M.: Access-control and declassification. In: Proc. Mathematical Methods, Models, and Architectures for Computer Networks Security. Communications in Computer and Information Science, vol.\u00a01, pp. 85\u201398. Springer, Heidelberg (2007)"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-540-75987-4_10","volume-title":"Database Programming Languages","author":"J. Cheney","year":"2007","unstructured":"Cheney, J., Ahmed, A., Acar, U.: Provenance as dependency analysis. In: Arenas, M. (ed.) DBPL 2007. LNCS, vol.\u00a04797, pp. 138\u2013152. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Chong, S., Liu, J., Myers, A.C., Qi, X., Vikram, K., Zheng, L., Zheng, X.: Secure web applications via automatic partitioning. In: Proc. ACM Symp. on Operating System Principles, pp. 31\u201344 (October 2007)","key":"5_CR13","DOI":"10.1145\/1294261.1294265"},{"unstructured":"Chong, S., Vikram, K., Myers, A.C.: Sif: Enforcing confidentiality and integrity in web applications. In: Proc. USENIX Security Symposium, pp. 1\u201316 (August 2007)","key":"5_CR14"},{"doi-asserted-by":"crossref","unstructured":"Clark, D.D., Wilson, D.R.: A comparison of commercial and military computer security policies. In: Proc. IEEE Symp. on Security and Privacy, pp. 184\u2013193 (May 1987)","key":"5_CR15","DOI":"10.1109\/SP.1987.10001"},{"doi-asserted-by":"crossref","unstructured":"Clarkson, M., Schneider, F.B.: Quantification of integrity. In: Proc. IEEE Computer Security Foundations Symposium (July 2010)","key":"5_CR16","DOI":"10.1109\/CSF.2010.10"},{"key":"5_CR17","first-page":"297","volume-title":"Foundations of Secure Computation","author":"E.S. Cohen","year":"1978","unstructured":"Cohen, E.S.: Information transmission in sequential programs. In: DeMillo, R.A., Dobkin, D.P., Jones, A.K., Lipton, R.J. (eds.) Foundations of Secure Computation, pp. 297\u2013335. Academic Press, London (1978)"},{"unstructured":"Darvas, A., H\u00e4hnle, R., Sands, D.: A theorem proving approach to analysis of secure information flow. In: Proc. Workshop on Issues in the Theory of Security (April 2003)","key":"5_CR18"},{"issue":"5","key":"5_CR19","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Comm. of the ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Comm. of the ACM"},{"issue":"7","key":"5_CR20","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D.E. Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Comm. of the ACM"},{"unstructured":"Dima, C., Enea, C., Gramatovici, R.: Nondeterministic nointerference and deducible information flow. Technical Report 2006-01, University of Paris 12, LACL (2006)","key":"5_CR21"},{"unstructured":"Diserholt, A.: Providing integrity policies as a library in Haskell. Master Thesis, Chalmers University of Technology, Gothenburg (March 2010), http:\/\/www.cse.chalmers.se\/~russo\/albert.htm","key":"5_CR22"},{"doi-asserted-by":"crossref","unstructured":"Freeman, T., Pfenning, F.: Refinement types for ml. In: Proc. ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 268\u2013277 (1991)","key":"5_CR23","DOI":"10.1145\/113445.113468"},{"doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proc. IEEE Symp. on Security and Privacy, pp. 11\u201320 (April 1982)","key":"5_CR24","DOI":"10.1109\/SP.1982.10014"},{"key":"5_CR25","volume-title":"Computer Security","author":"D. Gollmann","year":"2006","unstructured":"Gollmann, D.: Computer Security, 2nd edn. Wiley, Chichester (2006)","edition":"2"},{"unstructured":"Guttman, J.: Invited tutorial: Integrity. Presentation at the Dagstuhl Seminar on Mobility, Ubiquity and Security (February 2007), http:\/\/www.dagstuhl.de\/07091\/ , Slides at, http:\/\/web.cs.wpi.edu\/~guttman\/","key":"5_CR26"},{"unstructured":"Haack, C., Poll, E., Schubert, A.: Explicit information flow properties in JML. In: Proc. WISSEC (2008)","key":"5_CR27"},{"doi-asserted-by":"crossref","unstructured":"Heintze, N., Riecke, J.G.: The SLam calculus: programming with secrecy and integrity. In: Proc. ACM Symp. on Principles of Programming Languages, pp. 365\u2013377 (January 1998)","key":"5_CR28","DOI":"10.1145\/268946.268976"},{"issue":"10","key":"5_CR29","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1145\/363235.363259","volume":"12","author":"C.A.R. Hoare","year":"1969","unstructured":"Hoare, C.A.R.: An axiomatic basis for computer programming. Comm. of the ACM\u00a012(10), 576\u2013580 (1969)","journal-title":"Comm. of the ACM"},{"unstructured":"LaPadula, L.J., Bell, D.E.: Secure computer systems: A mathematical model. Technical Report MTR-2547, Vol. 2, MITRE Corp., Bedford, MA (1973);","key":"#cr-split#-5_CR30.1"},{"doi-asserted-by":"crossref","unstructured":"Reprinted in J. of Computer Security 4(2-3), pp. 239???263 (1996)","key":"#cr-split#-5_CR30.2","DOI":"10.3233\/JCS-1996-42-308"},{"unstructured":"Li, P., Mao, Y., Zdancewic, S.: Information integrity policies. In: Workshop on Formal Aspects in Security and Trust, FAST 2003 (2003)","key":"5_CR31"},{"unstructured":"Li, P., Zdancewic, S.: Unifying confidentiality and integrity in downgrading policies. In: Workshop on Foundations of Computer Security, pp. 45\u201354 (June 2005)","key":"5_CR32"},{"doi-asserted-by":"crossref","unstructured":"Mayfield, T., Roskos, J.E., Welke, S.R., Boone, J.M., McDonald, C.W.: Integrity in automated information systems. Technical Report P-2316, Institute for Defense Analyses (1991)","key":"5_CR33","DOI":"10.21236\/ADA245555"},{"doi-asserted-by":"crossref","unstructured":"McLean, J.: A general theory of composition for trace sets closed under selective interleaving functions. In: Proc. IEEE Symp. on Security and Privacy, pp. 79\u201393 (May 1994)","key":"5_CR34","DOI":"10.1109\/RISP.1994.296590"},{"issue":"2","key":"5_CR35","doi-asserted-by":"publisher","first-page":"157","DOI":"10.3233\/JCS-2006-14203","volume":"14","author":"A.C. Myers","year":"2006","unstructured":"Myers, A.C., Sabelfeld, A., Zdancewic, S.: Enforcing robust declassification and qualified robustness. J. Computer Security\u00a014(2), 157\u2013196 (2006)","journal-title":"J. Computer Security"},{"unstructured":"Myers, A.C., Zheng, L., Zdancewic, S., Chong, S., Nystrom, N.: Jif: Java information flow. Software release (July 2001), http:\/\/www.cs.cornell.edu\/jif","key":"5_CR36"},{"unstructured":"Naumann, D.: Theory for software verification. Draft (January 2009), http:\/\/www.cs.stevens.edu\/~naumann\/pub\/theoryverif.pdf","key":"5_CR37"},{"key":"5_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/3-540-59293-8_221","volume-title":"TAPSOFT \u201995: Theory and Practice of Software Development","author":"P. \u00d8rb\u00e6k","year":"1995","unstructured":"\u00d8rb\u00e6k, P.: Can you trust your data? In: Mosses, P.D., Nielsen, M. (eds.) CAAP 1995, FASE 1995, and TAPSOFT 1995. LNCS, vol.\u00a0915, pp. 575\u2013590. Springer, Heidelberg (1995)"},{"issue":"6","key":"5_CR39","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1017\/S0956796897002906","volume":"7","author":"P. \u00d8rb\u00e6k","year":"1997","unstructured":"\u00d8rb\u00e6k, P., Palsberg, J.: Trust in the \u03bb-calculus. J. Functional Programming\u00a07(6), 557\u2013591 (1997)","journal-title":"J. Functional Programming"},{"key":"5_CR40","volume-title":"Security in Computing","author":"C.P. Pfleeger","year":"2006","unstructured":"Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 4th edn. Prentice Hall, Englewood Cliffs (2006)","edition":"4"},{"doi-asserted-by":"crossref","unstructured":"Russo, A., Sabelfeld, A.: Dynamic vs. static flow-sensitive security analysis. In: Proc. IEEE Computer Security Foundations Symposium (July 2010)","key":"5_CR41","DOI":"10.1109\/CSF.2010.20"},{"issue":"1","key":"5_CR42","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"5_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-540-37621-7_9","volume-title":"Software Security - Theories and Systems","author":"A. Sabelfeld","year":"2004","unstructured":"Sabelfeld, A., Myers, A.C.: A model for delimited information release. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds.) ISSS 2003. LNCS, vol.\u00a03233, pp. 174\u2013191. Springer, Heidelberg (2004)"},{"issue":"5","key":"5_CR44","doi-asserted-by":"publisher","first-page":"517","DOI":"10.3233\/JCS-2009-0352","volume":"17","author":"A. Sabelfeld","year":"2009","unstructured":"Sabelfeld, A., Sands, D.: Declassification: Dimensions and principles. J. Computer Security\u00a017(5), 517\u2013548 (2009)","journal-title":"J. Computer Security"},{"unstructured":"Sandhu, R.S.: On five definitions of data integrity. In: Proceedings of the IFIP WG11.3 Working Conference on Database Security VII, pp. 257\u2013267 (1994)","key":"5_CR45"},{"issue":"1","key":"5_CR46","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Transactions on Information and System Security\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"3","key":"5_CR47","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. Computer Security\u00a04(3), 167\u2013187 (1996)","journal-title":"J. Computer Security"},{"key":"5_CR48","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3054.001.0001","volume-title":"The Formal Semantics of Programming Languages: An Introduction","author":"G. Winskel","year":"1993","unstructured":"Winskel, G.: The Formal Semantics of Programming Languages: An Introduction. MIT Press, Cambridge (1993)"},{"doi-asserted-by":"crossref","unstructured":"Zdancewic, S., Myers, A.C.: Robust declassification. In: Proc. IEEE Computer Security Foundations Workshop, pp. 15\u201323 (June 2001)","key":"5_CR49","DOI":"10.1109\/CSFW.2001.930133"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17714-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T14:50:25Z","timestamp":1740754225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17714-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642177132","9783642177149"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17714-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}