{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:09:43Z","timestamp":1725577783172},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642193477"},{"type":"electronic","value":"9783642193484"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19348-4_8","type":"book-chapter","created":{"date-parts":[[2011,2,11]],"date-time":"2011-02-11T05:50:20Z","timestamp":1297403420000},"page":"93-107","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Enforcement and Analysis for Functional Active Objects"],"prefix":"10.1007","author":[{"given":"Florian","family":"Kamm\u00fcller","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8598-9","volume-title":"A Theory of Objects","author":"M. Abadi","year":"1996","unstructured":"Abadi, M., Cardelli, L.: A Theory of Objects. Springer, New York (1996)"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-540-69166-2_3","volume-title":"Static Analysis","author":"J. Bauer","year":"2008","unstructured":"Bauer, J., Nielson, F., Riis-Nielson, H., Pilegaard, H.: Relational analysis of correlation. In: Alpuente, M., Vidal, G. (eds.) SAS 2008. LNCS, vol.\u00a05079, pp. 32\u201346. Springer, Heidelberg (2008)"},{"key":"8_CR3","volume-title":"A Theory of Distributed Objects","author":"D. Caromel","year":"2005","unstructured":"Caromel, D., Henrio, L.: A Theory of Distributed Objects. Springer, New York (2005)"},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","volume":"3","author":"R. Focardi","year":"1995","unstructured":"Focardi, R., Gorrieri, R.: A classification of security properties for process algebras. Journal of Computer Security\u00a03(1), 5\u201333 (1995)","journal-title":"Journal of Computer Security"},{"key":"8_CR5","volume-title":"5th International Conference on Internet Monitoring and Protection, ICIMP 2010","author":"A. Fleck","year":"2010","unstructured":"Fleck, A., Kamm\u00fcller, F.: Implementing privacy with erlang active objects. In: 5th International Conference on Internet Monitoring and Protection, ICIMP 2010. IEEE, Los Alamitos (2010)"},{"key":"8_CR6","series-title":"ENTCS","volume-title":"8th International Workshop on the Foundations of Coordination Languages and Software Architectures, FOCLASA 2009","author":"L. Henrio","year":"2009","unstructured":"Henrio, L., Kamm\u00fcller, F.: Functional active objects: Typing and formalisation. In: 8th International Workshop on the Foundations of Coordination Languages and Software Architectures, FOCLASA 2009. ENTCS. Elsevier, Amsterdam (2009); Also invited for journal publication in Science of Computer Programming, Elsevier"},{"key":"8_CR7","unstructured":"Kamm\u00fcller, F.: Using functional active objects to enforce privacy. In: 5th Conf. on Network Architectures and Information Systems Security, SAR-SSI 2010 (2010)"},{"key":"8_CR8","first-page":"185","volume-title":"Computer Security Foundations Workshop","author":"H. Mantel","year":"2000","unstructured":"Mantel, H.: Possibilistic definitions of security \u2013 an assembly kit. In: Computer Security Foundations Workshop, pp. 185\u2013199. IEEE, Los Alamitos (2000)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Mantel, H.: On the composition of secure systems. In: Symposium on Security and Privacy (2002)","DOI":"10.1109\/SECPRI.2002.1004364"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1145\/363516.363526","volume":"9","author":"A.C. Myers","year":"2000","unstructured":"Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology\u00a09, 410\u2013442 (2000)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: Jflow: Practical mostly-static information flow control. In: 26th ACM Symposium on Principles of Programming Languages, POPL 1999 (1999)","DOI":"10.1145\/292540.292561"},{"key":"8_CR12","unstructured":"ProActive API and environment (2008), \n                    \n                      http:\/\/www.inria.fr\/oasis\/proactive\n                    \n                    \n                   (under LGPL)"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. Selected Areas in Communications\u00a021, 5\u201319 (2003)","journal-title":"Selected Areas in Communications"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Zheng, L., Myers, A.C.: Dynamic security labels and static information flow control. International Journal of Information Security\u00a06(2-3) (2007)","DOI":"10.1007\/s10207-007-0019-9"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19348-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,24]],"date-time":"2019-03-24T04:43:30Z","timestamp":1553402610000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19348-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642193477","9783642193484"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19348-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}