{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:39:28Z","timestamp":1725586768729},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214363"},{"type":"electronic","value":"9783642214370"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21437-0_18","type":"book-chapter","created":{"date-parts":[[2011,6,18]],"date-time":"2011-06-18T07:33:16Z","timestamp":1308382396000},"page":"215-230","source":"Crossref","is-referenced-by-count":0,"title":["Specifying Confidentiality in Circus"],"prefix":"10.1007","author":[{"given":"Michael J.","family":"Banks","sequence":"first","affiliation":[]},{"given":"Jeremy L.","family":"Jacob","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","first-page":"1136","volume-title":"Encyclopedia of Software Engineering","author":"J. McLean","year":"1994","unstructured":"McLean, J.: Security models. In: Marciniak, J. (ed.) Encyclopedia of Software Engineering, vol.\u00a02, pp. 1136\u20131145. John Wiley & Sons, Inc., Chichester (1994)"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45608-2_1","volume-title":"Foundations of Security Analysis and Design","author":"P. Ryan","year":"2001","unstructured":"Ryan, P.: Mathematical models of computer security. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 1\u201362. Springer, Heidelberg (2001)"},{"issue":"2-3","key":"18_CR3","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/s00165-003-0006-5","volume":"15","author":"A. Cavalcanti","year":"2003","unstructured":"Cavalcanti, A., Sampaio, A., Woodcock, J.: A refinement strategy for Circus. Formal Aspects of Computing\u00a015(2-3), 146\u2013181 (2003)","journal-title":"Formal Aspects of Computing"},{"key":"18_CR4","unstructured":"Oliveira, M.V.: Formal Derivation of State-Rich Reactive Programs using Circus. PhD thesis, Department of Computer Science, University of York (2005)"},{"issue":"1","key":"18_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00165-007-0052-5","volume":"21","author":"M. Oliveira","year":"2009","unstructured":"Oliveira, M., Cavalcanti, A., Woodcock, J.: A UTP semantics for Circus. Formal Aspects of Computing\u00a021(1), 3\u201332 (2009)","journal-title":"Formal Aspects of Computing"},{"key":"18_CR6","series-title":"International Series in Computer Science","volume-title":"Unifying Theories of Programming","author":"C.A.R. Hoare","year":"1998","unstructured":"Hoare, C.A.R., He, J.: Unifying Theories of Programming. International Series in Computer Science. Prentice Hall Inc., Englewood Cliffs (1998)"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1049\/iet-ifs:20080069","volume":"3","author":"F. Seehusen","year":"2009","unstructured":"Seehusen, F., St\u00f8len, K.: Information flow security, abstraction and composition. IET Information Security\u00a03(1), 9\u201333 (2009)","journal-title":"IET Information Security"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-642-16690-7_5","volume-title":"Unifying Theories of Programming","author":"M.J. Banks","year":"2010","unstructured":"Banks, M.J., Jacob, J.L.: Unifying theories of confidentiality. In: Qin, S. (ed.) UTP 2010. LNCS, vol.\u00a06445, pp. 120\u2013136. Springer, Heidelberg (2010)"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1109\/SECPRI.1989.36298","volume-title":"Proceedings of the 1989 IEEE Symposium on Security and Privacy","author":"J.L. Jacob","year":"1989","unstructured":"Jacob, J.L.: On the derivation of secure components. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 242\u2013247. IEEE Computer Society, Los Alamitos (1989)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Jacob, J.L.: Security specifications. In: Proceedings of the 1988 IEEE Symposium on Security and Privacy, pp. 14\u201323 (1988)","DOI":"10.1109\/SECPRI.1988.8094"},{"key":"18_CR11","unstructured":"Mantel, H.: A Uniform Framework for the Formal Specification and Verification of Information Flow Security. PhD thesis, Universit\u00e4t Saarbr\u00fccken (July 2003)"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/SP.1984.10019","volume-title":"Proceedings of the 1984 IEEE Symposium on Security and Privacy","author":"J.A. Goguen","year":"1984","unstructured":"Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: Proceedings of the 1984 IEEE Symposium on Security and Privacy, pp. 75\u201386. IEEE Computer Society, Los Alamitos (1984)"},{"issue":"8","key":"18_CR13","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1016\/j.scico.2007.09.003","volume":"74","author":"C. Morgan","year":"2009","unstructured":"Morgan, C.: The shadow knows: Refinement and security in sequential programs. Science of Computer Programming\u00a074(8), 629\u2013653 (2009)","journal-title":"Science of Computer Programming"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Morgan, C.: Compositional noninterference from first principles. Formal Aspects of Computing (to appear)","DOI":"10.1007\/s00165-010-0167-y"},{"issue":"2","key":"18_CR15","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.entcs.2005.04.033","volume":"137","author":"J.A. Clark","year":"2005","unstructured":"Clark, J.A., Stepney, S., Chivers, H.: Breaking the model: Finalisation and a taxonomy of security attacks. Electronic Notes in Theoretical Computer Science\u00a0137(2), 225\u2013242 (2005)","journal-title":"Electronic Notes in Theoretical Computer Science"}],"container-title":["Lecture Notes in Computer Science","FM 2011: Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21437-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T02:19:11Z","timestamp":1553825951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21437-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214363","9783642214370"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21437-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}