{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:19:24Z","timestamp":1725599964206},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642230813"},{"type":"electronic","value":"9783642230820"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23082-0_5","type":"book-chapter","created":{"date-parts":[[2011,8,9]],"date-time":"2011-08-09T04:24:32Z","timestamp":1312863872000},"page":"125-151","source":"Crossref","is-referenced-by-count":14,"title":["On Intransitive Non-interference in Some Models of Concurrency"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Gorrieri","sequence":"first","affiliation":[]},{"given":"Matteo","family":"Vernali","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"16","DOI":"10.4204\/EPTCS.51.2","volume":"51","author":"E. Best","year":"2010","unstructured":"Best, E., Darondeau, P., Gorrieri, R.: On the Decidability of Non Interference over Unbounded Petri Nets. EPTCS\u00a051, 16\u201333 (2010); Procs. SecCo 2010","journal-title":"EPTCS"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-540-27755-2_8","volume-title":"Lectures on Concurrency and Petri Nets","author":"N. Busi","year":"2004","unstructured":"Busi, N., Gorrieri, R.: A Survey on Non-Interference with Petri Nets. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) Lectures on Concurrency and Petri Nets. LNCS, vol.\u00a03098, pp. 328\u2013344. Springer, Heidelberg (2004)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-27793-4_1","volume-title":"Applications and Theory of Petri Nets 2004","author":"N. Busi","year":"2004","unstructured":"Busi, N., Gorrieri, R.: Positive Non-Interference in Elementary and Trace Nets. In: Cortadella, J., Reisig, W. (eds.) ICATPN 2004. LNCS, vol.\u00a03099, pp. 1\u201316. Springer, Heidelberg (2004)"},{"issue":"6","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1017\/S0960129509990120","volume":"19","author":"N. Busi","year":"2009","unstructured":"Busi, N., Gorrieri, R.: Structural Non-Interference in Elementary and Trace Nets. Mathematical Structures in Computer Science\u00a019(6), 1065\u20131090 (2009)","journal-title":"Mathematical Structures in Computer Science"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/CSFW.2004.1310741","volume-title":"Procs. 17th IEEE Computer Security Foundations Workshop (CSFW 2004)","author":"A. Bossi","year":"2004","unstructured":"Bossi, A., Piazza, C., Rossi, S.: Modelling Downgrading in Information Flow Security. In: Procs. 17th IEEE Computer Security Foundations Workshop (CSFW 2004), pp. 187\u2013201. IEEE Press, Los Alamitos (2004)"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/3-540-65306-6_14","volume-title":"Lectures on Petri Nets I: Basic Models","author":"J. Engelfriet","year":"1998","unstructured":"Engelfriet, J., Rozenberg, G.: Elementary Net Systems. In: Reisig, W., Rozenberg, G. (eds.) APN 1998. LNCS, vol.\u00a01491, pp. 12\u2013121. Springer, Heidelberg (1998)"},{"issue":"1","key":"5_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","volume":"3","author":"R. Focardi","year":"1995","unstructured":"Focardi, R., Gorrieri, R.: A Classification of Security Properties. Journal of Computer Security\u00a03(1), 5\u201333 (1995)","journal-title":"Journal of Computer Security"},{"issue":"9","key":"5_CR8","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/32.629493","volume":"23","author":"R. Focardi","year":"1997","unstructured":"Focardi, R., Gorrieri, R.: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering\u00a023(9), 550\u2013571 (1997)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-45608-2_6","volume-title":"Foundations of Security Analysis and Design","author":"R. Focardi","year":"2001","unstructured":"Focardi, R., Gorrieri, R.: Classification of Security Properties (Part I: Information Flow). In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 331\u2013396. Springer, Heidelberg (2001)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-01465-9_14","volume-title":"Formal Aspects in Security and Trust","author":"S. Frau","year":"2009","unstructured":"Frau, S., Gorrieri, R., Ferigato, C.: Structural Noninterference at Work: the Petri Net Security Checker. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol.\u00a05491, pp. 210\u2013225. Springer, Heidelberg (2009)"},{"issue":"6","key":"5_CR11","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TAC.2005.850643","volume":"50","author":"N.B. Hadj-Alouane","year":"2005","unstructured":"Hadj-Alouane, N.B., Lafrance, S., Lin, F., Mullins, J., Yeddes, M.M.: Characterizing Intransitive Noninterference for 3-Domain Security Policies With Observability. IEEE Transactions on Automatic Control\u00a050(6), 920\u2013925 (2005)","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"5","key":"5_CR12","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/TSMCB.2005.847749","volume":"35","author":"N.B. Hadj-Alouane","year":"2005","unstructured":"Hadj-Alouane, N.B., Lafrance, S., Lin, F., Mullins, J., Yeddes, M.M.: On the verification of intransitive noninterference in multilevel security. IEEE Transactions on Systems, Man, and Cybernetics, Part B\u00a035(5), 948\u2013958 (2005)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B"},{"issue":"2","key":"5_CR13","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/TSE.1987.226478","volume":"SE-13","author":"J.T. Haigh","year":"1987","unstructured":"Haigh, J.T., Young, W.D.: Extending the noninterference version of MLS for SAT. IEEE Trans. on Software Engineering\u00a0SE-13(2), 141\u2013150 (1987)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"5_CR14","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/SP.1982.10014","volume-title":"Proc. of Symposium on Security and Privacy (SSP 1982)","author":"J.A. Goguen","year":"1982","unstructured":"Goguen, J.A., Meseguer, J.: Security Policy and Security Models. In: Proc. of Symposium on Security and Privacy (SSP 1982), pp. 11\u201320. IEEE CS Press, Los Alamitos (1982)"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/SP.1984.10019","volume-title":"Proc. of Symposium on Security and Privacy (SSP 1984)","author":"J.A. Goguen","year":"1984","unstructured":"Goguen, J.A., Meseguer, J.: Unwinding and Inference Control. In: Proc. of Symposium on Security and Privacy (SSP 1984), pp. 75\u201386. IEEE CS Press, Los Alamitos (1984)"},{"issue":"11","key":"5_CR16","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/S0950-5849(03)00072-7","volume":"45","author":"S. Lafrance","year":"2003","unstructured":"Lafrance, S., Mullins, J.: Bisimulation-based Nondeterministic Admissible Interference and ita Applications to the Analysis of Cryptographic Protocols. Information and Software Technology\u00a045(11), 779\u2013790 (2003); Preliminary version in Electronic Notes in Theoretical Computer Science 61, 1\u201324 (2002)","journal-title":"Information and Software Technology"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-540-74835-9_16","volume-title":"Computer Security \u2013 ESORICS 2007","author":"R. Meyden van der","year":"2007","unstructured":"van der Meyden, R.: What, Indeed, Is Intransitive Noninterference? In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 235\u2013250. Springer, Heidelberg (2007)"},{"key":"5_CR18","volume-title":"Communication and Concurrency","author":"R. Milner","year":"1989","unstructured":"Milner, R.: Communication and Concurrency. Prentice-Hall, Englewood Cliffs (1989)"},{"key":"5_CR19","first-page":"1054","volume":"11","author":"J. Mullins","year":"2000","unstructured":"Mullins, J.: Nondeterministic Admissible Interference. Journal of Universal Computer Science\u00a011, 1054\u20131070 (2000)","journal-title":"Journal of Universal Computer Science"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/SECPRI.1995.398926","volume-title":"Proc. of IEEE Symposium on Security and Privacy (SSP 1995)","author":"S. Pinsky","year":"1995","unstructured":"Pinsky, S.: Absorbing Covers and Intransitive Noninterference. In: Proc. of IEEE Symposium on Security and Privacy (SSP 1995), pp. 102\u2013113. IEEE CS press, Los Alamitos (1995)"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/CSFW.2001.930132","volume-title":"Proc. of IEEE Computer Security Foundations Workshop (CSFW 2001)","author":"S. Pinsky","year":"2001","unstructured":"Pinsky, S., Zieglar, E.: Noninterference Equations for Nondeterministic Systems. In: Proc. of IEEE Computer Security Foundations Workshop (CSFW 2001), pp. 3\u201314. IEEE CS press, Los Alamitos (2001)"},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/CSFW.1999.779776","volume-title":"Proc. of 12th Computer Security Foundations Workshop (CSFW)","author":"A.W. Roscoe","year":"1999","unstructured":"Roscoe, A.W., Goldsmith, M.-H.: What is Intransitive Noninterference? In: Proc. of 12th Computer Security Foundations Workshop (CSFW), pp. 228\u2013238. IEEE CS Press, Los Alamitos (1999)"},{"key":"5_CR23","unstructured":"Rushby, J.: Noninterference, Transitivity, and Channel-control Security Policies. Technical Report CSL-92-02, SRI International (1992)"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45608-2_1","volume-title":"Foundations of Security Analysis and Design","author":"P.Y.A. Ryan","year":"2001","unstructured":"Ryan, P.Y.A.: Mathematical Models of Computer Security. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 1\u201362. Springer, Heidelberg (2001)"},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1109\/CSFW.1999.779775","volume-title":"Proc. of 12th Computer Security Foundations Workshop (CSFW)","author":"P.Y.A. Ryan","year":"1999","unstructured":"Ryan, P.Y.A., Schneider, S.: Process Algebra and Noninterference. In: Proc. of 12th Computer Security Foundations Workshop (CSFW), pp. 214\u2013227. IEEE CS Press, Los Alamitos (1999)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23082-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T00:31:04Z","timestamp":1592785864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23082-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642230813","9783642230820"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23082-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}