{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:47:56Z","timestamp":1725893276781},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642294198"},{"type":"electronic","value":"9783642294204"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29420-4_4","type":"book-chapter","created":{"date-parts":[[2012,6,25]],"date-time":"2012-06-25T09:12:33Z","timestamp":1340615553000},"page":"55-69","source":"Crossref","is-referenced-by-count":3,"title":["On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information Flow"],"prefix":"10.1007","author":[{"given":"Luciano","family":"Bello","sequence":"first","affiliation":[]},{"given":"Eduardo","family":"Bonelli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Venkatakrishnan, V.N., Xu, W., Duvarney, D.C., Sekar, R.: Provably correct runtime enforcement of non-interference properties. In: International Conference on Information and Communication Security, pp. 332\u2013351 (2006)","DOI":"10.1007\/11935308_24"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-540-77505-8_7","volume-title":"Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues","author":"G.L. Guernic","year":"2008","unstructured":"Guernic, G.L., Banerjee, A., Jensen, T.P., Schmidt, D.A.: Automata-Based Confidentiality Monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol.\u00a04435, pp. 75\u201389. Springer, Heidelberg (2008)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Guernic, G.L.: Automaton-based confidentiality monitoring of concurrent programs. In: Computer Security Foundations Workshop, pp. 218\u2013232 (2007)","DOI":"10.1109\/CSF.2007.10"},{"key":"4_CR5","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/CSF.2007.20","volume-title":"Proceedings of the 20th IEEE Computer Security Foundations Symposium","author":"P. Shroff","year":"2007","unstructured":"Shroff, P., Smith, S., Thober, M.: Dynamic dependency monitoring to secure information flow. In: Proceedings of the 20th IEEE Computer Security Foundations Symposium, pp. 203\u2013217. IEEE Computer Society, Washington, DC, USA (2007)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Mccamant, S., Ernst, M.D.: Quantitative information flow as network flow capacity. In: SIGPLAN Conference on Programming Language Design and Implementation, pp. 193\u2013205 (2008)","DOI":"10.1145\/1379022.1375606"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Russo, A.: From dynamic to static and back: Riding the roller coaster of information-flow control research. In: Ershov. Memorial Conf., pp. 352\u2013365 (2009)","DOI":"10.1007\/978-3-642-11486-1_30"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: SIGPLAN Conference on Programming Language Design and Implementation, pp. 113\u2013124 (2009)","DOI":"10.1145\/1667209.1667220"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Askarov, A., Sabelfeld, A.: Tight enforcement of information-release policies for dynamic languages. In: Computer Security Foundations Workshop, pp. 43\u201359 (2009)","DOI":"10.1109\/CSF.2009.22"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Volpano, D.M., Irvine, C.E., Smith, G.: A sound type system for secure flow analysis. Journal of Computer Security\u00a04, 167\u2013188","DOI":"10.3233\/JCS-1996-42-304"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/CSF.2010.20","volume-title":"Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium, CSF 2010","author":"A. Russo","year":"2010","unstructured":"Russo, A., Sabelfeld, A.: Dynamic vs. static flow-sensitive security analysis. In: Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium, CSF 2010, pp. 186\u2013199. IEEE Computer Society, Washington, DC, USA (2010)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Hunt, S., Sands, D.: On flow-sensitive security types. In: Morrisett, J.G., Jones, S.L.P. (eds.) POPL, pp. 79\u201390. ACM (2006)","DOI":"10.1145\/1111320.1111045"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/1667209.1667223","volume":"44","author":"T.H. Austin","year":"2009","unstructured":"Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. SIGPLAN Not.\u00a044, 20\u201331 (2009)","journal-title":"SIGPLAN Not."},{"key":"4_CR14","volume-title":"Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS 2010","author":"T.H. Austin","year":"2010","unstructured":"Austin, T.H., Flanagan, C.: Permissive dynamic information flow analysis. In: Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS 2010, pp. 3:1\u20133:12. ACM, New York (2010)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Chudnov, A., Naumann, D.A.: Information flow monitor inlining. In: Computer Security Foundations Workshop, pp. 200\u2013214 (2010)","DOI":"10.1109\/CSF.2010.21"},{"key":"4_CR16","unstructured":"Futoransky, A., Gutesman, E., Waissbein, A.: A dynamic technique for enhancing the security and privacy of web applications. In: Black Hat USA 2007 Briefings, August 1-2, Las Vegas, NV, USA (2007)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Dhawan, M., Ganapathy, V.: Analyzing information flow in javascript-based browser extensions. In: Annual Comp. Sec. App. Conference, pp. 382\u2013391 (2009)","DOI":"10.1109\/ACSAC.2009.43"},{"key":"4_CR18","unstructured":"Erlingsson, U.: The Inlined Reference Monitor Approach to Security Policy Enforcement. PhD thesis, Department of Computer Science, Cornell University (2003) TR 2003-1916"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Magazinius, J., Russo, R., Sabelfeld, A.: On-the-fly inlining of dynamic security monitors. In: Proc. IFIP International Information Security Conference (2010)","DOI":"10.1007\/978-3-642-15257-3_16"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Chugh, R., Meister, J.A., Jhala, R., Lerner, S.: Staged information flow for javascript. In: SIGPLAN Conference on Programming Language Design and Implementation, pp. 50\u201362 (2009)","DOI":"10.1145\/1543135.1542483"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Security and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29420-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:32:58Z","timestamp":1558297978000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29420-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642294198","9783642294204"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29420-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}