{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:43Z","timestamp":1763468083342},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642300646"},{"type":"electronic","value":"9783642300653"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30065-3_11","type":"book-chapter","created":{"date-parts":[[2012,6,27]],"date-time":"2012-06-27T13:10:08Z","timestamp":1340802608000},"page":"179-196","source":"Crossref","is-referenced-by-count":3,"title":["Transactional Correctness for Secure Nested Transactions"],"prefix":"10.1007","author":[{"given":"Dominic","family":"Duggan","sequence":"first","affiliation":[]},{"given":"Ye","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Atluri, V., Jajodia, S., George, B.: Multilevel Secure Transaction Processing. Kluwer Academic Publishers (1999)","DOI":"10.1007\/978-1-4615-4553-8"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1145\/503339.503340","volume":"4","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Catania, B., Ferrari, E.: A nested transaction model for multilevel secure database management systems. ACM Trans. Inf. Syst. Secur.\u00a04, 321\u2013370 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Birgisson, A., Erlingsson, \u00da.: An implementation and semantics for transactional memory introspection in haskell. In: PLAS, pp. 87\u201399 (2009)","DOI":"10.1145\/1554339.1554350"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-540-24597-1_4","volume-title":"FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science","author":"A. Black","year":"2003","unstructured":"Black, A., Cremet, V., Guerraoui, R., Odersky, M.: An Equational Theory for Transactions. In: Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. LNCS, vol.\u00a02914, pp. 38\u201349. Springer, Heidelberg (2003)"},{"issue":"1-2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0304-3975(02)00010-5","volume":"281","author":"G. Boudol","year":"2002","unstructured":"Boudol, G., Castellani, I.: Noninterference for concurrent programs and thread systems. Theor. Comput. Sci.\u00a0281(1-2), 109\u2013130 (2002)","journal-title":"Theor. Comput. Sci."},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-01465-9_21","volume-title":"Formal Aspects in Security and Trust","author":"A. Cohen","year":"2009","unstructured":"Cohen, A., van der Meyden, R., Zuck, L.D.: Access Control and Information Flow in Transactional Memory. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol.\u00a05491, pp. 316\u2013330. Springer, Heidelberg (2009)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Duggan, D., Wu, Y.: Security correctness for secure nested transactions. Technical Report, Stevens Institute of Technology (2012)","DOI":"10.1007\/978-3-642-30065-3_11"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Duggan, D., Wu, Y.: Transactional correctness for secure nested transactions. Technical report, Stevens Institute of Technology (2012)","DOI":"10.1007\/978-3-642-30065-3_11"},{"key":"11_CR9","unstructured":"Eppinger, J., Mummert, L., Spector, A. (eds.): Camelot and Avalon: A Distributed Transaction Facility. Morgan Kaufmann (1993)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Harris, T., Marlow, S., Peyton-Jones, S., Herlihy, M.: Composable memory transactions. In: ACM Conference on Principles and Practice of Parallel Programming (2005)","DOI":"10.1145\/1065944.1065952"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Igarashi, A., Pierce, B., Wadler, P.: Featherweight Java: A core calculus for Java and GJ. In: Proceedings of ACM Symposium on Object-Oriented Programming: Systems, Languages and Applications, Denver, CO. ACM Press (1999)","DOI":"10.1145\/320384.320395"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Jagannathan, S., Vitek, J., Welc, A., Hosking, A.: A transactional object calculus. Science of Computer Programming (2005)","DOI":"10.1016\/j.scico.2005.03.001"},{"key":"11_CR13","unstructured":"Kobayashi, N.: Type-based information flow analysis for the pi-calculus. Acta Informatica (2003)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Liskov, B.: Distributed programming in Argus. Communications of the ACM\u00a031(3) (March 1988)","DOI":"10.1145\/42392.42399"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Moore, K., Grossman, D.: High-level small-step operational semantics for transactions. In: Proceedings of ACM Symposium on Principles of Programming Languages (2008)","DOI":"10.1145\/1328438.1328448"},{"key":"11_CR16","unstructured":"Moss, J.E.B.: Nested Transactions: An Approach to Reliable Distributed Computing. MIT Press (1985)"},{"key":"11_CR17","unstructured":"Rushby, J.M.: Noninterference, transitivity and channel-control security policies. Technical report, SRI (1992)"},{"key":"11_CR18","unstructured":"Sabelfeld, A.: Semantic Models for the Security of Sequential and Concurrent Programs. PhD thesis, Chalmers University of Technology and Gothenburg University, Gothenburg, Sweden (May 2001)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proceedings of ACM Symposium on Principles of Programming Languages, pp. 19\u201321 (1998)","DOI":"10.1145\/268946.268975"},{"key":"11_CR20","unstructured":"Spector, A., Swedlow, K.: Guide to the Camelot distributed transaction facility: Release 1. Technical report, Carnegie Mellon University (1987)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Wojciechowski, P.: Isolation-only transactions by typing and versioning. In: ACM Conference on Principles and Practice of Declarative Programming (2005)","DOI":"10.1145\/1069774.1069781"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30065-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T15:00:18Z","timestamp":1578495618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30065-3_11"}},"subtitle":["(Extended Abstract)"],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642300646","9783642300653"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30065-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}