{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:13:44Z","timestamp":1725891224306},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642314995"},{"type":"electronic","value":"9783642315008"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31500-8_63","type":"book-chapter","created":{"date-parts":[[2012,7,3]],"date-time":"2012-07-03T11:09:08Z","timestamp":1341313748000},"page":"608-617","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Information Flow Control for Web Services"],"prefix":"10.1007","author":[{"given":"Bartosz","family":"Brodecki","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Kalewski","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Sasak","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Szychowiak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","unstructured":"Bell, D.E., LaPadula, L.: Secure computer systems. Tech. Rep. ESR-TR-73-278, Mitre Corporation (November 1973)"},{"key":"63_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/978-3-642-04409-0_57","volume-title":"Web Information Systems Engineering - WISE 2009","author":"B. Brodecki","year":"2009","unstructured":"Brodecki, B., Sasak, P., Szychowiak, M.: Security Policy Definition Framework for SOA-Based Systems. In: Vossen, G., Long, D.D.E., Yu, J.X. (eds.) WISE 2009. LNCS, vol.\u00a05802, pp. 589\u2013596. Springer, Heidelberg (2009)"},{"key":"63_CR3","unstructured":"ContentGuard: extensible rights markup language, XrML (2002), \n                    \n                      http:\/\/www.xrml.org\/reference.asp"},{"key":"63_CR4","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM\u00a019, 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"63_CR5","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and Privacy, p. 11 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"63_CR6","unstructured":"ISO\/IEC: Information technology - open systems interconnection - security frameworks for open systems: Access control framework (1966)"},{"key":"63_CR7","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1145\/571681.571683","volume":"27","author":"B. Li","year":"2002","unstructured":"Li, B.: Analyzing information-flow in java program based on slicing technique. SIGSOFT Softw. Eng. Notes\u00a027, 98\u2013103 (2002)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"63_CR8","unstructured":"MacKenzie, C.M., Laskey, K., McCabe, F., Brown, P., Metz, R.: Reference model for Service Oriented Architecture. OASIS Committee Draft 1.0, OASIS Open (2006)"},{"key":"63_CR9","unstructured":"Microsoft: Windows communication foundation, \n                    \n                      http:\/\/msdn.microsoft.com\/en-us\/netframework\/aa663324.aspx"},{"key":"63_CR10","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1145\/363516.363526","volume":"9","author":"A.C. Myers","year":"2000","unstructured":"Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol.\u00a09, 410\u2013442 (2000)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"63_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICWS.2009.13","volume-title":"Proceedings of the 2009 IEEE International Conference on Web Services, ICWS 2009","author":"W. She","year":"2009","unstructured":"She, W., Yen, I.L., Thuraisingham, B., Bertino, E.: The SCIFC Model for Information Flow Control in Web Service Composition. In: Proceedings of the 2009 IEEE International Conference on Web Services, ICWS 2009, pp. 1\u20138. IEEE Computer Society, Washington, DC, USA (2009)"},{"key":"63_CR12","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1145\/268946.268975","volume-title":"Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 1998","author":"G. Smith","year":"1998","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 1998, pp. 355\u2013364. ACM, New York (1998)"},{"key":"63_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/BFb0030629","volume-title":"TAPSOFT\u201997: Theory and Practice of Software Development","author":"D.M. Volpano","year":"1997","unstructured":"Volpano, D.M., Smith, G.: A Type-based Approach to Program Security. In: Bidoit, M., Dauchet, M. (eds.) CAAP\/FASE\/TAPSOFT 1997. LNCS, vol.\u00a01214, pp. 607\u2013621. Springer, Heidelberg (1997)"},{"key":"63_CR14","doi-asserted-by":"crossref","unstructured":"Westerinen, A., Schnizlein, J., Strassner, J., Scherling, M., Quinn, B., Herzog, S., Huynh, A., Carlson, M., Perry, J., Waldbusser, S.: Terminology for Policy-Based Management. RFC 3198 (Informational) (November 2001), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc3198.txt","DOI":"10.17487\/rfc3198"},{"key":"63_CR15","first-page":"1","volume":"30","author":"B. Xu","year":"2005","unstructured":"Xu, B., Qian, J., Zhang, X., Wu, Z., Chen, L.: A brief survey of program slicing. SIGSOFT Softw. Eng. Notes\u00a030, 1\u201336 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"63_CR16","doi-asserted-by":"crossref","unstructured":"Yildiz, U., Godart, C.: Information Flow Control with Decentralized Service Compositions. In: ICWS 2007, pp. 9\u201317. IEEE (2007)","DOI":"10.1109\/ICWS.2007.109"}],"container-title":["Lecture Notes in Computer Science","Parallel Processing and Applied Mathematics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31500-8_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:04:48Z","timestamp":1620115488000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31500-8_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642314995","9783642315008"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31500-8_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}