{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:24:21Z","timestamp":1725704661216},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642337598"},{"type":"electronic","value":"9783642337604"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33760-4_4","type":"book-chapter","created":{"date-parts":[[2012,11,4]],"date-time":"2012-11-04T18:48:32Z","timestamp":1352054912000},"page":"42-50","source":"Crossref","is-referenced-by-count":0,"title":["A Security Model for Functional Active Objects"],"prefix":"10.1007","author":[{"given":"Florian","family":"Kammueller","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Anderson, R.: Security Engineering \u2013 A Guide to Building Dependable Distributed Systems. Wiley (2001)"},{"issue":"5","key":"4_CR2","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: Lattice model of secure information flow. Communications of the ACM\u00a019(5), 236\u2013242 (1976)","journal-title":"Communications of the ACM"},{"key":"4_CR3","unstructured":"Fielding, R.T.: Architectural Styles and the Design of Network-based Software Architectures. PhD thesis, University of California, Irvine (2000)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Fleck, A., Kamm\u00fcller, F.: Implementing privacy with erlang active objects. In: 5th International Conference on Internet Monitoring and Protection, ICIMP 2010. IEEE (2010)","DOI":"10.1109\/ICIMP.2010.27"},{"key":"4_CR5","unstructured":"Gollmann, D.: Computer Security. McGraw-Hill (2008)"},{"issue":"4","key":"4_CR6","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1145\/4472.4478","volume":"7","author":"R.H. Halstead Jr.","year":"1985","unstructured":"Halstead Jr., R.H.: Multilisp: A language for concurrent symbolic computation. ACM Transactions on Programming Languages and Systems (TOPLAS)\u00a07(4), 501\u2013538 (1985)","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Heller, J.: Catch-22. Vintage (1994), 1961","DOI":"10.1097\/00000542-196105000-00008"},{"key":"4_CR8","first-page":"284","volume-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010","author":"W.R. Harris","year":"2010","unstructured":"Harris, W.R., Jha, S., Reps, T.: Difc programs by automatic instrumentation. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 284\u2013296. ACM, New York (2010)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Henrio, L., Kamm\u00fcller, F., Lutz, B.: Aspfun: A typed functional active object calculus. Science of Computer Programming (2011) (in print)","DOI":"10.1016\/j.scico.2010.12.008"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-19348-4_8","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"F. Kamm\u00fcller","year":"2011","unstructured":"Kamm\u00fcller, F.: Privacy Enforcement and Analysis for Functional Active Objects. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol.\u00a06514, pp. 93\u2013107. Springer, Heidelberg (2011)"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1145\/268998.266669","volume-title":"Proceedings of the Sixteenth ACM Symposium on Operating Systems Principles, SOSP 1997","author":"A.C. Myers","year":"1997","unstructured":"Myers, A.C., Liskov, B.: A decentralized model for information flow control. In: Proceedings of the Sixteenth ACM Symposium on Operating Systems Principles, SOSP 1997, pp. 129\u2013142. ACM, New York (1997)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: Jflow: Practical mostly-static information flow control. In: 26th ACM Symposium on Principles of Programming Languages, POPL 1999 (1999)","DOI":"10.1145\/292540.292561"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-45789-5_27","volume-title":"Static Analysis","author":"A. Sabelfeld","year":"2002","unstructured":"Sabelfeld, A., Mantel, H.: Securing Communication in a Concurrent Language. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 376\u2013394. Springer, Heidelberg (2002)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Weissmann, C.: Security controls in the ADEPT-50 timesharing system. In: AFIPS Conference, pp. 119\u2013133. FJCC (1969)","DOI":"10.1145\/1478559.1478574"}],"container-title":["Lecture Notes in Computer Science","Communicability, Computer Graphics and Innovative Design for Interactive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33760-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T16:30:44Z","timestamp":1643560244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33760-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642337598","9783642337604"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33760-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}