{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:33:52Z","timestamp":1760783632450,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642358890"},{"type":"electronic","value":"9783642358906"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35890-6_13","type":"book-chapter","created":{"date-parts":[[2013,1,11]],"date-time":"2013-01-11T03:45:00Z","timestamp":1357875900000},"page":"174-186","source":"Crossref","is-referenced-by-count":2,"title":["Evaluation of Jif and Joana as Information Flow Analyzers in a Model-Driven Approach"],"prefix":"10.1007","author":[{"given":"Kuzman","family":"Katkalov","sequence":"first","affiliation":[]},{"given":"Peter","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Stenzel","sequence":"additional","affiliation":[]},{"given":"Nina","family":"Moebius","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"Reif","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/3-540-46428-X_25","volume-title":"Fundamental Approaches to Software Engineering","author":"M. Balser","year":"2000","unstructured":"Balser, M., Reif, W., Schellhorn, G., Stenzel, K., Thums, A.: Formal System Development with KIV. In: Maibaum, T. (ed.) FASE 2000. LNCS, vol.\u00a01783, pp. 363\u2013366. Springer, Heidelberg (2000)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Binkley, D., Harman, M., Krinke, J.: Empirical study of optimization techniques for massive slicing. ACM Trans. Program. Lang. Syst.\u00a030 (November 2007)","DOI":"10.1145\/1290520.1290523"},{"key":"13_CR3","first-page":"21","volume-title":"Proceedings of the 20th USENIX Conference on Security, SEC 2011","author":"W. Enck","year":"2011","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, p. 21. USENIX Association, Berkeley (2011)"},{"key":"13_CR4","first-page":"627","volume-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011","author":"A.P. Felt","year":"2011","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 627\u2013638. ACM, New York (2011)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Fischer, P., Katkalov, K., Stenzel, K., Reif, W.: Formal Verification of Information Flow Secure Systems with IFlow. Technical Report 2012-05, Universit\u00e4t Augsburg (2012), http:\/\/www.informatik.uni-augsburg.de\/lehrstuehle\/swt\/se\/publications\/","DOI":"10.1109\/SocialCom.2013.14"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-642-11747-3_4","volume-title":"Engineering Secure Software and Systems","author":"C. Hammer","year":"2010","unstructured":"Hammer, C.: Experiences with PDG-Based IFC. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol.\u00a05965, pp. 44\u201360. Springer, Heidelberg (2010)"},{"issue":"6","key":"13_CR7","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10207-009-0086-1","volume":"8","author":"C. Hammer","year":"2006","unstructured":"Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. International Journal of Information Security\u00a08(6), 399\u2013422 (2006); Supersedes ISSSE and ISoLA 2006","journal-title":"International Journal of Information Security"},{"issue":"4","key":"13_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/54289.871709","volume":"22","author":"N. Hardy","year":"1988","unstructured":"Hardy, N.: The confused deputy: (or why capabilities might have been invented). SIGOPS Oper. Syst. Rev.\u00a022(4), 36\u201338 (1988)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Katkalov, K., Fischer, P., Stenzel, K., Reif, W.: Model-Driven Code Generation of Information Flow Secure Systems with IFlow. Technical Report 2012-04, Universit\u00e4t Augsburg (2012), http:\/\/www.informatik.uni-augsburg.de\/lehrstuehle\/swt\/se\/publications\/","DOI":"10.1109\/SocialCom.2013.14"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. In: Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], pp. 89\u2013116 (2003)","DOI":"10.1109\/FITS.2003.1264929"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Preibusch, S.: Information flow control for static enforcement of user-defined privacy policies. In: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp. 133\u2013136 (June 2011)","DOI":"10.1109\/POLICY.2011.23"},{"key":"13_CR12","unstructured":"Schlegel, R., Zhang, K., Yong Zhou, X., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: A stealthy and context-aware sound trojan for smartphones. In: NDSS. The Internet Society (2011)"},{"issue":"4","key":"13_CR13","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1145\/1178625.1178628","volume":"15","author":"G. Snelting","year":"2006","unstructured":"Snelting, G., Robschink, T., Krinke, J.: Efficient path conditions in dependence graphs for software safety analysis. ACM Transactions on Software Engineering and Methodology\u00a015(4), 410\u2013457 (2006)","journal-title":"ACM Transactions on Software Engineering and Methodology"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35890-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:51:12Z","timestamp":1745945472000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-35890-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642358890","9783642358906"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35890-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}