{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:19:43Z","timestamp":1745986783166,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642358890"},{"type":"electronic","value":"9783642358906"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35890-6_9","type":"book-chapter","created":{"date-parts":[[2013,1,11]],"date-time":"2013-01-11T03:45:00Z","timestamp":1357875900000},"page":"118-132","source":"Crossref","is-referenced-by-count":1,"title":["A Semi-lattice Model for Multi-lateral Security"],"prefix":"10.1007","author":[{"given":"Florian","family":"Kamm\u00fcller","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8598-9","volume-title":"A Theory of Objects","author":"M. Abadi","year":"1996","unstructured":"Abadi, M., Cardelli, L.: A Theory of Objects. Springer, New York (1996)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/BFb0084816","volume-title":"CONCUR \u201992","author":"G. Agha","year":"1992","unstructured":"Agha, G., Mason, I.A., Smith, S.F., Talcott, C.L.: Towards a Theory of Actor Computation (Extended Abstract). In: Cleaveland, W.R. (ed.) CONCUR 1992. LNCS, vol.\u00a0630, pp. 565\u2013579. Springer, Heidelberg (1992)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-642-12459-4_10","volume-title":"Formal Aspects in Security and Trust","author":"R. Alp\u00edzar","year":"2010","unstructured":"Alp\u00edzar, R., Smith, G.: Secure Information Flow for Distributed Systems. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol.\u00a05983, pp. 126\u2013140. Springer, Heidelberg (2010)"},{"key":"9_CR4","unstructured":"Anderson, R.: Security Engineering \u2013 A Guide to Building Dependable Distributed Systems. Wiley (2001)"},{"issue":"1","key":"9_CR5","first-page":"17","volume":"180","author":"I. Attali","year":"2007","unstructured":"Attali, I., Caromel, D., Henrio, L., Aguila, F.L.D.: Secured information flow for asynchronous sequential processes. ENTCS\u00a0180(1), 17\u201334 (2007)","journal-title":"ENTCS"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Naumann, D.A.: Stack-based access control for secure information flow. Journal of Functional Programming\u00a015(2) (2003)","DOI":"10.1017\/S0956796804005453"},{"issue":"1","key":"9_CR7","doi-asserted-by":"crossref","first-page":"69","DOI":"10.12921\/cmst.2006.12.01.69-77","volume":"12","author":"D. Caromel","year":"2006","unstructured":"Caromel, D., Delb\u00e9, C., di Costanzo, A., Leyton, M.: ProActive: an integrated platform for programming and running applications on grids and P2P systems. Computational Methods in Science and Technology\u00a012(1), 69\u201377 (2006)","journal-title":"Computational Methods in Science and Technology"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Caromel, D., Henrio, L., Serpette, B.P.: Asynchronous and deterministic objects. In: Principles of Programming Languages, POPL 2004. ACM Press (2004)","DOI":"10.1145\/964001.964012"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Davey, B.A., Priestley, H.A.: Introduction to Lattices and Order, 2nd edn. Cambridge University Press (2002)","DOI":"10.1017\/CBO9780511809088"},{"issue":"5","key":"9_CR10","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: Lattice model of secure information flow. Communications of the ACM\u00a019(5), 236\u2013242 (1976)","journal-title":"Communications of the ACM"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Communications of the ACM\u00a020(7) (1977)","DOI":"10.1145\/359636.359712"},{"key":"9_CR12","unstructured":"Fenton, J.S.: Information protection systems. PhD thesis, Univ. Cambridge (1973)"},{"key":"9_CR13","unstructured":"Fleck, A., Kamm\u00fcller, F.: A security model for functional active objects with an implementation in erlang. In: Computational Informatics, Blue Herons (2011)"},{"issue":"4","key":"9_CR14","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1145\/4472.4478","volume":"7","author":"R.H. Halstead Jr.","year":"1985","unstructured":"Halstead Jr., R.H.: Multilisp: A language for concurrent symbolic computation. ACM Transactions on Programming Languages and Systems\u00a07(4), 501\u2013538 (1985)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"7-8","key":"9_CR15","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1016\/j.scico.2010.12.008","volume":"77","author":"L. Henrio","year":"2012","unstructured":"Henrio, L., Kamm\u00fcller, F., Lutz, B.: Aspfun: A typed functional active object calculus. Science of Computer Programming\u00a077(7-8), 823\u2013847 (2012)","journal-title":"Science of Computer Programming"},{"issue":"2","key":"9_CR16","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.jal.2005.12.015","volume":"5","author":"D. Hutter","year":"2007","unstructured":"Hutter, D., Mantel, H., Schaefer, I., Schairer, A.: Security of multi-agent systems: A case study on comparison shopping. J. Applied Logic\u00a05(2), 303\u2013332 (2007)","journal-title":"J. Applied Logic"},{"key":"9_CR17","unstructured":"Kamm\u00fcller, F.: Using functional active objects to enforce privacy. In: 5th Conf. on Network Architectures and Information Systems Security, SAR-SSI 2010 (2010)"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-19348-4_8","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"F. Kamm\u00fcller","year":"2011","unstructured":"Kamm\u00fcller, F.: Privacy Enforcement and Analysis for Functional Active Objects. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol.\u00a06514, pp. 93\u2013107. Springer, Heidelberg (2011)"},{"key":"9_CR19","unstructured":"Kamm\u00fcller, F.: Information Flow Control for Functional Active Objects (May 2012), http:\/\/user.cs.tu-berlin.de\/~flokam\/proofs.pdf"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Kogan, B., Jajodia, S.: An audit model for object-oriented databases. In: 7th Annual Computer Security Applications Conf., ACSAC 1991, pp. 90\u201399 (1991)","DOI":"10.1109\/CSAC.1991.213015"},{"key":"9_CR21","first-page":"2003","volume":"11","author":"H. Mantel","year":"2002","unstructured":"Mantel, H., Sabelfeld, A.: A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security\u00a011, 2003 (2002)","journal-title":"J. Computer Security"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Myers, A.C., Liskov, B.: A decentralized model for information flow control. In: SOSP 1997. ACM (1997)","DOI":"10.1145\/268998.266669"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35890-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:51:14Z","timestamp":1745945474000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-35890-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642358890","9783642358906"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35890-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}