{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:49:55Z","timestamp":1725752995828},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642412011"},{"type":"electronic","value":"9783642412028"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41202-8_1","type":"book-chapter","created":{"date-parts":[[2013,10,21]],"date-time":"2013-10-21T01:11:19Z","timestamp":1382317879000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["Lattices of Information for Security: Deterministic, Demonic, Probabilistic"],"prefix":"10.1007","author":[{"given":"Carroll C.","family":"Morgan","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Alvim, M., Chatzikokolakis, K., Palamidessi, C., Smith, G.: Measuring information leakage using generalized gain functions. In: Proc. 25th IEEE CSF, pp. 265\u2013279 (2012)","DOI":"10.1109\/CSF.2012.26"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Goguen, J., Meseguer, J.: Unwinding and inference control. In: Proc. IEEE Symp. on Security and Privacy, pp. 75\u201386. IEEE Computer Society (1984)","DOI":"10.1109\/SP.1984.10019"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1145\/1315245.1315282","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007","author":"B. K\u00f6pf","year":"2007","unstructured":"K\u00f6pf, B., Basin, D.: An information-theoretic model for adaptive side-channel attacks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 286\u2013296. ACM, New York (2007), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/1315245.1315282"},{"key":"1_CR4","unstructured":"Landauer, J., Redmond, T.: A lattice of information. In: Gray, J.W. (ed.) Proc. CSFW 1993. IEEE Computer Society Press (1993)"},{"key":"1_CR5","unstructured":"Malacaria, P.: Algebraic foundations for information theoretical, probabilistic and guessability measures of information flow. CoRR, vol. abs\/1101.3453 (2011)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-14162-1_19","volume-title":"Automata, Languages and Programming","author":"A. McIver","year":"2010","unstructured":"McIver, A., Meinicke, L., Morgan, C.: Compositional closure for Bayes Risk in probabilistic noninterference. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol.\u00a06199, pp. 223\u2013235. Springer, Heidelberg (2010), Full version available at [7]"},{"key":"1_CR7","unstructured":"McIver, A., Meinicke, L., Morgan, C.: Compositional closure for Bayes Risk in probabilistic noninterference (2011), \n                    \n                      http:\/\/arxiv.org\/pdf\/1007.1054v1.pdf\n                    \n                    \n                  , extended version of [6]"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/11783596_21","volume-title":"Mathematics of Program Construction","author":"C. Morgan","year":"2006","unstructured":"Morgan, C.: The Shadow Knows: Refinement of Ignorance in sequential programs. In: Uustalu, T. (ed.) MPC 2006. LNCS, vol.\u00a04014, pp. 359\u2013378. Springer, Heidelberg (2006)"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C. Shannon","year":"1948","unstructured":"Shannon, C.: A mathematical theory of communication. Bell System Technical Journal\u00a027, 379\u2013423, 623\u2013656 (1948)","journal-title":"Bell System Technical Journal"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Yasuoka, H., Terauchi, T.: Quantitative information flow \u2014 verification hardness and possibilities. In: Proc. 23rd IEEE CSF Symp., pp. 15\u201327 (2010)","DOI":"10.1109\/CSF.2010.9"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41202-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T16:30:25Z","timestamp":1558629025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41202-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642412011","9783642412028"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41202-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}