{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:18:01Z","timestamp":1763468281690},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662488980"},{"type":"electronic","value":"9783662488997"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48899-7_5","type":"book-chapter","created":{"date-parts":[[2015,11,20]],"date-time":"2015-11-20T22:59:28Z","timestamp":1448060368000},"page":"63-78","source":"Crossref","is-referenced-by-count":4,"title":["Value Sensitivity and Observable Abstract Values for Information Flow Control"],"prefix":"10.1007","author":[{"given":"Luciano","family":"Bello","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Hedin","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,22]]},"reference":[{"key":"5_CR1","unstructured":"Full version at \n                    http:\/\/chalmerslbs.bitbucket.org\/valsens\/fullversion.pdf"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: Proceedings of ACM PLAS (2009)","DOI":"10.1145\/1554339.1554353"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Permissive dynamic information flow analysis. In: PLAS (2010)","DOI":"10.1145\/1814217.1814220"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Multiple facets for dynamic information flow. In: PoPL (2012)","DOI":"10.1145\/2103656.2103677"},{"key":"5_CR5","volume-title":"High Integrity Software: The SPARK Approach to Safety and Security","author":"J Barnes","year":"2003","unstructured":"Barnes, J., Barnes, J.: High Integrity Software: The SPARK Approach to Safety and Security. Addison-Wesley Longman Publishing Co. Inc., Boston (2003)"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-29420-4_4","volume-title":"Formal Aspects of Security and Trust","author":"L Bello","year":"2012","unstructured":"Bello, L., Bonelli, E.: On-the-fly inlining of dynamic dependency monitors for secure information flow. In: Barthe, G., Datta, A., Etalle, S. (eds.) FAST 2011. LNCS, vol. 7140, pp. 55\u201369. Springer, Heidelberg (2012)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Bichhawat, A., Rajani, V., Garg, D., Hammer, C.: Generalizing permissive-upgrade in dynamic information flow analysis. In: PLAS (2014)","DOI":"10.1145\/2637113.2637116"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-33167-1_4","volume-title":"Computer Security \u2013 ESORICS 2012","author":"A Birgisson","year":"2012","unstructured":"Birgisson, A., Hedin, D., Sabelfeld, A.: Boosting the permissiveness of dynamic information-flow tracking by testing. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 55\u201372. Springer, Heidelberg (2012)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-319-03542-0_16","volume-title":"Programming Languages and Systems","author":"N Broberg","year":"2013","unstructured":"Broberg, N., van Delft, B., Sands, D.: Paragon for practical programming with information-flow control. In: Shan, C. (ed.) APLAS 2013. LNCS, vol. 8301, pp. 217\u2013232. Springer, Heidelberg (2013)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Buiras, P., Stefan, D., Russo, A.: On dynamic flow-sensitive floating-label systems. In: CSF (2014)","DOI":"10.1109\/CSF.2014.13"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Capizzi, R., Longo, A., Venkatakrishnan, V.N., Sistla, A.P.: Preventing information leaks through shadow executions. In: ACSAC (2008)","DOI":"10.1109\/ACSAC.2008.50"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Chudnov, A., Naumann, D.A.: Information flow monitor inlining. In: Proceedings of CSF 2010 (2010)","DOI":"10.1109\/CSF.2010.21"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Chugh, R., Meister, J.A., Jhala, R., Lerner, S.: Staged information flow for JavaScript. In: PLDI (2009)","DOI":"10.1145\/1542476.1542483"},{"issue":"7","key":"5_CR14","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"DE Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. CACM 20(7), 504\u2013513 (1977)","journal-title":"CACM"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Devriese, D., Piessens, F.: Non-interference through secure multi-execution. In: SSP (2010)","DOI":"10.1109\/SP.2010.15"},{"key":"5_CR16","unstructured":"Groef, W.D., Devriese, D., Nikiforakis, N., Piessens, F.: Flowfox: a web browser with flexible and precise information flow control. In: CCS (2012)"},{"issue":"6","key":"5_CR17","first-page":"399","volume":"8","author":"C Hammer","year":"2009","unstructured":"Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. JIS 8(6), 399\u2013422 (2009)","journal-title":"JIS"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Hedin, D., Sabelfeld, A.: Information-flow security for a core of JavaScript. In: Proceedings of IEEE CSF, pp. 3\u201318, June 2012","DOI":"10.1109\/CSF.2012.19"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Hedin, D., Bello, L., Sabelfeld, A.: Value-sensitive hybrid information flow control for a JavaScript-like language. In: CSF (2015)","DOI":"10.1109\/CSF.2015.31"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: JSFlow: tracking information flow in JavaScript and its APIs. In: SAC (2014)","DOI":"10.1145\/2554850.2554909"},{"key":"5_CR21","unstructured":"Just, S., Cleary, A., Shirley, B., Hammer, C.: Information flow analysis for Javascript. In: Proceedings of ACM PLASTIC, pp. 9\u201318. ACM, USA (2011). \n                    http:\/\/doi.acm.org\/10.1145\/2093328.2093331"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","first-page":"75","volume-title":"Advances in Computer Science - ASIAN 2006","author":"G Guernic Le","year":"2008","unstructured":"Le Guernic, G., Banerjee, A., Jensen, T., Schmidt, D.A.: Automata-based confidentiality monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 75\u201389. Springer, Heidelberg (2008)"},{"issue":"7","key":"5_CR23","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.cose.2011.10.002","volume":"31","author":"J Magazinius","year":"2012","unstructured":"Magazinius, J., Russo, A., Sabelfeld, A.: On-the-fly inlining of dynamic security monitors. Comput. Secur. 31(7), 827\u2013843 (2012)","journal-title":"Comput. Secur."},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Trustworthy Global Computing","author":"A Almeida-Matos","year":"2014","unstructured":"Almeida-Matos, A., Fragoso Santos, J., Rezk, T.: An information flow monitor for a core of DOM - introducing references and live primitives. In: Maffei, M., Tuosto, E. (eds.) TGC 2014. LNCS, vol. 8902, pp. 1\u201316. Springer, Heidelberg (2014)"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Moore, S., Chong, S.: Static analysis for efficient hybrid information-flow control. In: CSF (2011)","DOI":"10.1109\/CSF.2011.17"},{"key":"5_CR26","unstructured":"Myers, A.C., Zheng, L., Zdancewic, S., Chong, S., Nystrom, N.: Jif: Java information flow (2001). \n                    http:\/\/www.cs.cornell.edu\/jif"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Russo, A., Sabelfeld, A.: Dynamic vs. static flow-sensitive security analysis. In: Proceedings of IEEE CSF, pp. 186\u2013199, July 2010","DOI":"10.1109\/CSF.2010.20"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-04444-1_6","volume-title":"Computer Security \u2013 ESORICS 2009","author":"A Russo","year":"2009","unstructured":"Russo, A., Sabelfeld, A., Chudnov, A.: Tracking information flow in dynamic tree structures. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 86\u2013103. Springer, Heidelberg (2009)"},{"key":"5_CR29","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-55415-5_23","volume-title":"ICT Systems Security and Privacy Protection","author":"JF Santos","year":"2014","unstructured":"Santos, J.F., Rezk, T.: An information flow monitor-inlining compiler for securing a core of JavaScript. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IFIP AICT, vol. 428, pp. 278\u2013292. Springer, Heidelberg (2014)"},{"key":"5_CR30","unstructured":"Simonet, V.: The Flow Caml system (2003). \n                    http:\/\/cristal.inria.fr\/simonet\/soft\/flowcaml"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Stefan, D., Russo, A., Mitchell, J., Mazi\u00e8res, D.: Flexible dynamic information flow control in haskell. In: 4th Symposium on Haskell (2011)","DOI":"10.1145\/2034675.2034688"},{"key":"5_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/11935308_24","volume-title":"Information and Communications Security","author":"VN Venkatakrishnan","year":"2006","unstructured":"Venkatakrishnan, V.N., Xu, W., DuVarney, D.C., Sekar, R.: Provably correct runtime enforcement of non-interference properties. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 332\u2013351. Springer, Heidelberg (2006)"},{"issue":"3","key":"5_CR33","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. Comput. Secur. 4(3), 167\u2013187 (1996)","journal-title":"J. Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Logic for Programming, Artificial Intelligence, and Reasoning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48899-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T15:45:21Z","timestamp":1559317521000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-48899-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662488980","9783662488997"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48899-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}