{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T02:31:14Z","timestamp":1774837874945,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662496343","type":"print"},{"value":"9783662496350","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49635-0_3","type":"book-chapter","created":{"date-parts":[[2016,3,21]],"date-time":"2016-03-21T12:03:52Z","timestamp":1458561832000},"page":"46-67","source":"Crossref","is-referenced-by-count":18,"title":["A Taxonomy of Information Flow Monitors"],"prefix":"10.1007","author":[{"given":"Nataliia","family":"Bielova","sequence":"first","affiliation":[]},{"given":"Tamara","family":"Rezk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"A Taxonomy of Information Flow Monitors Technical report. https:\/\/team.inria.fr\/indes\/taxonomy"},{"issue":"1","key":"3_CR2","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/151646.151649","volume":"15","author":"M Abadi","year":"1993","unstructured":"Abadi, M., Lamport, L.: Composing specifications. ACM Trans. Program. Lang. Syst. 15(1), 73\u2013132 (1993)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Askarov, A., Sabelfeld, A., Gradual release: unifying declassification, encryption and key release policies. In: IEEE Symposium on Security and Privacy, pp. 207\u2013221 (2007)","DOI":"10.1109\/SP.2007.22"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Askarov, A., Sabelfeld, A.: Tight enforcement of information-release policies for dynamic languages. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, pp. 43\u201359. IEEE Computer Society (2009)","DOI":"10.1109\/CSF.2009.22"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In PLAS 2009, pp. 113\u2013124 (2009)","DOI":"10.1145\/1554339.1554353"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Permissive dynamic information flow analysis. In: PLAS 2010, pp. 3:1\u20133:12. ACM (2010)","DOI":"10.1145\/1814217.1814220"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Multiple facets for dynamic information flow. In: Proceeding of the 39th Symposium of Principles of Programming Languages. ACM (2012)","DOI":"10.1145\/2103656.2103677"},{"issue":"1\u20132","key":"3_CR8","first-page":"2","volume":"4","author":"L Bauer","year":"2005","unstructured":"Bauer, L., Ligatti, J., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4(1\u20132), 2\u201316 (2005)","journal-title":"Int. J. Inf. Secur."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Besson, F., Bielova, N., Jensen, T.: Hybrid information flow monitoring against web tracking. In: CSF 2013, pp. 240\u2013254. IEEE (2013)","DOI":"10.1109\/CSF.2013.23"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Bichhawat, A., Rajani, V., Garg, D., Hammer, C.: Generalizing permissive-upgrade in dynamic information flow analysis. In: Proceedings of the Ninth Workshop on Programming Languages, Analysis for Security, PLAS 2014, pp. 15:15\u201315:24. ACM (2014)","DOI":"10.1145\/2637113.2637116"},{"issue":"6","key":"3_CR11","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.3233\/JCS-2009-0393","volume":"18","author":"MR Clarkson","year":"2010","unstructured":"Clarkson, M.R., Schneider, F.B.: Hyperproperties. J. Comput. Secur. 18(6), 1157\u20131210 (2010)","journal-title":"J. Comput. Secur."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Devriese, D., Piessens, F.: Non-interference through secure multi-execution. In: Proceeding of the Symposium on Security and Privacy, pp. 109\u2013124. IEEE (2010)","DOI":"10.1109\/SP.2010.15"},{"key":"3_CR13","unstructured":"Erlingsson, U.: The Inlined Reference Monitor Approach to Security Policy Enforcement. PhD thesis, Cornell University (2003)"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","first-page":"75","volume-title":"Advances in Computer Science - ASIAN 2006","author":"G Guernic Le","year":"2008","unstructured":"Le Guernic, G., Banerjee, A., Jensen, T., Schmidt, D.A.: Automata-based confidentiality monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 75\u201389. Springer, Heidelberg (2008)"},{"issue":"1","key":"3_CR15","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"KW Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28(1), 175\u2013205 (2006)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Hedin, D., Bello, L., Sabelfeld, A.: Value-sensitive hybrid information flow control for a javascript-like language. In: IEEE 28th Computer Security Foundations Symposium, CSF (2015)","DOI":"10.1109\/CSF.2015.31"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Hedin, D., Sabelfeld, A.: Information-flow security for a core of JavaScript. In: Proceeding of the 25th Computer Security Foundations Symposium, pp. 3\u201318. IEEE (2012)","DOI":"10.1109\/CSF.2012.19"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Hunt, S., Sands, D.: On flow-sensitive security types. In: POPL 2006, pp. 79\u201390. ACM, New York, January 2006","DOI":"10.1145\/1111320.1111045"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Le Guernic, G.: Confidentiality Enforcement Using Dynamic Information Flow Analyses. PhD thesis, Kansas State University and University of Rennes 1 (2007)","DOI":"10.1007\/978-3-540-76929-3_4"},{"key":"3_CR20","unstructured":"Le Guernic, G.: Precise dynamic verification of confidentiality. In: Proceeding of the 5th International Verification Workshop, CEUR Workshop Proceeding, vol. 372, pp. 82\u201396 (2008)"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","first-page":"75","volume-title":"Advances in Computer Science - ASIAN 2006","author":"G Guernic Le","year":"2008","unstructured":"Le Guernic, G., Banerjee, A., Jensen, T., Schmidt, D.A.: Automata-based confidentiality monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 75\u201389. Springer, Heidelberg (2008)"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/11555827_21","volume-title":"Computer Security \u2013 ESORICS 2005","author":"J Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.W.: Enforcing non-safety security policies with program monitors. In: di Vimercati, S.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 355\u2013373. Springer, Heidelberg (2005)"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Trustworthy Global Computing","author":"A Almeida-Matos","year":"2014","unstructured":"Almeida-Matos, A., Fragoso Santos, J., Rezk, T.: An information flow monitor for a core of DOM. In: Maffei, M., Tuosto, E. (eds.) TGC 2014. LNCS, vol. 8902, pp. 1\u201316. Springer, Heidelberg (2014)"},{"issue":"1","key":"3_CR24","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/32.481534","volume":"22","author":"J McLean","year":"1996","unstructured":"McLean, J.: A general theory of composition for a class of \u201cpossibilistic\u201d properties. IEEE Trans. Softw. Eng. 22(1), 53\u201367 (1996)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Russo, A., Sabelfeld, A.: Dynamic vs. Static flow-sensitive security analysis. In: Proceeding of the 23rd Computer Security Foundations Symposium, pp. 186\u2013199. IEEE (2010)","DOI":"10.1109\/CSF.2010.20"},{"issue":"5","key":"3_CR26","doi-asserted-by":"publisher","first-page":"517","DOI":"10.3233\/JCS-2009-0352","volume":"17","author":"A Sabelfeld","year":"2009","unstructured":"Sabelfeld, A., Sands, D.: Declassification: dimensions and principles. J. Computer Secur. 17(5), 517\u2013548 (2009)","journal-title":"J. Computer Secur."},{"key":"3_CR27","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-642-55415-5_23","volume-title":"ICT Systems Security and Privacy Protection","author":"Jos\u00e9 Fragoso Santos","year":"2014","unstructured":"Santos, J.F., Rezk, T.: An information flow monitor-inlining compiler for securing a core of javascript. In: ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014 (2014)"},{"issue":"1","key":"3_CR28","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F Schneider","year":"2000","unstructured":"Schneider, F.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30\u201350 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/11547662_24","volume-title":"Static Analysis","author":"T Terauchi","year":"2005","unstructured":"Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol. 3672, pp. 352\u2013367. Springer, Heidelberg (2005)"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Volpano, D., Smith, G.: Eliminating covert flows with minimum typings. In: Proceeding 10th IEEE Computer Security Foundations Workshop, pp. 156\u2013168. Society Press (1997)","DOI":"10.1109\/CSFW.1997.596807"},{"issue":"2\u20133","key":"3_CR31","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. Comput. Secur. 4(2\u20133), 167\u2013187 (1996)","journal-title":"J. Comput. Secur."},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Zanarini, D., Jaskelioff, M., Russo, A.: Precise enforcement of confidentiality for reactive systems. In: IEEE 26th Computer Security Foundations Symposium, pp. 18\u201332 (2013)","DOI":"10.1109\/CSF.2013.9"},{"key":"3_CR33","unstructured":"Zdancewic, S.A.: Programming languages for information security. PhD thesis, Cornell University (2002)"}],"container-title":["Lecture Notes in Computer Science","Principles of Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49635-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T21:32:58Z","timestamp":1748813578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49635-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662496343","9783662496350"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49635-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}