{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:59:12Z","timestamp":1725465552957},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540645917"},{"type":"electronic","value":"9783540693451"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0054294","type":"book-chapter","created":{"date-parts":[[2006,6,7]],"date-time":"2006-06-07T03:28:32Z","timestamp":1149650912000},"page":"254-271","source":"Crossref","is-referenced-by-count":6,"title":["A semantic approach to secure information flow"],"prefix":"10.1007","author":[{"given":"K.","family":"Rustan","sequence":"first","affiliation":[]},{"given":"M.","family":"Leino","sequence":"additional","affiliation":[]},{"given":"Rajeev","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,25]]},"reference":[{"issue":"1","key":"15_CR1","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/357084.357088","volume":"2","author":"G. R. Andrews","year":"1980","unstructured":"Gregory R. Andrews and Richard P. Reitman. An axiomatic approach to information flow in programs. ACM Transactions on Programming Languages and Systems, 2(1):56\u201376, January 1980.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Jean-Pierre Ban\u00e2tre, Ciar\u00e1n Bryce, and Daniel Le M\u00e9tayer. Compile-time detection of information flow in sequential programs. In Proceedings of the European Symposium on Research in Computer Security, pages 55\u201373. Lecture Notes in Computer Science 875, Sprinter Verlag, 1994.","DOI":"10.1007\/3-540-58618-0_56"},{"key":"15_CR3","volume-title":"Technical Report M74-244","author":"D. E. Bell","year":"1973","unstructured":"D. E. Bell and L. J. La Padula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, MITRE Corporation, Bedford, Massachusetts, 1973."},{"issue":"7","key":"15_CR4","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D. E. Denning","year":"1977","unstructured":"Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7): 504\u2013513, July 1977.","journal-title":"Communications of the ACM"},{"issue":"5","key":"15_CR5","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D. E. Denning","year":"1976","unstructured":"Dorothy E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236\u2013243, May 1976.","journal-title":"Communications of the ACM"},{"key":"15_CR6","volume-title":"A Discipline of Programming","author":"E. W. Dijkstra","year":"1976","unstructured":"Edsger W. Dijkstra. A Discipline of Programming. Prentice-Hall, Englewood Cliffs, NJ, 1976."},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Edsger W. Dijkstra and Carel S. Scholten. Predicate Calculus and Program Semantics. Texts and Monographs in Computer Science. Springer-Verlag, 1990.","DOI":"10.1007\/978-1-4612-3228-5"},{"key":"15_CR8","volume-title":"Building a secure computer system","author":"M. Gasser","year":"1988","unstructured":"Morrie Gasser. Building a secure computer system. Van Nostrand Reinhold Company, New York, 1988."},{"issue":"2","key":"15_CR9","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1145\/69610.357988","volume":"27","author":"E. C. R. Hehner","year":"1984","unstructured":"Eric C. R. Hehner. Predicative programming Part I. Communications of the ACM, 27(2): 134\u2013143, February 1984.","journal-title":"Communications of the ACM"},{"issue":"10","key":"15_CR10","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B. W. Lampson","year":"1973","unstructured":"Butler W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613\u2013615, October 1973.","journal-title":"Communications of the ACM"},{"key":"15_CR11","unstructured":"R.M. Dijkstra. Relational calculus and relational program semantics. Eindhoven Institute of Technology, 1992."},{"key":"15_CR12","unstructured":"A. W. Roscoe. CSP and determinism in security modelling. In Security and Privacy. IEEE, 1995."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Dennis Volpano and Geoffrey Smith. Eliminating covert flows with minimum typings. In Proceedings of the 10th IEEE Computer Security Foundations Workshop, pages 156\u2013168, June 1997.","DOI":"10.1109\/CSFW.1997.596807"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Dennis Volpano and Geoffrey Smith. A type-based approach to program security. In Theory and Practice of Software Development: Proceedings\/TAPSOFT '97, 7 th International Joint Conference CAAP\/FASE, volume 1214 of Lecture Notes in Computer Science, pages 607\u2013621. Springer, April 1997.","DOI":"10.1007\/BFb0030629"},{"issue":"3","key":"15_CR15","first-page":"1","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):1\u201321, 1996.","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","Mathematics of Program Construction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0054294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T02:45:20Z","timestamp":1555641920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0054294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540645917","9783540693451"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/bfb0054294","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}