{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:26:26Z","timestamp":1761611186261},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540648963"},{"type":"electronic","value":"9783540684558"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055617","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T07:31:00Z","timestamp":1153985460000},"page":"84-98","source":"Crossref","is-referenced-by-count":42,"title":["Control flow analysis for the \u03c0-calculus"],"prefix":"10.1007","author":[{"given":"Chiara","family":"Bodei","sequence":"first","affiliation":[]},{"given":"Pierpaolo","family":"Degano","sequence":"additional","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"M. Abadi. Secrecy by typing in security protocols. In Proceedings of Theoretical Aspects of Computer Software, Third International Symposiuoum, LNCS 1281, pages 611\u2013638. Springer-Verlag, 1997.","DOI":"10.1007\/BFb0014571"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"R.M. Amadio. An asynchronous model of locality, failure, and process mobility. In Proceedings of COORDINATION'97, LNCS 1282. Springer-Verlag, 1997.","DOI":"10.1007\/3-540-63383-9_92"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"D.E. Bell and L.J. La Padula. Secure computer systems: Unified exposition and multics interpretation. Technical Report ESD-TR-75-306, Mitre C., 1976.","DOI":"10.21236\/ADA023588"},{"key":"6_CR4","volume-title":"Technical Report LOMAPS-SICS 19","author":"M. Dam","year":"1997","unstructured":"M. Dam. Proving trust in systems of second-order processes: Preliminary results. Technical Report LOMAPS-SICS 19, SICS, Sweden, 1997."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"R. De Nicola, G. Ferrari, and R. Pugliese. Coordinating mobile agents via blackboards and access rights. In Proceedings of COORDINATION'97, LNCS 1282. Springer-Verlag, 1997.","DOI":"10.1007\/3-540-63383-9_83"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"R. Focardi. Comparing two information flow security properties. In Proceedings of 9th IEEE Computer Science Security Foundation W\/S, pages 116\u2013122, 1996.","DOI":"10.1109\/CSFW.1996.503696"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering. To appear.","DOI":"10.1109\/32.629493"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"C. Fournet, C. Laneve, L. Maranget, and D. Remy. Implicit typing \u00e0 la ML for the join calculus. In Proceedings of CONCUR'97, LNCS. Springer-Verlag, 1997.","DOI":"10.1007\/3-540-63141-0_14"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"K.L.S. Gasser, F. Nielson, and H.R. Nielson. Systematic realisation of control flow analysis for CML. In Proceedings of ICFP'97, pages 38\u201351. ACM Press, 1997.","DOI":"10.1145\/258948.258954"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"J.A. Goguen and J. Meseguer. Security policy and security models. In Proceedings of the 1982 IEEE Symposioum on Security and Privacy, pages 11\u201320, 1982.","DOI":"10.1109\/SP.1982.10014"},{"issue":"2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/BF01237234","volume":"28","author":"T.J. Marlowe","year":"1990","unstructured":"T.J. Marlowe and B.J. Ryder. Properties of data flow frameworks \u2014 a unified model. Acta Informatica, 28(2):121\u2013163, 1990.","journal-title":"Acta Informatica"},{"issue":"1","key":"6_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R. Milner","year":"1992","unstructured":"R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes (I and II). Information and Computation, 100(1):1\u201377, 1992.","journal-title":"Information and Computation"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/0304-3975(93)90156-N","volume":"114","author":"R. Milner","year":"1993","unstructured":"R. Milner, J. Parrow, and D. Walker. Modal logics for mobile processes. TCS, 114:149\u2013171, 1993.","journal-title":"TCS"},{"key":"6_CR14","unstructured":"J. Palsberg and M.J. Schwartzbach. Object-Oriented Type Systems. Wiley, 1994."},{"issue":"5","key":"6_CR15","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1017\/S096012950007002X","volume":"6","author":"B.C. Pierce","year":"1996","unstructured":"B.C. Pierce and D. Sangiorgi. Typing and sub-typing for mobile processes. Mathematical Structures in Computer Science, 6(5):409\u2013454, 1996.","journal-title":"Mathematical Structures in Computer Science"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"J. Riely and M. Hennessy. A typed language for distributed mobile processes. In Proceedings of POPL'98. ACM Press, 1998.","DOI":"10.1145\/268946.268978"},{"key":"6_CR17","unstructured":"P. Sewell. Global\/local subtyping for a distributed \u03c0-calculus. Technical Report 435, Computer Laboratory, University of Cambridge, 1997."},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"O. Shivers. Control flow analysis in Scheme. In Proceedings of PLDI'88, volume 7(1). ACM SIGPLAN Notices, 1988.","DOI":"10.1145\/53990.54007"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"A. Venet. Abstract interpretation of the \u03c0-calculus. In Analysis and Verification of Multiple-Agent Languages, LNCS, volume 1192. Springer-Verlag, 1997.","DOI":"10.1007\/3-540-62503-8_3"},{"key":"6_CR20","doi-asserted-by":"crossref","first-page":"4","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4:4\u201321, 1996.","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","CONCUR'98 Concurrency Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T13:55:48Z","timestamp":1587131748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648963","9783540684558"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/bfb0055617","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}