{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:19:31Z","timestamp":1775470771213,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2009,6,27]],"date-time":"2009-06-27T00:00:00Z","timestamp":1246060800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1007\/s10207-009-0086-1","type":"journal-article","created":{"date-parts":[[2009,6,26]],"date-time":"2009-06-26T08:54:29Z","timestamp":1246006469000},"page":"399-422","source":"Crossref","is-referenced-by-count":164,"title":["Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs"],"prefix":"10.1007","volume":"8","author":[{"given":"Christian","family":"Hammer","sequence":"first","affiliation":[]},{"given":"Gregor","family":"Snelting","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,6,27]]},"reference":[{"key":"86_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Banerjee, A., Heintze, N., Riecke, J.G.: A core calculus of dependency. In: POPL \u201999: Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 147\u2013160. ACM, New York (1999). doi: 10.1145\/292540.292555","DOI":"10.1145\/292540.292555"},{"key":"86_CR2","doi-asserted-by":"crossref","unstructured":"Agat, J.: Transforming out timing leaks. In: POPL \u201900: Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 40\u201353. ACM, New York (2000). doi: 10.1145\/325694.325702","DOI":"10.1145\/325694.325702"},{"key":"86_CR3","doi-asserted-by":"crossref","unstructured":"Amtoft, T., Bandhakavi, S., Banerjee, A.: A logic for information flow in object-oriented programs. In: POPL \u201906: Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 91\u2013102. ACM, New York (2006). doi: 10.1145\/1111037.1111046","DOI":"10.1145\/1111037.1111046"},{"key":"86_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, P., Reps, T., Teitelbaum, T.: Design and implementation of a fine-grained software inspection tool. IEEE Trans. Softw. Eng. 29(8) (2003). doi: 10.1109\/TSE.2003.1223646","DOI":"10.1109\/TSE.2003.1223646"},{"key":"86_CR5","doi-asserted-by":"crossref","unstructured":"Barthe, G., Rezk, T.: Non-interference for a JVM-like language. In: TLDI \u201905: Proceedings of the 2005 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, pp. 103\u2013112. ACM Press, New York (2005). doi: 10.1145\/1040294.1040304","DOI":"10.1145\/1040294.1040304"},{"issue":"2\/3","key":"86_CR6","first-page":"229","volume":"4","author":"D.E. Bell","year":"1996","unstructured":"Bell D.E., LaPadula L.J.: Secure computer systems: a mathematical model, vol. II. J. Comput. Secur. 4(2\/3), 229\u2013263 (1996). Based on MITRE Technical Report 2547, vol. II","journal-title":"J. Comput. Secur."},{"issue":"1","key":"86_CR7","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/2363.2366","volume":"7","author":"J.F. Bergeretti","year":"1985","unstructured":"Bergeretti J.F., Carr\u00e9 B.A.: Information-flow and data-flow analysis of while-programs. ACM Trans. Program. Lang. Syst. 7(1), 37\u201361 (1985). doi: 10.1145\/2363.2366","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"86_CR8","unstructured":"Biba, K.J.: Integrity considerations for secure computer systems. Tech. Rep. MTR-3153, The Mitre Corporation (1977). doi: 100.2\/ADA039324"},{"key":"86_CR9","doi-asserted-by":"crossref","unstructured":"Bieber, P., Cazin, J., Marouani, A.E., Girard, P., Lanet, J.L., Wiels, V., Zanon, G.: The PACAP prototype: a tool for detecting Java Card illegal flow. In: Proceedings of 1st International Workshop, Java Card 2000. Lecture Notes in Computer Sciences, vol. 2041, pp. 25\u201337. Springer, Cannes (2000). doi: 10.1007\/3-540-45165-X_3","DOI":"10.1007\/3-540-45165-X_3"},{"issue":"1","key":"86_CR10","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1290520.1290523","volume":"30","author":"D. Binkley","year":"2007","unstructured":"Binkley D., Harman M., Krinke J.: Empirical study of optimization techniques for massive slicing. ACM Trans. Program. Lang. Syst. 30(1), 3 (2007). doi: 10.1145\/1290520.1290523","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"86_CR11","doi-asserted-by":"crossref","unstructured":"Chambers, C., Pechtchanski, I., Sarkar, V., Serrano, M.J., Srinivasan, H.: Dependence analysis for Java. In: Proceedings of the 12th International Workshop on Languages and Compilers for Parallel Computing, pp. 35\u201352. Springer, Berlin (1999). doi: 10.1007\/3-540-44905-1_3","DOI":"10.1007\/3-540-44905-1_3"},{"issue":"6","key":"86_CR12","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MSP.2004.111","volume":"2","author":"B. Chess","year":"2004","unstructured":"Chess B., McGraw G.: Static analysis for security. IEEE Secur. Priv. 2(6), 76\u201379 (2004). doi: 10.1109\/MSP.2004.111","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"86_CR13","first-page":"3","volume":"28","author":"D. Clark","year":"2002","unstructured":"Clark D., Hankin C., Hunt S.: Information flow for Algol-like languages. Comput. Lang. Syst. Struct. 28(1), 3\u201328 (2002). doi: 10.1016\/S0096-0551(02)00006-1","journal-title":"Comput. Lang. Syst. Struct."},{"key":"86_CR14","unstructured":"Cohen, E.S.: Foundations of Secure Computation, chap. Information Transmission in Sequential Programs, pp. 297\u2013335. Academic Press, Orlando (1978). Paper presented at a 3\u00a0day workshop held at Georgia Inst. of Technology, Atlanta, Oct. 1977"},{"issue":"3","key":"86_CR15","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J. Ferrante","year":"1987","unstructured":"Ferrante J., Ottenstein K.J., Warren J.D.: The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Syst. 9(3), 319\u2013349 (1987). doi: 10.1145\/24039.24041","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"86_CR16","doi-asserted-by":"crossref","unstructured":"Giffhorn, D., Hammer, C.: Precise analysis of Java programs using JOANA (tool demonstration). In: Proceedings of 8th IEEE International Working Conference on Source Code Analysis and Manipulation, pp. 267\u2013268 (2008). doi: 10.1109\/SCAM.2008.17","DOI":"10.1109\/SCAM.2008.17"},{"issue":"2","key":"86_CR17","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s10515-009-0048-x","volume":"16","author":"D. Giffhorn","year":"2009","unstructured":"Giffhorn D., Hammer C.: Precise slicing of concurrent programs\u2014an evaluation of precise slicing algorithms for concurrent programs. J. Autom. Softw. Eng. 16(2), 197\u2013234 (2009). doi: 10.1007\/s10515-009-0048-x","journal-title":"J. Autom. Softw. Eng."},{"key":"86_CR18","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Interference control and unwinding. In: Proceedings of Symposium on Security and Privacy, pp. 75\u201386. IEEE, New York (1984). doi: 10.1109\/SP.1984.10019","DOI":"10.1109\/SP.1984.10019"},{"key":"86_CR19","unstructured":"Hammer, C.: Information flow control for Java. Ph.D. thesis, Universit\u00e4t Karlsruhe (TH) (2009, Forthcoming)"},{"key":"86_CR20","doi-asserted-by":"crossref","unstructured":"Hammer, C., Krinke, J., Nodes, F.: Intransitive noninterference in dependence graphs. In: Proceedings of Second International Symposium on Leveraging Application of Formal Methods, Verification and Validation (ISoLA 2006), pp. 119\u2013128. IEEE Computer Society, Washington, DC (2006). doi: 10.1109\/ISoLA.2006.39","DOI":"10.1109\/ISoLA.2006.39"},{"key":"86_CR21","unstructured":"Hammer, C., Krinke, J., Snelting, G.: Information flow control for Java based on path conditions in dependence graphs. In: Proceedings of IEEE International Symposium on Secure Software Engineering (ISSSE\u201906), pp. 87\u201396 (2006)"},{"key":"86_CR22","doi-asserted-by":"crossref","unstructured":"Hammer, C., Schaade, R., Snelting, G.: Static path conditions for Java. In: PLAS \u201908: Proceedings of the Third ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, pp. 57\u201366. ACM, New York (2008). doi: 10.1145\/1375696.1375704","DOI":"10.1145\/1375696.1375704"},{"key":"86_CR23","doi-asserted-by":"crossref","unstructured":"Hammer, C., Snelting, G.: An improved slicer for Java. In: PASTE \u201904: Proceedings of the 5th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, pp. 17\u201322. ACM Press, New York (2004). doi: 10.1145\/996821.996830","DOI":"10.1145\/996821.996830"},{"key":"86_CR24","doi-asserted-by":"crossref","unstructured":"Hardekopf, B., Lin, C.: Semi-sparse flow sensitive pointer analysis. In: POPL \u201909: Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 226\u2013238. ACM, New York (2009). doi: 10.1145\/1480881.1480911","DOI":"10.1145\/1480881.1480911"},{"key":"86_CR25","doi-asserted-by":"crossref","unstructured":"Horwitz, S., Prins, J., Reps, T.: On the adequacy of program dependence graphs for representing programs. In: POPL \u201988: Proceedings of the 15th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 146\u2013157. ACM, New York (1988). doi: 10.1145\/73560.73573","DOI":"10.1145\/73560.73573"},{"issue":"1","key":"86_CR26","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/77606.77608","volume":"12","author":"S. Horwitz","year":"1990","unstructured":"Horwitz S., Reps T., Binkley D.: Interprocedural slicing using dependence graphs. ACM Trans. Program. Lang. Syst. 12(1), 26\u201360 (1990). doi: 10.1145\/77606.77608","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"86_CR27","doi-asserted-by":"crossref","unstructured":"Hunt, S., Sands, D.: On flow-sensitive security types. In: POPL \u201906: Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 79\u201390. ACM Press, New York (2006). doi: 10.1145\/1111037.1111045","DOI":"10.1145\/1111037.1111045"},{"key":"86_CR28","doi-asserted-by":"crossref","unstructured":"Jayaraman, G., Ranganath, V.P., Hatcliff, J.: Kaveri: Delivering the Indus Java program slicer to Eclipse. In: Proceedings of Fundamental Approaches to Software Engineering (FASE\u201905). Lecture Notes in Computer Sciences, vol. 3442, pp. 269\u2013272. Springer, Berlin (2005). doi: 10.1007\/b107062","DOI":"10.1007\/b107062"},{"issue":"3","key":"86_CR29","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/BF00290339","volume":"7","author":"J.B. Kam","year":"1977","unstructured":"Kam J.B., Ullman J.D.: Monotone data flow analysis frameworks. Acta Inform. 7(3), 305\u2013317 (1977). doi: 10.1007\/BF00290339","journal-title":"Acta Inform."},{"issue":"4","key":"86_CR30","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1145\/1146809.1146811","volume":"28","author":"G. Klein","year":"2006","unstructured":"Klein G., Nipkow T.: A machine-checked model for a Java-like language, virtual machine, and compiler. ACM Trans. Program. Lang. Syst. 28(4), 619\u2013695 (2006). doi: 10.1145\/1146809.1146811","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"86_CR31","doi-asserted-by":"crossref","unstructured":"Krinke, J.: Context-sensitive slicing of concurrent programs. In: ESEC\/FSE-11: Proceedings of the 9th European Software Engineering Conference Held Jointly with 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 178\u2013187. ACM, New York (2003). doi: 10.1145\/940071.940096","DOI":"10.1145\/940071.940096"},{"key":"86_CR32","doi-asserted-by":"crossref","unstructured":"Krinke, J.: Program slicing. In: Handbook of Software Engineering and Knowledge Engineering, vol. 3: Recent Advances. World Scientific, Singapore (2005)","DOI":"10.1142\/9789812775245_0011"},{"key":"86_CR33","doi-asserted-by":"crossref","unstructured":"Lhot\u00e1k, O., Hendren, L.: Scaling Java points-to using Spark. In: Proceedings of 12th International Conference on Compiler Construction. Lecture Notes in Computer Sciences, vol. 2622, pp. 153\u2013169 (2003). doi: 10.1007\/3-540-36579-6_12","DOI":"10.1007\/3-540-36579-6_12"},{"key":"86_CR34","unstructured":"Livshits, B., Lam, M.S.: Finding security vulnerabilities in Java applications with static analysis. In: Proceedings of the Usenix Security Symposium, pp. 271\u2013286. Baltimore, Maryland (2005). http:\/\/portal.acm.org\/citation.cfm?id=1251416"},{"key":"86_CR35","doi-asserted-by":"crossref","unstructured":"Mantel, H., Reinhard, A.: Controlling the what and where of declassification in language-based security. In: ESOP \u201907: Proceedings of the European Symposium on Programming. Lecture Notes in Computer Sciences, vol. 4421, pp. 141\u2013156. Springer, Berlin (2007). doi: 10.1007\/978-3-540-71316-6","DOI":"10.1007\/978-3-540-71316-6"},{"key":"86_CR36","doi-asserted-by":"crossref","unstructured":"Mantel, H., Sands, D.: Controlled declassification based on intransitive noninterference. In: Proceedings of the 2nd Asian Symposium on Programming Languages and Systems, APLAS 2004. Lecture Notes in Computer Sciences, vol. 3302, pp. 129\u2013145. Springer, Taipei (2004). doi: 10.1007\/b102225","DOI":"10.1007\/b102225"},{"key":"86_CR37","unstructured":"Myers, A.C., Chong, S., Nystrom, N., Zheng, L., Zdancewic, S.: Jif: Java information flow. http:\/\/www.cs.cornell.edu\/jif\/"},{"issue":"4","key":"86_CR38","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1145\/363516.363526","volume":"9","author":"A.C. Myers","year":"2000","unstructured":"Myers A.C., Liskov B.: Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol. 9(4), 410\u2013442 (2000). doi: 10.1145\/363516.363526","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"6","key":"86_CR39","doi-asserted-by":"crossref","first-page":"1088","DOI":"10.1145\/1186632.1186636","volume":"28","author":"M.G. Nanda","year":"2006","unstructured":"Nanda M.G., Ramesh S.: Interprocedural slicing of multithreaded programs with applications to Java. ACM Trans. Program. Lang. Syst. 28(6), 1088\u20131144 (2006). doi: 10.1145\/1186632.1186636","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"86_CR40","unstructured":"Nipkow, T., Paulson, L.C., Wenzel, M.: Isabelle\/HOL\u2014A Proof Assistant for Higher-Order Logic. Lecture Notes in Computer Sciences, vol. 2283. Springer, Berlin (2002). http:\/\/www4.informatik.tu-muenchen.de\/~nipkow\/LNCS2283\/"},{"key":"86_CR41","doi-asserted-by":"crossref","unstructured":"Pistoia, M., Banerjee, A., Naumann, D.A.: Beyond stack inspection: a unified access-control and information-flow security model. In: SP \u201907: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 149\u2013163. IEEE Computer Society, Washington, DC (2007). doi: 10.1109\/SP.2007.10","DOI":"10.1109\/SP.2007.10"},{"issue":"2","key":"86_CR42","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1147\/sj.462.0265","volume":"46","author":"M. Pistoia","year":"2007","unstructured":"Pistoia M., Chandra S., Fink S.J., Yahav E.: A survey of static analysis methods for identifying security vulnerabilities in software systems. IBM Syst. J. 46(2), 265\u2013288 (2007). doi: 10.1147\/sj.462.0265","journal-title":"IBM Syst. J."},{"key":"86_CR43","doi-asserted-by":"crossref","unstructured":"Pistoia, M., Flynn, R.J., Koved, L., Sreedhar, V.C.: Interprocedural analysis for privileged code placement and tainted variable detection. In: Proceedings of the 9th European Conference on Object-Oriented Programming. Lecture Notes in Computer Sciences, vol. 3586, pp. 362\u2013386. Springer, Berlin (2005). doi: 10.1007\/11531142_16","DOI":"10.1007\/11531142_16"},{"issue":"5","key":"86_CR44","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/1275497.1275502","volume":"29","author":"V.P. Ranganath","year":"2007","unstructured":"Ranganath V.P., Amtoft T., Banerjee A., Hatcliff J., Dwyer M.B.: A new foundation for control dependence and slicing for modern program structures. ACM Trans. Program. Lang. Syst. 29(5), 27 (2007). doi: 10.1145\/1275497.1275502","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"86_CR45","doi-asserted-by":"crossref","unstructured":"Reps, T., Horwitz, S., Sagiv, M., Rosay, G.: Speeding up slicing. In: SIGSOFT \u201994: Proceedings of the 2nd ACM SIGSOFT Symposium on Foundations of Software Engineering, pp. 11\u201320. ACM, New York (1994). doi: 10.1145\/193173.195287","DOI":"10.1145\/193173.195287"},{"key":"86_CR46","unstructured":"Reps, T., Yang, W.: The semantics of program slicing. Tech. Rep. 777, Computer Sciences Department, University of Wisconsin-Madison (1988). http:\/\/www.cs.wisc.edu\/techreports\/viewreport.php?report=777"},{"key":"86_CR47","doi-asserted-by":"crossref","unstructured":"Robschink, T., Snelting, G.: Efficient path conditions in dependence graphs. In: ICSE \u201902: Proceedings of the 24th International Conference on Software Engineering, pp. 478\u2013488. ACM Press, New York (2002). doi: 10.1145\/581339.581398","DOI":"10.1145\/581339.581398"},{"key":"86_CR48","doi-asserted-by":"crossref","unstructured":"Rountev, A., Milanova, A., Ryder, B.G.: Points-to analysis for Java using annotated constraints. In: OOPSLA \u201901: Proceedings of the 16th ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications, pp. 43\u201355. ACM, New York (2001). doi: 10.1145\/504282.504286","DOI":"10.1145\/504282.504286"},{"issue":"1","key":"86_CR49","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld A., Myers A.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5\u201319 (2003). doi: 10.1109\/JSAC.2002.806121","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"86_CR50","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1023\/A:1011553200337","volume":"14","author":"A. Sabelfeld","year":"2001","unstructured":"Sabelfeld A., Sands D.: A PER model of secure information flow in sequential programs. Higher Order Symbol. Comput. 14(1), 59\u201391 (2001). doi: 10.1023\/A:1011553200337","journal-title":"Higher Order Symbol. Comput."},{"key":"86_CR51","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. In: CSFW \u201905: Proceedings of the 18th IEEE Workshop on Computer Security Foundations, pp. 255\u2013269. IEEE Computer Society, Washington, DC (2005). doi: 10.1109\/CSFW.2005.15","DOI":"10.1109\/CSFW.2005.15"},{"key":"86_CR52","doi-asserted-by":"crossref","unstructured":"Scholz, B., Zhang, C., Cifuentes, C.: User-input dependence analysis via graph reachability. In: Proceedings of Eighth IEEE International Working Conference on Source Code Analysis and Manipulation, pp. 25\u201334 (2008). doi: 10.1109\/SCAM.2008.22","DOI":"10.1109\/SCAM.2008.22"},{"key":"86_CR53","doi-asserted-by":"crossref","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: POPL \u201998: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 355\u2013364. ACM, New York (1998). doi: 10.1145\/268946.268975","DOI":"10.1145\/268946.268975"},{"key":"86_CR54","doi-asserted-by":"crossref","unstructured":"Snelting, G.: Combining slicing and constraint solving for validation of measurement software. In: SAS \u201996: Proceedings of the Third International Symposium on Static Analysis, pp. 332\u2013348. Springer, London (1996). doi: 10.1007\/3-540-61739-6_51","DOI":"10.1007\/3-540-61739-6_51"},{"issue":"4","key":"86_CR55","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1145\/1178625.1178628","volume":"15","author":"G. Snelting","year":"2006","unstructured":"Snelting G., Robschink T., Krinke J.: Efficient path conditions in dependence graphs for software safety analysis. ACM Trans. Softw. Eng. Methodol. 15(4), 410\u2013457 (2006). doi: 10.1145\/1178625.1178628","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"86_CR56","doi-asserted-by":"crossref","unstructured":"Volpano, D.M., Smith, G.: A type-based approach to program security. In: TAPSOFT \u201997: Proceedings of the 7th International Joint Conference CAAP\/FASE on Theory and Practice of Software Development. Lecture Notes in Computer Sciences, vol. 1214, pp. 607\u2013621. Springer, London (1997). doi: 10.1007\/BFb0030629","DOI":"10.1007\/BFb0030629"},{"key":"86_CR57","doi-asserted-by":"crossref","unstructured":"Wasserrab, D., Lohner, D., Snelting, G.: On PDG-based noninterference and its modular proof. In: PLAS \u201909: Proceedings of the 4th Workshop on Programming Languages and Analysis for Security. ACM, New York (2009). doi: 10.1145\/1554339.1554345","DOI":"10.1145\/1554339.1554345"},{"issue":"15","key":"86_CR58","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1016\/S0950-5849(02)00127-1","volume":"44","author":"R. Yokomori","year":"2002","unstructured":"Yokomori R., Ohata F., Takata Y., Seki H., Inoue K.: An information-leak analysis system based on program slicing. Inform. Softw. Technol. 44(15), 903\u2013910 (2002). doi: 10.1016\/S0950-5849(02)00127-1","journal-title":"Inform. Softw. Technol."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0086-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-009-0086-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0086-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:01:24Z","timestamp":1559127684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-009-0086-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,27]]},"references-count":58,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["86"],"URL":"https:\/\/doi.org\/10.1007\/s10207-009-0086-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6,27]]}}}