{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:16:41Z","timestamp":1725567401071},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642160738"},{"type":"electronic","value":"9783642160745"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16074-5_5","type":"book-chapter","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T10:11:51Z","timestamp":1286273511000},"page":"59-76","source":"Crossref","is-referenced-by-count":0,"title":["A Type System for Access Control Views in Object-Oriented Languages"],"prefix":"10.1007","author":[{"given":"M\u00e1rio","family":"Pires","sequence":"first","affiliation":[]},{"given":"Lu\u00eds","family":"Caires","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"5_CR1","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1145\/324133.324266","volume":"46","author":"M. Abadi","year":"1999","unstructured":"Abadi, M.: Secrecy by typing in security protocols. J. ACM\u00a046(5), 749\u2013786 (1999)","journal-title":"J. ACM"},{"key":"5_CR2","first-page":"228","volume-title":"Proceedings of LICS 2003","author":"M. Abadi","year":"2003","unstructured":"Abadi, M.: Logic in access control. In: Proceedings of LICS 2003, pp. 228\u2013233. IEEE Computer Society, Los Alamitos (2003)"},{"issue":"4","key":"5_CR3","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst.\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"5_CR4","first-page":"316","volume-title":"Proc. of Foundations of Software Science and Computation Structure 2005","author":"M. Bartoletti","year":"2005","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.: History-based access control with local policies. In: Proc. of Foundations of Software Science and Computation Structure 2005, pp. 316\u2013332. Springer, Heidelberg (2005)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/978-3-540-71389-0_4","volume-title":"Proc. of Foundations of Software Science and Computation Structure 2007","author":"M. Bartoletti","year":"2007","unstructured":"Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Types and effects for resource usage analysis. In: Proc. of Foundations of Software Science and Computation Structure 2007. LNCS, pp. 32\u201347. Springer, Heidelberg (2007)"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/CSF.2008.27","volume-title":"CSF 2008: Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium","author":"J. Bengtson","year":"2008","unstructured":"Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A.D., Maffeis, S.: Refinement types for secure implementations. In: CSF 2008: Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium, pp. 17\u201332. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1093\/comjnl\/44.1.54","volume":"44","author":"J. Crampton","year":"2001","unstructured":"Crampton, J., Loizou, G.: A logic of access control. The Computer Journal\u00a044, 54\u201366 (2001)","journal-title":"The Computer Journal"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/11785477_20","volume-title":"ECOOP 2006 \u2013 Object-Oriented Programming","author":"M. Dezani-Ciancaglini","year":"2006","unstructured":"Dezani-Ciancaglini, M., Mostrous, D., Yoshida, N., Drossopoulou, S.: Session types for object-oriented languages. In: Thomas, D. (ed.) ECOOP 2006. LNCS, vol.\u00a04067, pp. 328\u2013352. Springer, Heidelberg (2006)"},{"issue":"5","key":"5_CR9","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/j.ic.2008.03.028","volume":"207","author":"M. Dezani-Ciancaglini","year":"2009","unstructured":"Dezani-Ciancaglini, M., Drossopoulou, S., Mostrous, D., Yoshida, N.: Objects and session types. Inf. Comput.\u00a0207(5), 595\u2013641 (2009)","journal-title":"Inf. Comput."},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-31987-0_11","volume-title":"Programming Languages and Systems","author":"C. Fournet","year":"2005","unstructured":"Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol.\u00a03444, pp. 141\u2013156. Springer, Heidelberg (2005)"},{"key":"5_CR11","volume-title":"Java(TM) Language Specification","author":"J. Gosling","year":"2005","unstructured":"Gosling, J., Joy, B., Steele, G., Bracha, G.: Java(TM) Language Specification, 3rd edn. (Java (Addison-Wesley)) Addison-Wesley Professional, Reading (2005)","edition":"3"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1007\/3-540-57208-2_35","volume-title":"CONCUR 1993","author":"K. Honda","year":"1993","unstructured":"Honda, K.: Types for dyadic interaction. In: Best, E. (ed.) CONCUR 1993. LNCS, vol.\u00a0715, pp. 509\u2013523. Springer, Heidelberg (1993)"},{"key":"5_CR13","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/1411204.1411212","volume-title":"ICFP 2008: Proceeding of the 13th ACM SIGPLAN international conference on Functional programming","author":"L. Jia","year":"2008","unstructured":"Jia, L., Vaughan, J.A., Mazurak, K., Zhao, J., Zarko, L., Schorr, J., Zdancewic, S.: Aura: a programming language for authorization and audit. In: ICFP 2008: Proceeding of the 13th ACM SIGPLAN international conference on Functional programming, pp. 27\u201338. ACM, New York (2008)"},{"key":"5_CR14","first-page":"284","volume-title":"Mathematical Foundations of Computer Science","author":"D. Kozen","year":"1999","unstructured":"Kozen, D.: Language-based security. In: Mathematical Foundations of Computer Science, pp. 284\u2013298. Springer, Heidelberg (1999)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Nielson, F., Nielson, H.R.: Type and effect systems. In: ACM Computing Surveys, pp. 114\u2013136 (1999)","DOI":"10.1007\/3-540-48092-7_6"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur.\u00a07(1), 128\u2013174 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"5_CR17","unstructured":"Pires, M.: A type system for access control in an object-oriented language. Master\u2019s thesis, Faculdade de Ci\u00eancias e Tecnologia, Universidade Nova de Lisboa (2009)"},{"key":"5_CR18","unstructured":"PLASTIC. Plastic homepage (2009), http:\/\/ctp.di.fct.unl.pt\/PLASTIC\/"},{"key":"5_CR19","first-page":"86","volume-title":"Informatics: 10 Years Back, 10 Years Ahead","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B., Morrisett, G., Harper, R.: A language-based approach to security. In: Informatics: 10 Years Back, 10 Years Ahead, pp. 86\u2013101. Springer, Heidelberg (2000)"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-30477-7_8","volume-title":"Programming Languages and Systems","author":"C. Skalka","year":"2004","unstructured":"Skalka, C., Smith, S.: History effects and verification. In: Chin, W.-N. (ed.) APLAS 2004. LNCS, vol.\u00a03302, pp. 107\u2013128. Springer, Heidelberg (2004)"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Swamy, N., Corcoran, B.J., Hicks, M.: Fable: A language for enforcing user-defined security policies. In: IEEE Symp. on Security and Privacy, Society Press (2008)","DOI":"10.1109\/SP.2008.29"},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1006\/inco.1994.1093","volume":"115","author":"A.K. Wright","year":"1994","unstructured":"Wright, A.K., Felleisen, M.: A syntactic approach to type soundness. Information and Computation\u00a0115, 38\u201394 (1994)","journal-title":"Information and Computation"}],"container-title":["Lecture Notes in Computer Science","Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16074-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T03:34:34Z","timestamp":1636601674000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16074-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642160738","9783642160745"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16074-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}