{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:35:44Z","timestamp":1725579344265},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642197178"},{"type":"electronic","value":"9783642197185"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19718-5_8","type":"book-chapter","created":{"date-parts":[[2011,3,14]],"date-time":"2011-03-14T14:17:15Z","timestamp":1300112235000},"page":"136-155","source":"Crossref","is-referenced-by-count":4,"title":["Type-Based Access Control in Data-Centric Systems"],"prefix":"10.1007","author":[{"given":"Lu\u00eds","family":"Caires","sequence":"first","affiliation":[]},{"given":"Jorge A.","family":"P\u00e9rez","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o Costa","family":"Seco","sequence":"additional","affiliation":[]},{"given":"Hugo Torres","family":"Vieira","sequence":"additional","affiliation":[]},{"given":"L\u00facio","family":"Ferr\u00e3o","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/BFb0055109","volume-title":"Automata, Languages and Programming","author":"M. Abadi","year":"1998","unstructured":"Abadi, M.: Protection in Programming-Language Translations. In: Larsen, K.G., Skyum, S., Winskel, G. (eds.) ICALP 1998. LNCS, vol.\u00a01443, pp. 868\u2013883. Springer, Heidelberg (1998)"},{"key":"8_CR2","first-page":"263","volume-title":"Proc. of ICFP 2006","author":"M. Abadi","year":"2006","unstructured":"Abadi, M.: Access Control in a Core Calculus of Dependency. In: Reppy, J.H., Lawall, J.L. (eds.) Proc. of ICFP 2006, pp. 263\u2013273. ACM, New York (2006)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/978-3-642-03829-7_5","volume-title":"Proc. of FOSAD","author":"M. Abadi","year":"2009","unstructured":"Abadi, M.: Logic in Access Control (Tutorial Notes). In: Proc. of FOSAD. LNCS, vol.\u00a05705, pp. 145\u2013165. Springer, Heidelberg (2009)"},{"issue":"4","key":"8_CR4","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B.W., Plotkin, G.D.: A Calculus for Access Control in Distributed Systems. ACM Trans. Program. Lang. Syst.\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"8_CR5","first-page":"27","volume-title":"Proc. of TLDI 2009","author":"I.G. Baltopoulos","year":"2009","unstructured":"Baltopoulos, I.G., Gordon, A.D.: Secure Compilation of a Multi-Tier Web Language. In: Proc. of TLDI 2009, pp. 27\u201338. ACM, New York (2009)"},{"key":"8_CR6","first-page":"17","volume-title":"Proc. of CSF 2008","author":"J. Bengtson","year":"2008","unstructured":"Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A.D., Maffeis, S.: Refinement Types for Secure Implementations. In: Proc. of CSF 2008, pp. 17\u201332. IEEE Computer Society, Los Alamitos (2008)"},{"key":"8_CR7","first-page":"105","volume-title":"Proc. of ICFP 2010","author":"G.M. Bierman","year":"2010","unstructured":"Bierman, G.M., Gordon, A.D., Hritcu, C., Langworthy, D.: Semantic Subtyping with an SMT Solver. In: Proc. of ICFP 2010, pp. 105\u2013116. ACM, New York (2010)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/11531142_13","volume-title":"ECOOP 2005 - Object-Oriented Programming","author":"G. Bierman","year":"2005","unstructured":"Bierman, G., Meijer, E., Schulte, W.: The Essence of Data Access in C\u03c9. In: Gao, X.-X. (ed.) ECOOP 2005. LNCS, vol.\u00a03586, pp. 287\u2013311. Springer, Heidelberg (2005)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Caires, L., P\u00e9rez, J.A., Seco, J.C., Vieira, H.T., Ferr\u00e3o, L.: Type-based Access Control in Data-Centric Systems. Technical Report DIFCTUNL 3\/10, U. Nova de Lisboa (2010)","DOI":"10.1007\/978-3-642-19718-5_8"},{"key":"8_CR10","unstructured":"Chlipala, A.: Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications. In: Proc. of OSDI 2010, USENIX Association (2010)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-540-74792-5_12","volume-title":"Formal Methods for Components and Objects","author":"E. Cooper","year":"2007","unstructured":"Cooper, E., Lindley, S., Wadler, P., Yallop, J.: Links: Web Programming Without Tiers. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2006. LNCS, vol.\u00a04709, pp. 266\u2013296. Springer, Heidelberg (2007)"},{"key":"8_CR12","first-page":"269","volume-title":"SIGMOD Conference 2009","author":"B.J. Corcoran","year":"2009","unstructured":"Corcoran, B.J., Swamy, N., Hicks, M.W.: Cross-Tier, Label-Based Security Enforcement for Web Applications. In: SIGMOD Conference 2009, pp. 269\u2013282. ACM, New York (2009)"},{"key":"8_CR13","first-page":"268","volume-title":"Proc. of PLDI 1991","author":"T. Freeman","year":"1991","unstructured":"Freeman, T., Pfenning, F.: Refinement Types for ML. In: Proc. of PLDI 1991, pp. 268\u2013277. ACM, New York (1991)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/11863908_19","volume-title":"Computer Security \u2013 ESORICS 2006","author":"D. Garg","year":"2006","unstructured":"Garg, D., Bauer, L., Bowers, K.D., Pfenning, F., Reiter, M.K.: A Linear Logic of Authorization and Knowledge. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 297\u2013312. Springer, Heidelberg (2006)"},{"key":"8_CR15","unstructured":"Gordon, A.D., Fournet, C.: Principles and Applications of Refinement Types. Technical Report MSR-TR-2009-147, Microsoft Research (2009)"},{"key":"8_CR16","first-page":"706","volume-title":"SIGMOD Conference 2006","author":"E. Meijer","year":"2006","unstructured":"Meijer, E., Beckman, B., Bierman, G.: LINQ: Reconciling Object, Relations and XML in the .NET Framework. In: SIGMOD Conference 2006, pp. 706\u2013706. ACM, New York (2006)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/978-3-642-11957-6_28","volume-title":"Programming Languages and Systems","author":"N. Swamy","year":"2010","unstructured":"Swamy, N., Chen, J., Chugh, R.: Enforcing Stateful Authorization and Information Flow Policies in Fine. In: Gordon, A.D. (ed.) ESOP 2010. LNCS, vol.\u00a06012, pp. 529\u2013549. Springer, Heidelberg (2010)"},{"key":"8_CR18","first-page":"369","volume-title":"Proc. of IEEE S&P 2008","author":"N. Swamy","year":"2008","unstructured":"Swamy, N., Corcoran, B.J., Hicks, M.: Fable: A Language for Enforcing User-defined Security Policies. In: Proc. of IEEE S&P 2008, pp. 369\u2013383. IEEE Computer Society, Los Alamitos (2008)"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1006\/inco.1994.1093","volume":"115","author":"A.K. Wright","year":"1994","unstructured":"Wright, A.K., Felleisen, M.: A Syntactic Approach to Type Soundness. Information and Computation\u00a0115, 38\u201394 (1994)","journal-title":"Information and Computation"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19718-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T08:50:49Z","timestamp":1637398249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19718-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642197178","9783642197185"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19718-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}