{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T06:53:19Z","timestamp":1773557599728,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642407864","type":"print"},{"value":"9783642407871","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40787-1_2","type":"book-chapter","created":{"date-parts":[[2013,9,18]],"date-time":"2013-09-18T23:18:35Z","timestamp":1379546315000},"page":"21-39","source":"Crossref","is-referenced-by-count":2,"title":["Informative Types and Effects for Hybrid Migration Control"],"prefix":"10.1007","author":[{"given":"Ana","family":"Almeida Matos","sequence":"first","affiliation":[]},{"given":"Jan","family":"Cederquist","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: 1982 IEEE Symp. on Security and Privacy, pp. 11\u201320. IEEE Computer Society (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"2_CR3","unstructured":"Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. In: 18th IEEE Computer Security Foundations Workshop, pp. 255\u2013269. IEEE Computer Society (2005)"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-31794-4_11","volume-title":"Global Computing","author":"G. Boudol","year":"2005","unstructured":"Boudol, G.: A generic membrane model (Note). In: Priami, C., Quaglia, P. (eds.) GC 2004. LNCS, vol.\u00a03267, pp. 208\u2013222. Springer, Heidelberg (2005)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/11580850_7","volume-title":"Trustworthy Global Computing","author":"F. Martins","year":"2005","unstructured":"Martins, F., Vasconcelos, V.T.: History-based access control for distributed processes. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, vol.\u00a03705, pp. 98\u2013115. Springer, Heidelberg (2005)"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-04081-8_5","volume-title":"CONCUR 2009 - Concurrency Theory","author":"A. Almeida Matos","year":"2009","unstructured":"Almeida Matos, A.: Flow policy awareness for distributed mobile code. In: Bravetti, M., Zavattaro, G. (eds.) CONCUR 2009. LNCS, vol.\u00a05710, pp. 53\u201368. Springer, Heidelberg (2009)"},{"issue":"5","key":"2_CR7","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Communications of the ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Communications of the ACM"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Matosand, A.A., Santos, J.F.: Typing illegal information flows as program effects. In: Proceedings of the 7th Workshop on Programming Languages and Analysis for Security, PLAS 2012, pp. 1:1\u20131:12. ACM (2012)","DOI":"10.1145\/2336717.2336718"},{"issue":"5","key":"2_CR9","doi-asserted-by":"crossref","first-page":"549","DOI":"10.3233\/JCS-2009-0355","volume":"17","author":"A.A. Matos","year":"2009","unstructured":"Matos, A.A., Boudol, G.: On declassification and the non-disclosure policy. Journal of Computer Security\u00a017(5), 549\u2013597 (2009)","journal-title":"Journal of Computer Security"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Lucassen, J.M., Gifford, D.K.: Polymorphic effect systems. In: 15th ACM Symp. on Principles of Programming Languages, pp. 47\u201357. ACM Press (1988)","DOI":"10.1145\/73560.73564"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Mairson, H.G.: Deciding ml typability is complete for deterministic exponential time. In: Proceedings of the 17th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 1990, pp. 382\u2013401. ACM (1990)","DOI":"10.1145\/96709.96748"},{"key":"2_CR12","doi-asserted-by":"crossref","first-page":"517","DOI":"10.3233\/JCS-2009-0352","volume":"17","author":"A. Sabelfeld","year":"2009","unstructured":"Sabelfeld, A., Sands, D.: Declassification: Dimensions and principles. J. Comput. Secur.\u00a017, 517\u2013548 (2009)","journal-title":"J. Comput. Secur."},{"key":"2_CR13","series-title":"CCIS","first-page":"85","volume-title":"MMM-ACNS 2007","author":"G. Boudol","year":"2007","unstructured":"Boudol, G., Kolundzija, M.: Access Control and Declassification. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) MMM-ACNS 2007. CCIS, vol.\u00a01, pp. 85\u201398. Springer, Heidelberg (2007)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1007\/3-540-36576-1_18","volume-title":"Foundations of Software Science and Computational Structures","author":"M. Hennessy","year":"2003","unstructured":"Hennessy, M., Merro, M., Rathke, J.: Towards a behavioural theory of access and mobility control in distributed systems. In: Gordon, A.D. (ed.) FOSSACS 2003. LNCS, vol.\u00a02620, pp. 282\u2013298. Springer, Heidelberg (2003)"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1145\/325694.325741","volume-title":"POPL 2000: Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"F. Levi","year":"2000","unstructured":"Levi, F., Sangiorgi, D.: Controlling interference in ambients. In: POPL 2000: Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 352\u2013364. ACM, New York (2000)"},{"issue":"1","key":"2_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/640128.604136","volume":"38","author":"A. Schmitt","year":"2003","unstructured":"Schmitt, A., Stefani, J.-B.: The m-calculus: a higher-order distributed process calculus. SIGPLAN Not\u00a038(1), 50\u201361 (2003)","journal-title":"SIGPLAN Not"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Gorla, D., Hennessy, M., Sassone, V.: Security policies as membranes in systems for global computing. In: Foundations of Global Ubiquitous Computing, FGUC 2004. ENTCS, pp. 23\u201342. Elsevier (2005)","DOI":"10.1016\/j.entcs.2005.05.003"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Moore, S., Chong, S.: Static analysis for efficient hybrid information-flow control. In: Proceedings of the 2011 IEEE 24th Computer Security Foundations Symposium, CSF 2011, pp. 146\u2013160. IEEE Computer Society (2011)","DOI":"10.1109\/CSF.2011.17"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Askarov, A., Sabelfeld, A.: Tight enforcement of information-release policies for dynamic languages. In: Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium, CSF 2009, pp. 43\u201359. IEEE Computer Society (2009)","DOI":"10.1109\/CSF.2009.22"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40787-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T11:44:48Z","timestamp":1558093488000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40787-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407864","9783642407871"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40787-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}