{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:29:50Z","timestamp":1742383790914},"reference-count":11,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2002,4,1]],"date-time":"2002-04-01T00:00:00Z","timestamp":1017619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Languages, Systems &amp; Structures"],"published-print":{"date-parts":[[2002,4]]},"DOI":"10.1016\/s0096-0551(02)00006-1","type":"journal-article","created":{"date-parts":[[2003,2,4]],"date-time":"2003-02-04T20:48:55Z","timestamp":1044391735000},"page":"3-28","source":"Crossref","is-referenced-by-count":17,"title":["Information flow for Algol-like languages"],"prefix":"10.1016","volume":"28","author":[{"given":"David","family":"Clark","sequence":"first","affiliation":[]},{"given":"Chris","family":"Hankin","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Hunt","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0096-0551(02)00006-1_BIB1","doi-asserted-by":"crossref","unstructured":"Denning D. A lattice model of secure information flow. Communications of the ACM 1976: 236\u201343.","DOI":"10.1145\/360051.360056"},{"key":"10.1016\/S0096-0551(02)00006-1_BIB2","series-title":"Principles of program analysis","author":"Nielson","year":"1999"},{"key":"10.1016\/S0096-0551(02)00006-1_BIB3","doi-asserted-by":"crossref","unstructured":"Danos V, Harmer R. Probabilistic game semantics. Proceedings of the 13th Annual IEEE Symposium on Logic in Computer Science. Silver Spring, MD: IEEE Computer Society Press, 2000.","DOI":"10.1109\/LICS.2000.855770"},{"key":"10.1016\/S0096-0551(02)00006-1_BIB4","unstructured":"Reynolds JC. The essence of Algol. In: de Bakker JW, van Vliet JC, (eds.) Proceedings of the 1981 International Symposium on Algorithmic Languages. Amsterdam: North-Holland, 1981. p. 345\u201372."},{"key":"10.1016\/S0096-0551(02)00006-1_BIB5","doi-asserted-by":"crossref","unstructured":"Nielson F, Nielson HR. Flow logic and operational semantics. Electronic Notes in Theoretical Computer Science 1998; 10.","DOI":"10.1016\/S1571-0661(05)80695-4"},{"key":"10.1016\/S0096-0551(02)00006-1_BIB6","doi-asserted-by":"crossref","unstructured":"Nielson F, Nielson, HR. Flow logic for imperative objects. In: Brim L, Gruska J, Zlatuska J, (eds.) Proceedings of MFCS \u201998, Lecture Notes in Computer Science, vol. 1450. Berlin: Springer, 1998. p. 220\u20138.","DOI":"10.1007\/BFb0055771"},{"key":"10.1016\/S0096-0551(02)00006-1_BIB7","doi-asserted-by":"crossref","unstructured":"Volpano D, Smith G. Eliminating covert flows with minimum typings. In: Proceedings of the Tenth IEEE Computer Security Foundations Workshop, Rockport, MA. Silver Spring, MD: IEEE Computer Society Press, 1997. p. 156\u201368.","DOI":"10.1109\/CSFW.1997.596807"},{"key":"10.1016\/S0096-0551(02)00006-1_BIB8","doi-asserted-by":"crossref","unstructured":"Smith G. A new type system for secure information flow. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop. Silver Spring, MD: IEEE Computer Society Press, 2001.","DOI":"10.1109\/CSFW.2001.930141"},{"key":"10.1016\/S0096-0551(02)00006-1_BIB9","doi-asserted-by":"crossref","unstructured":"Honda K, Yoshida N. A uniform type structure for secure information flow. In: POPL\u201902. New York: ACM Press, 2002.","DOI":"10.1145\/503272.503281"},{"key":"10.1016\/S0096-0551(02)00006-1_BIB10","unstructured":"Volpano D, Smith G. Probablistic noninterference in a concurrent language, In: Proceedings of the 11th IEEE Computer Security Foundations Workshop, Rockport, MA. Silver Spring, MD: IEEE Computer Society Press, 1998, p. 34\u201343."},{"key":"10.1016\/S0096-0551(02)00006-1_BIB11","doi-asserted-by":"crossref","unstructured":"Sabelfeld A, Sands D. Probablistic noninterference for multi-threaded programs. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, Cambridge, England, Silver Spring, MD: IEEE Computer Society Press, 2000.","DOI":"10.1109\/CSFW.2000.856937"}],"container-title":["Computer Languages, Systems &amp; Structures"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096055102000061?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096055102000061?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,2]],"date-time":"2019-04-02T13:23:41Z","timestamp":1554211421000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0096055102000061"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,4]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2002,4]]}},"alternative-id":["S0096055102000061"],"URL":"https:\/\/doi.org\/10.1016\/s0096-0551(02)00006-1","relation":{},"ISSN":["1477-8424"],"issn-type":[{"value":"1477-8424","type":"print"}],"subject":[],"published":{"date-parts":[[2002,4]]}}}