{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T05:20:29Z","timestamp":1776316829366,"version":"3.50.1"},"reference-count":11,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2002,11,1]],"date-time":"2002-11-01T00:00:00Z","timestamp":1036108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2002,11,1]],"date-time":"2002-11-01T00:00:00Z","timestamp":1036108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":3923,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2002,11]]},"DOI":"10.1016\/s1571-0661(04)00290-7","type":"journal-article","created":{"date-parts":[[2004,1,29]],"date-time":"2004-01-29T05:14:39Z","timestamp":1075353279000},"page":"238-251","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":90,"title":["Quantitative Analysis of the Leakage of Confidential Data"],"prefix":"10.1016","volume":"59","author":[{"given":"David","family":"Clark","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Hunt","sequence":"additional","affiliation":[]},{"given":"Pasquale","family":"Malacaria","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)00290-7_NEWBIB1","series-title":"Numerical Analysis","author":"Richard Burden","year":"1989"},{"key":"10.1016\/S1571-0661(04)00290-7_NEWBIB2","series-title":"Cryptography and Data Security","author":"Denning","year":"1982"},{"key":"10.1016\/S1571-0661(04)00290-7_NEWBIB3","doi-asserted-by":"crossref","unstructured":"James W. Gray III. Toward a mathematical foundation for information flow security. In Proc. 1991 IEEE Symposium on Security and Privacy, pages 21\u201334, Oakland, CA, May 1991.","DOI":"10.1109\/RISP.1991.130769"},{"key":"10.1016\/S1571-0661(04)00290-7_NEWBIB4","unstructured":"James L. Massey. Guessing and entropy. In Proc. IEEE International Symposium on Information Theory, Trondheim, Norway, 1994."},{"key":"10.1016\/S1571-0661(04)00290-7_NEWBIB5","doi-asserted-by":"crossref","unstructured":"Jonathan Millen. Covert channel capacity. In Proc. 1987 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1987.","DOI":"10.1109\/SP.1987.10013"},{"key":"10.1016\/S1571-0661(04)00290-7_NEWBIB6","unstructured":"A. Di Piero, C. Hankin, and H. Wiklicky. Approximate non-interference. In Proceedings of CSFW'02 - 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, 2002."},{"key":"10.1016\/S1571-0661(04)00290-7_NEWBIB7","doi-asserted-by":"crossref","unstructured":"P.Y.A. Ryan, J. McLean, J. Millen, and V. Gilgor. Non-interference, who needs it? In Proceedings of the 14th IEEE Computer Security Foundations Workshop, pages 237\u2013238, Cape Breton, Nova Scotia, Canada, June 2001. IEEE.","DOI":"10.1109\/CSFW.2001.930149"},{"key":"10.1016\/S1571-0661(04)00290-7_NEWBIB8","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","journal-title":"The Bell System Technical Journal"},{"key":"10.1016\/S1571-0661(04)00290-7_NEWBIB9","doi-asserted-by":"crossref","unstructured":"Andrei Sabelfeld and David Sands. A per model of secure information flow in sequential programs. In Proc. European Symposium on Programming, Amsterdam, The Netherlands, March 1999. ACM Press.","DOI":"10.1007\/3-540-49099-X_4"},{"key":"10.1016\/S1571-0661(04)00290-7_NEWBIB10","unstructured":"Andrei Sabelfeld and David Sands. Probabilistic noninterference for multi-threaded programs. In Proc. 13th IEEE Computer Security Foundations Workshop, Cambridge, England, July 2000. IEEE Computer Society Press."},{"key":"10.1016\/S1571-0661(04)00290-7_NEWBIB11","doi-asserted-by":"crossref","unstructured":"Dennis Volpano and Geoffrey Smith. Verifying secrets and relative secrecy. In Proc. 27th ACM Symposium on Principles of Programming Languages, pages 268\u2013276, Boston MA, Jan 2000.","DOI":"10.1145\/325694.325729"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104002907?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104002907?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:04:19Z","timestamp":1761609859000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104002907"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,11]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,11]]}},"alternative-id":["S1571066104002907"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)00290-7","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2002,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Quantitative Analysis of the Leakage of Confidential Data","name":"articletitle","label":"Article Title"},{"value":"Electronic Notes in Theoretical Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S1571-0661(04)00290-7","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2002 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}