{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:44:27Z","timestamp":1764305067759,"version":"build-2065373602"},"reference-count":11,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2002,6,1]],"date-time":"2002-06-01T00:00:00Z","timestamp":1022889600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2002,6,1]],"date-time":"2002-06-01T00:00:00Z","timestamp":1022889600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":4076,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2002,6]]},"DOI":"10.1016\/s1571-0661(04)00329-9","type":"journal-article","created":{"date-parts":[[2004,2,5]],"date-time":"2004-02-05T05:34:35Z","timestamp":1075959275000},"page":"229-243","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":14,"special_numbering":"C","title":["Formal Models of Timing Attacks on Web Privacy"],"prefix":"10.1016","volume":"62","author":[{"given":"Riccardo","family":"Focardi","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Gorrieri","sequence":"additional","affiliation":[]},{"given":"Ruggero","family":"Lanotte","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Maggiolo-Schettini","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Tini","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Tronci","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)00329-9_NEWBIB1","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","article-title":"A theory of timed automata","volume":"126","author":"Alur","year":"1994","journal-title":"Theoretical Computer Science"},{"key":"10.1016\/S1571-0661(04)00329-9_NEWBIB2","doi-asserted-by":"crossref","DOI":"10.1016\/0890-5401(92)90017-A","article-title":"Symbolic model checking: 1020 states and beyond","volume":"98","author":"Burch","year":"1992","journal-title":"Information and Computation"},{"key":"10.1016\/S1571-0661(04)00329-9_NEWBIB3","doi-asserted-by":"crossref","unstructured":"Felten, E.W., and M.A. Schneider: Timing attacks on Web privacy. Proc. 7th ACM Conference on Computer and Communications Security, 25\u201332, 2000.","DOI":"10.1145\/352600.352606"},{"issue":"9","key":"10.1016\/S1571-0661(04)00329-9_NEWBIB4","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1109\/32.629493","article-title":"The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties","volume":"23","author":"Focardi","year":"1997","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S1571-0661(04)00329-9_NEWBIB5","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","article-title":"A classification of security properties for process algebras","volume":"3","author":"Focardi","year":"1995","journal-title":"Journal of Computer Security"},{"key":"10.1016\/S1571-0661(04)00329-9_NEWBIB6","unstructured":"Focardi R., R. Gorrieri, and F. Martinelli: Information flow analysis in a discrete-time process algebra. Proc. 13th Computer Security Foundation Workshop, IEEE Computer Society Press, 2000."},{"key":"10.1016\/S1571-0661(04)00329-9_NEWBIB7","doi-asserted-by":"crossref","unstructured":"Lanotte R., A. Maggiolo-Schettini, and S. Tini: Privacy in real-time systems. Proc. MTCS'01. Electronic Notes in Theoretical Computer Science 52.3 (2001).","DOI":"10.1016\/S1571-0661(04)00229-4"},{"year":"1993","series-title":"Symbolic model checking","author":"McMillan","key":"10.1016\/S1571-0661(04)00329-9_NEWBIB8"},{"key":"10.1016\/S1571-0661(04)00329-9_NEWBIB9","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/300307.300311","article-title":"Confinement properties for programming languages","volume":"29","author":"Volpano","year":"1998","journal-title":"SIGACT News"},{"key":"10.1016\/S1571-0661(04)00329-9_NEWBIB10","doi-asserted-by":"crossref","unstructured":"Smith G., and D. Volpano: Secure information flow in a multi-threaded imperative language. Proc. ACM Symposium on Principles of Programming Languages, 1998, 355\u2013364.","DOI":"10.1145\/268946.268975"},{"key":"10.1016\/S1571-0661(04)00329-9_NEWBIB11","unstructured":"URL: http:\/\/www.cs.cmu.edu\/~modelcheck\/."}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104003299?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104003299?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:04:41Z","timestamp":1761609881000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104003299"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,6]]},"references-count":11,"alternative-id":["S1571066104003299"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)00329-9","relation":{},"ISSN":["1571-0661"],"issn-type":[{"type":"print","value":"1571-0661"}],"subject":[],"published":{"date-parts":[[2002,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Formal Models of Timing Attacks on Web Privacy","name":"articletitle","label":"Article Title"},{"value":"Electronic Notes in Theoretical Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S1571-0661(04)00329-9","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2002 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}