{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T05:27:19Z","timestamp":1731475639788,"version":"3.28.0"},"reference-count":31,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Inf. Secur."],"published-print":{"date-parts":[[2009,3,9]]},"DOI":"10.1049\/iet-ifs:20080069","type":"journal-article","created":{"date-parts":[[2009,2,16]],"date-time":"2009-02-16T23:17:17Z","timestamp":1234826237000},"page":"9-33","source":"Crossref","is-referenced-by-count":8,"title":["Information flow security, abstraction and composition"],"prefix":"10.1049","volume":"3","author":[{"given":"F.","family":"Seehusen","sequence":"first","affiliation":[{"name":"SINTEF ICT, Oslo, Norway"}]},{"given":"K.","family":"St\u00f8len","sequence":"additional","affiliation":[{"name":"SINTEF ICT, Oslo, Norway"}]}],"member":"265","reference":[{"key":"10.1049\/iet-ifs:20080069_r1","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.entcs.2004.02.006","volume":"99","author":"Bossi","year":"2004","ISSN":"http:\/\/id.crossref.org\/issn\/1571-0661","issn-type":"print"},{"key":"10.1049\/iet-ifs:20080069_r2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/SP.1982.10014","author":"Goguen","year":"1982","journal-title":"Proc. 1982 IEEE Symp. Security and Privacy (S&P'82)"},{"key":"10.1049\/iet-ifs:20080069_r3","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/CSFW.2000.856936","author":"Mantel","year":"2000","journal-title":"IEEE Compuer Security Foundations Workshop (CSFW'00)"},{"key":"10.1049\/iet-ifs:20080069_r4","first-page":"161","author":"McCullough","year":"1987","journal-title":"Proc. IEEE Symp. Security and Privacy (S&P'87)"},{"key":"10.1049\/iet-ifs:20080069_r5","first-page":"147","author":"O'Halloran","year":"1990","journal-title":"Proc. 1st European Symp. Research in Computer Security (ESORICS'90)"},{"key":"10.1049\/iet-ifs:20080069_r6","first-page":"114","author":"Roscoe","year":"1995","journal-title":"Proc. IEEE Symp. Security and Privacy (S&P'95)"},{"key":"10.1049\/iet-ifs:20080069_r7","first-page":"175","author":"Sutherland","year":"1986","journal-title":"Proc. 9th National Computer Security Conf."},{"key":"10.1049\/iet-ifs:20080069_r8","first-page":"94","author":"Zakinthinos","year":"1997","journal-title":"Proc. IEEE Computer Society Symp. Research in Security and Privacy (S&P'97)"},{"key":"10.1049\/iet-ifs:20080069_r9","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1109\/CSFW.2001.930154","author":"Heisel","year":"2001","journal-title":"IEEE Computer Security Foundations Workshop (CSFW-14 2001)"},{"key":"10.1049\/iet-ifs:20080069_r10","first-page":"194","author":"Santen","year":"2002","journal-title":"Proc. 7th European Symp. Research in Computer Security (ESORICS'02)"},{"key":"10.1049\/iet-ifs:20080069_r11","first-page":"225","author":"Santen","year":"2006","journal-title":"Proc. 11th European Symp. Research in Computer Security (ESORICS'06)"},{"key":"10.1049\/iet-ifs:20080069_r12","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.ic.2007.07.008","volume":"206","author":"Santen","year":"2008","ISSN":"http:\/\/id.crossref.org\/issn\/0890-5401","issn-type":"print"},{"key":"10.1049\/iet-ifs:20080069_r13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/CSFW.1991.151567","author":"Graham-Cumming","year":"1991","journal-title":"Proc. IEEE Computer Security Foundations Workshop"},{"key":"10.1049\/iet-ifs:20080069_r14","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/11766155_19","author":"Hutter","year":"2006","journal-title":"Proc. Emerging Trends in Information and Communication Security, Int. Conf. (ETRICS'06)"},{"key":"10.1049\/iet-ifs:20080069_r15","first-page":"242","author":"Jacob","year":"1989","journal-title":"Proc. IEEE Symp. Security and Privacy (S&P'89)"},{"key":"10.1049\/iet-ifs:20080069_r16","first-page":"135","author":"Ju\u0308rjens","year":"2001","journal-title":"Proc. Int. Symp. Formal Methods Europe on Formal Methods for Increasing Software Productivity (FFME'01)"},{"key":"10.1049\/iet-ifs:20080069_r17","unstructured":"Ju\u0308rjens, J.: \u2018Secure systems development with UML\u2019, (Springer 2005)"},{"journal-title":"Proc. Workshop on Issues in the Theory of Security (WITS'07)","year":"2007","author":"Lowe","key":"10.1049\/iet-ifs:20080069_r18"},{"key":"10.1049\/iet-ifs:20080069_r19","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/283699.283743","author":"Hinton","year":"1997","journal-title":"1997 New Security Paradigms Workshop"},{"key":"10.1049\/iet-ifs:20080069_r20","first-page":"177","author":"McCullough","year":"1988","journal-title":"Proc. IEEE Symp. Security and Privacy (S&P'88)"},{"key":"10.1049\/iet-ifs:20080069_r21","first-page":"79","author":"McLean","year":"1994","journal-title":"Proc. IEEE Symp. Research in Security and Privacy (S&P'94)"},{"key":"10.1049\/iet-ifs:20080069_r22","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/CSFW.1995.518546","author":"Zakinthinos","year":"1995","journal-title":"Proc. 8th IEEE Computer Security Foundations Workshop (CSFW'95)"},{"key":"10.1049\/iet-ifs:20080069_r23","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/978-3-540-75227-1_10","author":"Seehusen","year":"2007","journal-title":"Proc. 4th Int. Workshop on Formal Aspects in Security and Trust (FAST'06)"},{"key":"10.1049\/iet-ifs:20080069_r24","first-page":"157","volume":"12","author":"Runde","year":"2005","ISSN":"http:\/\/id.crossref.org\/issn\/1236-6064","issn-type":"print"},{"key":"10.1049\/iet-ifs:20080069_r25","unstructured":"\u2018Why timed sequence diagrams require three-event semantics\u2019, Research Report 309, 2004 Department of Informatics, University of Oslo"},{"key":"10.1049\/iet-ifs:20080069_r26","first-page":"355","volume":"4","author":"Haugen","year":"2005"},{"key":"10.1049\/iet-ifs:20080069_r27","first-page":"150","author":"Seehusen","year":"2006","journal-title":"Proc. 11th ACM Symp. Access Control Models and Technologies (SACMAT'06)"},{"key":"10.1049\/iet-ifs:20080069_r28","first-page":"107","author":"Alur","year":"2006","journal-title":"Proc. 33rd Int. Colloquium on Automata, Languages and Programming (ICALP'06)"},{"key":"10.1049\/iet-ifs:20080069_r29","first-page":"88","author":"Mantel","year":"2002","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"10.1049\/iet-ifs:20080069_r30","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/SEFM.2003.1236206","author":"Bossi","year":"2003","journal-title":"Proc. 1st Int. Conf. Software Engineering and Formal Methods (SEFM'03)"},{"key":"10.1049\/iet-ifs:20080069_r31","first-page":"78","author":"Mantel","year":"2001","journal-title":"IEEE Symp. Security and Privacy"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-ifs_20080069?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T14:13:51Z","timestamp":1731420831000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-ifs%3A20080069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,9]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,3,9]]}},"alternative-id":["10.1049\/iet-ifs:20080069"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs:20080069","relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"type":"print","value":"1751-8709"},{"type":"electronic","value":"1751-8717"}],"subject":[],"published":{"date-parts":[[2009,3,9]]}}}