{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:36:45Z","timestamp":1775018205896,"version":"3.50.1"},"reference-count":18,"publisher":"Pleiades Publishing Ltd","issue":"4","license":[{"start":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T00:00:00Z","timestamp":1690502400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T00:00:00Z","timestamp":1690502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1134\/s0361768823040114","type":"journal-article","created":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T09:02:21Z","timestamp":1690534941000},"page":"215-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Scenario of Information Flow Analysis Implementation in PL\/SQL Program Units with PLIF Platform"],"prefix":"10.1134","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4306-789X","authenticated-orcid":false,"given":"A. A.","family":"Timakov","sequence":"first","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2023,7,28]]},"reference":[{"key":"3738_CR1","unstructured":"Latham, D.C., Department of defense trusted computer system evaluation criteria, 1986."},{"key":"3738_CR2","unstructured":"Infrastructure, P.K. and Profile, T.P., Common criteria for information technology security evaluation, 2002."},{"key":"3738_CR3","doi-asserted-by":"publisher","first-page":"230","DOI":"10.17587\/prin.11.230-241","volume":"11","author":"P.N. Devyanin","year":"2020","unstructured":"Devyanin, P.N. and Leonova, M.A., Use of subtypes and total functions of the formal Event-B method for description and verification of the MROSL DP model, Program. Inzheneriya, 2020, vol. 11, no. 4, pp. 230\u2013241.","journal-title":"Program. Inzheneriya"},{"key":"3738_CR4","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1134\/S0361768822040053","volume":"48","author":"A.A. Timakov","year":"2022","unstructured":"Timakov, A.A., Information flow control in software DB units based on formal verification, Program. Comput. Software, 2022, vol. 48, pp. 265\u2013285.","journal-title":"Program. Comput. Software"},{"key":"3738_CR5","doi-asserted-by":"crossref","unstructured":"Denning, E.D., A lattice model of secure information flow, Commun. ACM, 1976, no. 5, pp. 236\u2013243.","DOI":"10.1145\/360051.360056"},{"key":"3738_CR6","first-page":"28","volume":"10","author":"S.V. Shaitura","year":"2022","unstructured":"Shaitura, S.V. and Pitkevich, P.N., Data backup methods for critical enterprise information systems, Ross. Tekhnol. Zh., 2022, vol. 10, no. 1, pp. 28\u201334.","journal-title":"Ross. Tekhnol. Zh."},{"key":"3738_CR7","unstructured":"Timakov, A., PLIF, 2021. https:\/\/github.com\/timimin\/plif."},{"key":"3738_CR8","doi-asserted-by":"crossref","unstructured":"Konnov, I., Kukovec, J., and Tran, T.-H., TLA+ model checking made symbolic, Proc. ACM Programming Languages, 2019, vol. 3, pp. 1\u201330.","DOI":"10.1145\/3360549"},{"key":"3738_CR9","doi-asserted-by":"crossref","unstructured":"Broberg, N. and Sands, D., Paralocks: Role-based information flow control and beyond, Conf. Rec. Annu. ACM Symp. Principles of Programming Languages, 2010, pp. 431\u2013444.","DOI":"10.1145\/1706299.1706349"},{"key":"3738_CR10","doi-asserted-by":"crossref","unstructured":"Broberg, N. and Sands, D., Flow locks: Towards a core calculus for dynamic flow policies, Lect. Notes Comput. Sci., 2006, pp. 180\u2013196.","DOI":"10.1007\/11693024_13"},{"key":"3738_CR11","unstructured":"Broberg, N., Practical flexible programming with information flow control, Thesis for the Degree of Doctor of Engineering, 2011."},{"key":"3738_CR12","volume-title":"A perspective on information-flow control","author":"D. Hedin","year":"2012","unstructured":"Hedin, D. and Sabelfeld, A., A perspective on information-flow control, Software Saf. Secur., 2012, pp. 319\u2013347."},{"key":"3738_CR13","unstructured":"Methni, A., Lemerre, M., Hedia, B.B., Barkaoui, K., and Haddad, S., An approach for verifying concurrent C programs, Proc. 8th Jr. Res. Workshop Real-Time Computing, 2014, pp. 33\u201336."},{"key":"3738_CR14","unstructured":"Fernandes, A., tlaplus-graph-explorer, 2021. https:\/\/github.com\/afonsonf\/tlaplusgraph-explorer."},{"key":"3738_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/3300000008","volume":"3","author":"E. Kozyri","year":"2022","unstructured":"Kozyri, E. et al., Expressing information flow properties, Found. Trends Privacy Secur., 2022, vol. 3, no. 1, pp. 1\u2013102.","journal-title":"Found. Trends Privacy Secur."},{"key":"3738_CR16","unstructured":"Kristensen, E., CodeQL, 2022. \nhttps:\/\/github.com\/github\/codeql."},{"key":"3738_CR17","doi-asserted-by":"crossref","unstructured":"Delfit, V.B., Broberg, N., and Sands, D., A Datalog semantics for Paralocks, Lect. Notes Comput. Sci., 2013, pp. 305\u2013320.","DOI":"10.1007\/978-3-642-38004-4_20"},{"key":"3738_CR18","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., and Ullman, J.D., Protection in operating systems, Commun. ACM, 1976, vol.\u00a019, no. 8, pp. 461\u2013471.","journal-title":"Commun. ACM"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768823040114.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768823040114","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768823040114.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:50:59Z","timestamp":1775011859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768823040114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,28]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["3738"],"URL":"https:\/\/doi.org\/10.1134\/s0361768823040114","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,28]]},"assertion":[{"value":"15 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author declares that he has no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}