{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:03Z","timestamp":1772163963290,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,11,14]],"date-time":"2004-11-14T00:00:00Z","timestamp":1100390400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,11,14]]},"DOI":"10.1145\/1032297.1032305","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T12:55:16Z","timestamp":1107089716000},"page":"39-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Enforcing security and safety models with an information flow analysis tool"],"prefix":"10.1145","author":[{"given":"Roderick","family":"Chapman","sequence":"first","affiliation":[{"name":"Praxis Critical Systems Ltd., Bath, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adrian","family":"Hilton","sequence":"additional","affiliation":[{"name":"Praxis Critical Systems Ltd., Bath, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2004,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Security engineering: a guide to building dependable distributed systems","author":"Anderson R. J.","year":"2001","unstructured":"R. J. Anderson . Security engineering: a guide to building dependable distributed systems . Wiley Computer Publishing , 2001 . ISBN 0-471-38922-6. R. J. Anderson. Security engineering: a guide to building dependable distributed systems. Wiley Computer Publishing, 2001. ISBN 0-471-38922-6."},{"key":"e_1_3_2_1_2_1","volume-title":"High Integrity Software: The SPARK Approach to Safety And Security","author":"Barnes J.","year":"2003","unstructured":"J. Barnes . High Integrity Software: The SPARK Approach to Safety And Security . Addison Wesley , April 2003 . J. Barnes. High Integrity Software: The SPARK Approach to Safety And Security. Addison Wesley, April 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2363.2366"},{"key":"e_1_3_2_1_5_1","volume-title":"August","author":"Criteria Common","year":"1999","unstructured":"Common Criteria . Common Criteria for Information Technology Security Evaluation , August 1999 . Common Criteria. Common Criteria for Information Technology Security Evaluation, August 1999."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.976937"},{"key":"e_1_3_2_1_8_1","volume-title":"Functional Safety of Electrical \/ Electronic \/ Programmable Electronic Safety-Related Systems","author":"International Electrotechnical Commission","year":"2000","unstructured":"International Electrotechnical Commission . IEC Standard 61508 , Functional Safety of Electrical \/ Electronic \/ Programmable Electronic Safety-Related Systems , March 2000 . International Electrotechnical Commission. IEC Standard 61508, Functional Safety of Electrical \/ Electronic \/ Programmable Electronic Safety-Related Systems, March 2000."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.879807"},{"key":"e_1_3_2_1_10_1","volume-title":"December","author":"RTCA","year":"1992","unstructured":"RTCA \/ EUROCAE. RTCA DO-178B \/ EUROCAE ED-12 : Software Considerations in Airborne Systems and Equipment Certification , December 1992 . RTCA \/ EUROCAE. RTCA DO-178B \/ EUROCAE ED-12: Software Considerations in Airborne Systems and Equipment Certification, December 1992."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"}],"event":{"name":"SIGAda '04: ACM SIGAda Annual International Conference","location":"Atlanta Georgia USA","acronym":"SIGAda '04","sponsor":["ACM Association for Computing Machinery","SIGAda ACM Special Interest Group on Ada Programming Language","SIGAPP ACM Special Interest Group on Applied Computing","SIGPLAN ACM Special Interest Group on Programming Languages","SIGSOFT ACM Special Interest Group on Software Engineering","SIGCAS ACM Special Interest Group on Computers and Society","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2004 annual ACM SIGAda international conference on Ada: The engineering of correct and reliable software for real-time &amp; distributed systems using Ada and related technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1032297.1032305","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1032297.1032305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:23:58Z","timestamp":1750253038000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1032297.1032305"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,11,14]]},"references-count":10,"alternative-id":["10.1145\/1032297.1032305","10.1145\/1032297"],"URL":"https:\/\/doi.org\/10.1145\/1032297.1032305","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1046191.1032305","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2004,11,14]]},"assertion":[{"value":"2004-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}