{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:43:06Z","timestamp":1774946586354,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,9]],"date-time":"2009-11-09T00:00:00Z","timestamp":1257724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,9]]},"DOI":"10.1145\/1653662.1653673","type":"proceedings-article","created":{"date-parts":[[2009,11,11]],"date-time":"2009-11-11T13:02:08Z","timestamp":1257944528000},"page":"79-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":63,"title":["Reactive noninterference"],"prefix":"10.1145","author":[{"given":"Aaron","family":"Bohannon","sequence":"first","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Benjamin C.","family":"Pierce","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Vilhelm","family":"Sj\u00f6berg","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Stephanie","family":"Weirich","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Steve","family":"Zdancewic","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_22"},{"key":"e_1_3_2_1_2_1","volume-title":"Formal Aspects of Security and Trust (FAST) '08","author":"Clark D.","year":"2008","unstructured":"D. Clark and S. Hunt . Non-interference for deterministic interactive programs . In Formal Aspects of Security and Trust (FAST) '08 , 2008 . D. Clark and S. Hunt. Non-interference for deterministic interactive programs. In Formal Aspects of Security and Trust (FAST) '08, 2008."},{"key":"e_1_3_2_1_3_1","unstructured":"Coq Development Team. The Coq Proof Assistant Reference Manual v8.1. http:\/\/coq.inria.fr\/.  Coq Development Team. The Coq Proof Assistant Reference Manual v8.1. http:\/\/coq.inria.fr\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2699879.2699882"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1984.10019"},{"key":"e_1_3_2_1_7_1","first-page":"170","volume-title":"Probabilistic interference","author":"Gray I.","year":"1990","unstructured":"I. Gray , J. W. Probabilistic interference . pages 170 -- 179 , May 1990 . I. Gray, J.W. Probabilistic interference. pages 170--179, May 1990."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1410234.1410239"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792878.1792903"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135884"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242655"},{"key":"e_1_3_2_1_12_1","first-page":"62","article-title":"A tutorial on (co)algebras and (co)induction","volume":"62","author":"Jacobs B.","year":"1997","unstructured":"B. Jacobs and J. Rutten . A tutorial on (co)algebras and (co)induction . EATCS Bulletin , 62 : 62 -- 222 , 1997 . B. Jacobs and J. Rutten. A tutorial on (co)algebras and (co)induction. EATCS Bulletin, 62:62--222, 1997.","journal-title":"EATCS Bulletin"},{"key":"e_1_3_2_1_13_1","volume-title":"In Proceeding of the Workshop on Foundations of Computer Security","author":"Matos A. A.","year":"2004","unstructured":"A. A. Matos , G. Boudol , and I. Castellani . Typing noninterference for reactive programs . In In Proceeding of the Workshop on Foundations of Computer Security , 2004 . A. A. Matos, G. Boudol, and I. Castellani. Typing noninterference for reactive programs. In In Proceeding of the Workshop on Foundations of Computer Security, 2004."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1988.8110"},{"key":"e_1_3_2_1_15_1","volume-title":"Jan.","author":"Miller M. S.","year":"2008","unstructured":"M. S. Miller , M. Samuel , B. Laurie , I. Awad , and M. Stay . Caja: Safe active content in sanitized JavaScript. A Google research project ., Jan. 2008 . M. S. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay. Caja: Safe active content in sanitized JavaScript. A Google research project., Jan. 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.16"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/596980.596983"},{"key":"e_1_3_2_1_18_1","volume-title":"Sixth Workshop on Hot Topics in Networks (HotNets-VI)","author":"Reis C.","year":"2007","unstructured":"C. Reis , S. D. Gribble , and H. M. Levy . Architectural principles for safe web programs . Presented at the Sixth Workshop on Hot Topics in Networks (HotNets-VI) , Nov. 2007 . C. Reis, S. D. Gribble, and H. M. Levy. Architectural principles for safe web programs. Presented at the Sixth Workshop on Hot Topics in Networks (HotNets-VI), Nov. 2007."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_20_1","unstructured":"Same origin policy for JavaScript. http:\/\/www.mozilla.org\/projects\/security\/components\/same-origin.html.  Same origin policy for JavaScript. http:\/\/www.mozilla.org\/projects\/security\/components\/same-origin.html."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/353629.353648"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884373"}],"event":{"name":"CCS '09: 16th ACM Conference on Computer and Communications Security 2009","location":"Chicago Illinois USA","acronym":"CCS '09","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 16th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653673","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1653662.1653673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:52Z","timestamp":1750253932000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653673"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,9]]},"references-count":22,"alternative-id":["10.1145\/1653662.1653673","10.1145\/1653662"],"URL":"https:\/\/doi.org\/10.1145\/1653662.1653673","relation":{},"subject":[],"published":{"date-parts":[[2009,11,9]]},"assertion":[{"value":"2009-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}