{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:12Z","timestamp":1750307172988,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,5]],"date-time":"2011-06-05T00:00:00Z","timestamp":1307232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,5]]},"DOI":"10.1145\/2166956.2166961","type":"proceedings-article","created":{"date-parts":[[2012,3,20]],"date-time":"2012-03-20T12:04:21Z","timestamp":1332245061000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Capabilities for information flow"],"prefix":"10.1145","author":[{"given":"Arnar","family":"Birgisson","sequence":"first","affiliation":[{"name":"Chalmers University of Technology"}]},{"given":"Alejandro","family":"Russo","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology"}]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2011,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1554339.1554353"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814217.1814220"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/944705.944715"},{"key":"e_1_3_2_1_5_1","first-page":"48","volume-title":"Unifying Facets of Information Integrity. In Information Systems Security: 6th International Conference, ICISS 2010","volume":"6503","author":"Birgisson A.","year":"2010","unstructured":"A. Birgisson , A. Russo , and A. Sabelfeld . Unifying Facets of Information Integrity. In Information Systems Security: 6th International Conference, ICISS 2010 , volume 6503 of LNCS, pages 48 -- 65 . Springer-Verlag , 2010 . A. Birgisson, A. Russo, and A. Sabelfeld. Unifying Facets of Information Integrity. In Information Systems Security: 6th International Conference, ICISS 2010, volume 6503 of LNCS, pages 48--65. Springer-Verlag, 2010."},{"key":"e_1_3_2_1_6_1","volume-title":"Capabilities for information flow. Technical report","author":"Birgisson A.","year":"2011","unstructured":"A. Birgisson , A. Russo , and A. Sabelfeld . Capabilities for information flow. Technical report , Chalmers University of Technology , Apr. 2011 . Located at http:\/\/www.cse.chalmers.se\/~russo\/flowcaps-tr.pdf. A. Birgisson, A. Russo, and A. Sabelfeld. Capabilities for information flow. Technical report, Chalmers University of Technology, Apr. 2011. Located at http:\/\/www.cse.chalmers.se\/~russo\/flowcaps-tr.pdf."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.21"},{"key":"e_1_3_2_1_8_1","first-page":"297","volume-title":"R. A. DeMillo","author":"Cohen E. S.","year":"1978","unstructured":"E. S. Cohen . Information transmission in sequential programs. In R. A. DeMillo , D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297 -- 335 . Academic Press , 1978 . E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297--335. Academic Press, 1978."},{"key":"e_1_3_2_1_9_1","volume-title":"ad-safe.org","author":"Crockford D.","year":"2009","unstructured":"D. Crockford . Making javascript safe for advertising. ad-safe.org , 2009 . D. Crockford. Making javascript safe for advertising. ad-safe.org, 2009."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/365230.365252"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.15"},{"key":"e_1_3_2_1_13_1","unstructured":"The E language. http:\/\/erights.org\/elang\/.  The E language. http:\/\/erights.org\/elang\/."},{"key":"e_1_3_2_1_14_1","volume-title":"Standard ECMA-262","author":"International ECMA","year":"2009","unstructured":"ECMA International . Standard ECMA-262 , 5 th edition, 2009 . ECMA International. Standard ECMA-262, 5th edition, 2009.","edition":"5"},{"key":"e_1_3_2_1_15_1","volume-title":"http:\/\/wiki.ecmascript.org\/doku.php?id=ses:ses","author":"Secure","year":"2009","unstructured":"Secure ecmascript. http:\/\/wiki.ecmascript.org\/doku.php?id=ses:ses , 2009 . Secure ecmascript. http:\/\/wiki.ecmascript.org\/doku.php?id=ses:ses, 2009."},{"key":"e_1_3_2_1_16_1","volume-title":"Cornell University","author":"Erlingsson U.","year":"2004","unstructured":"U. Erlingsson . The inlined reference monitor approach to security policy enforcement. PhD thesis , Cornell University , Ithaca, NY, USA , 2004 . U. Erlingsson. The inlined reference monitor approach to security policy enforcement. PhD thesis, Cornell University, Ithaca, NY, USA, 2004."},{"key":"e_1_3_2_1_17_1","volume-title":"http:\/\/wiki.developers.facebook.com\/index.php\/FBJS","author":"FBJS.","year":"2009","unstructured":"FBJS. http:\/\/wiki.developers.facebook.com\/index.php\/FBJS , 2009 . FBJS. http:\/\/wiki.developers.facebook.com\/index.php\/FBJS, 2009."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/17.2.143"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111596.1111601"},{"key":"e_1_3_2_1_22_1","volume-title":"Universit catholique de Louvain","author":"Jaradin Y.","year":"2005","unstructured":"Y. Jaradin , F. Spiessens , and P. V. Roy . SCOLL: A language for safe capability based collaboration. Technical report , Universit catholique de Louvain , 2005 . Y. Jaradin, F. Spiessens, and P. V. Roy. SCOLL: A language for safe capability based collaboration. Technical report, Universit catholique de Louvain, 2005."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1554339.1554344"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. Asian Computing Science Conference (ASIAN'06)","volume":"4435","author":"Guernic G. Le","year":"2006","unstructured":"G. Le Guernic , A. Banerjee , T. Jensen , and D. Schmidt . Automata-based confidentiality monitoring . In Proc. Asian Computing Science Conference (ASIAN'06) , volume 4435 of LNCS. Springer-Verlag , 2006 . G. Le Guernic, A. Banerjee, T. Jensen, and D. Schmidt. Automata-based confidentiality monitoring. In Proc. Asian Computing Science Conference (ASIAN'06), volume 4435 of LNCS. Springer-Verlag, 2006."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268979"},{"key":"e_1_3_2_1_26_1","volume-title":"Capability-Based Computer Systems. Butterworth-Heinemann","author":"Levy H. M.","year":"1984","unstructured":"H. M. Levy . Capability-Based Computer Systems. Butterworth-Heinemann , 1984 . H. M. Levy. Capability-Based Computer Systems. Butterworth-Heinemann, 1984."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.16"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755691"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15257-3_16"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA462529"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.48795"},{"key":"e_1_3_2_1_32_1","volume-title":"The Joe-E language specification (draft). Technical report","author":"Mettler A.","year":"2006","unstructured":"A. Mettler and D. Wagner . The Joe-E language specification (draft). Technical report , U. C. Berkeley , 2006 . A. Mettler and D. Wagner. The Joe-E language specification (draft). Technical report, U. C. Berkeley, 2006."},{"key":"e_1_3_2_1_34_1","volume-title":"Caja: Safe active content in sanitized javascript","author":"Miller M.","year":"2008","unstructured":"M. Miller , M. Samuel , B. Laurie , I. Awad , and M. Stay . Caja: Safe active content in sanitized javascript , 2008 . M. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay. Caja: Safe active content in sanitized javascript, 2008."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_37_1","unstructured":"Programmable web. http:\/\/programmableweb.com.  Programmable web. http:\/\/programmableweb.com."},{"key":"e_1_3_2_1_38_1","volume-title":"A security kernel based on the lambda-calculus. Technical report","author":"Rees J. A.","year":"1996","unstructured":"J. A. Rees . A security kernel based on the lambda-calculus. Technical report , Massachusetts Institute of Technology , 1996 . J. A. Rees. A security kernel based on the lambda-calculus. Technical report, Massachusetts Institute of Technology, 1996."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.20"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27937-9_16"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11486-1_30"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1662658.1662659"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1986262.1986276"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/C5.2007.13"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/353629.353648"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/151145"}],"event":{"name":"PLDI '11: ACM SIGPLAN Conference on Programming Language Design and Implementation","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"San Jose California","acronym":"PLDI '11"},"container-title":["Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2166956.2166961","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2166956.2166961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:48Z","timestamp":1750240488000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2166956.2166961"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,5]]},"references-count":44,"alternative-id":["10.1145\/2166956.2166961","10.1145\/2166956"],"URL":"https:\/\/doi.org\/10.1145\/2166956.2166961","relation":{},"subject":[],"published":{"date-parts":[[2011,6,5]]},"assertion":[{"value":"2011-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}