{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T08:32:26Z","timestamp":1774168346711,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,29]],"date-time":"2015-08-29T00:00:00Z","timestamp":1440806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,29]]},"DOI":"10.1145\/2784731.2784758","type":"proceedings-article","created":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T12:48:13Z","timestamp":1440593293000},"page":"289-301","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["HLIO: mixing static and dynamic typing for information-flow control in Haskell"],"prefix":"10.1145","author":[{"given":"Pablo","family":"Buiras","sequence":"first","affiliation":[{"name":"Chalmers University of Technology, Sweden"}]},{"given":"Dimitrios","family":"Vytiniotis","sequence":"additional","affiliation":[{"name":"Microsoft Research, UK"}]},{"given":"Alejandro","family":"Russo","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2015,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.22"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1554339.1554353"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03542-0_16"},{"key":"e_1_3_2_1_4_1","volume-title":"NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings. Springer Verlag","author":"Buiras P.","year":"2013","unstructured":"P. Buiras and A. Russo . Lazy programs leak secrets. In Secure IT Systems - 18th Nordic Conference , NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings. Springer Verlag , 2013 . P. Buiras and A. Russo. Lazy programs leak secrets. In Secure IT Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings. Springer Verlag, 2013."},{"key":"e_1_3_2_1_5_1","volume-title":"TGC 2013","author":"Buiras P.","year":"2013","unstructured":"P. Buiras , A. Levy , D. Stefan , A. Russo , and D. Mazi\u00e8res . A library for removing cache-based attacks in concurrent information flow systems. In Trustworthy Global Computing - 8th International Symposium , TGC 2013 , 2013 . P. Buiras, A. Levy, D. Stefan, A. Russo, and D. Mazi\u00e8res. A library for removing cache-based attacks in concurrent information flow systems. In Trustworthy Global Computing - 8th International Symposium, TGC 2013, 2013."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.13"},{"key":"e_1_3_2_1_7_1","volume-title":"HLIO: Mixing Static and Dynamic Typing for Information-Flow Control in Haskell (Extended version)","author":"Buiras P.","year":"2015","unstructured":"P. Buiras , D. Vytiniotis , and A. Russo . HLIO: Mixing Static and Dynamic Typing for Information-Flow Control in Haskell (Extended version) , 2015 . URL http:\/\/www.cse.chalmers.se\/ ~buiras\/hlio\/. T. Disney and C. Flanagan. Gradual information flow typing. In Workshop on Script-to-Program Evolution (STOP) , 2011. P. Buiras, D. Vytiniotis, and A. Russo. HLIO: Mixing Static and Dynamic Typing for Information-Flow Control in Haskell (Extended version), 2015. URL http:\/\/www.cse.chalmers.se\/ ~buiras\/hlio\/. T. Disney and C. Flanagan. Gradual information flow typing. In Workshop on Script-to-Program Evolution (STOP), 2011."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364506.2364522"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535856"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.22"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111059"},{"key":"e_1_3_2_1_12_1","first-page":"60","volume-title":"10th Symposium on Operating Systems Design and Implementation (OSDI)","author":"Giffin D. B.","unstructured":"D. B. Giffin , A. Levy , D. Stefan , D. Terei , D. Mazi\u00e8res , J. Mitchell , and A. Russo . Hails: Protecting data privacy in untrusted web applications . In 10th Symposium on Operating Systems Design and Implementation (OSDI) , pages 47\u2013 60 . USENIX, 2012. D. B. Giffin, A. Levy, D. Stefan, D. Terei, D. Mazi\u00e8res, J. Mitchell, and A. Russo. Hails: Protecting data privacy in untrusted web applications. In 10th Symposium on Operating Systems Design and Implementation (OSDI), pages 47\u201360. USENIX, 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1176617.1176755"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(99)00023-4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29709-0_16"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.10"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of the 11th Asian Computing Science Conference on Advances in Computer Science: Secure Software and Related Issues, ASIAN\u201906","author":"Le Guernic G.","year":"2007","unstructured":"G. Le Guernic , A. Banerjee , T. Jensen , and D. A. Schmidt . Automatabased confidentiality monitoring . In Proc. of the 11th Asian Computing Science Conference on Advances in Computer Science: Secure Software and Related Issues, ASIAN\u201906 . Springer-Verlag , 2007 . G. Le Guernic, A. Banerjee, T. Jensen, and D. A. Schmidt. Automatabased confidentiality monitoring. In Proc. of the 11th Asian Computing Science Conference on Advances in Computer Science: Secure Software and Related Issues, ASIAN\u201906. Springer-Verlag, 2007."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.13"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.17"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363526"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159803.1159812"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12251-4_6"},{"key":"e_1_3_2_1_23_1","unstructured":". URL https:\/\/lirias.kuleuven.be\/handle\/123456789\/259608.  . URL https:\/\/lirias.kuleuven.be\/handle\/123456789\/259608."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2676971"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.20"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411286.1411289"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11486-1_30"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.20"},{"key":"e_1_3_2_1_31_1","volume-title":"July","author":"Simonet V.","year":"2003","unstructured":"V. Simonet . The Flow Caml system. Software release. Located at http: \/\/cristal.inria.fr\/~simonet\/soft\/flowcaml\/ , July 2003 . V. Simonet. The Flow Caml system. Software release. Located at http: \/\/cristal.inria.fr\/~simonet\/soft\/flowcaml\/, July 2003."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384674"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364506.2364524"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.6"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314299.1314302"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661088.2661101"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/353629.353648"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364527.2364554"},{"key":"e_1_3_2_1_39_1","unstructured":"2364554.  2364554."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00590-9_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103786.2103795"},{"key":"e_1_3_2_1_42_1","unstructured":"2103795.  2103795."},{"key":"e_1_3_2_1_43_1","first-page":"278","volume-title":"Proc. of the 7th Symp. on Operating Systems Design and Implementation","author":"Zeldovich N.","year":"2006","unstructured":"N. Zeldovich , S. Boyd-Wickizer , E. Kohler , and D. Mazi\u00e8res . Making information flow explicit in HiStar . In Proc. of the 7th Symp. on Operating Systems Design and Implementation , pages 263\u2013 278 , Seattle, WA , November 2006 . N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazi\u00e8res. Making information flow explicit in HiStar. In Proc. of the 7th Symp. on Operating Systems Design and Implementation, pages 263\u2013278, Seattle, WA, November 2006."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0019-9"}],"event":{"name":"ICFP'15: 20th ACM SIGPLAN International Conference on Functional Programming","location":"Vancouver BC Canada","acronym":"ICFP'15","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 20th ACM SIGPLAN International Conference on Functional Programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2784731.2784758","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2784731.2784758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:16:48Z","timestamp":1750213008000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2784731.2784758"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,29]]},"references-count":43,"alternative-id":["10.1145\/2784731.2784758","10.1145\/2784731"],"URL":"https:\/\/doi.org\/10.1145\/2784731.2784758","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2858949.2784758","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,8,29]]},"assertion":[{"value":"2015-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}