{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T02:31:15Z","timestamp":1774837875163,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Vetenskapsr\u00e5det (VR)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2993600.2993608","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"15-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["On Formalizing Information-Flow Control Libraries"],"prefix":"10.1145","author":[{"given":"Marco","family":"Vassena","sequence":"first","affiliation":[{"name":"Chalmers University, Gothenburg, Sweden"}]},{"given":"Alejandro","family":"Russo","sequence":"additional","affiliation":[{"name":"Chalmers University, Gothenburg, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292555"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 15th IEEE Workshop on Computer Security Foundations, CSFW '02. IEEE Computer Society","author":"Banerjee Anindya","year":"2002"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805974.1805977"},{"key":"e_1_3_2_1_5_1","unstructured":"K. J. Biba. Integrity considerations for secure computer systems. ESD-TR-76--372 1977.  K. J. Biba. Integrity considerations for secure computer systems. ESD-TR-76--372 1977."},{"key":"e_1_3_2_1_6_1","volume-title":"Springer Berlin Heidelberg","author":"Bichhawat Abhishek","year":"2014"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2784731.2784758"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.13"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1929553.1929564"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095813"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12. USENIX Association","author":"Giffin Daniel B.","year":"2012"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1984.10019"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46666-7_2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1286821.1286822"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/645394.651914"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.10"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29709-0_16"},{"issue":"4","key":"e_1_3_2_1_19_1","volume":"42","author":"Kobayashi Naoki","year":"2005","journal-title":"Acta Inf."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.13"},{"issue":"19","key":"e_1_3_2_1_22_1","first-page":"1974","volume":"411","author":"Li P.","year":"2010","journal-title":"Arrows for secure information flow. Theoretical Computer Science"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.35"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/794201.795183"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.29"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411286.1411289"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2784731.2784756"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Thomas\n       \n      Schmitz Dustin\n       \n      Rhodes Thomas H.\n       \n      Austin Kenneth\n       \n      Knowles and \n      \n      \n      Cormac\n       \n      Flanagan\n    .\n      \n  \n   \n  Faceted dynamic information flow via control and data monads. In Frank Piessens and Luca Vigan\u00f2 editors POST volume \n  9635\n   of \n  phLecture Notes in Computer Science\n  . \n  Springer 2016\n  .  Thomas Schmitz Dustin Rhodes Thomas H. Austin Kenneth Knowles and Cormac Flanagan. Faceted dynamic information flow via control and data monads. In Frank Piessens and Luca Vigan\u00f2 editors POST volume 9635 of phLecture Notes in Computer Science. Springer 2016.","DOI":"10.1007\/978-3-662-49635-0_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268975"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364527.2364557"},{"key":"e_1_3_2_1_31_1","volume-title":"Cambridge University Press","author":"Stefan D.","year":"2012"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034675.2034688"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.6"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_27"},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. USENIX","author":"Zeldovich Nickolai","year":"2006"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2993600.2993608","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2993600.2993608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:23Z","timestamp":1750218623000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2993600.2993608"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":34,"alternative-id":["10.1145\/2993600.2993608","10.1145\/2993600"],"URL":"https:\/\/doi.org\/10.1145\/2993600.2993608","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}