{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T23:29:48Z","timestamp":1759879788222,"version":"3.41.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"POPL","license":[{"start":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:00:00Z","timestamp":1673222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Program. Lang."],"published-print":{"date-parts":[[2023,1,9]]},"abstract":"<jats:p>\n            We introduce a new noninterference policy to capture the class of functions computable in polynomial time on an object-oriented programming language. This policy makes a clear separation between the standard noninterference techniques for the control flow and the layering properties required to ensure that each \u201csecurity\u201d level preserves polynomial time soundness, and is thus very powerful as for the class of programs it can capture. This new characterization is a proper extension of existing tractable characterizations of polynomial time based on safe recursion. Despite the fact that this noninterference policy is \u03a0\n            <jats:sub>1<\/jats:sub>\n            <jats:sup>0<\/jats:sup>\n            -complete, we show that it can be instantiated to some decidable and conservative instance using shape analysis techniques.\n          <\/jats:p>","DOI":"10.1145\/3571221","type":"journal-article","created":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T21:58:14Z","timestamp":1673474294000},"page":"806-832","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A General Noninterference Policy for Polynomial Time"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9750-0460","authenticated-orcid":false,"given":"Emmanuel","family":"Hainry","sequence":"first","affiliation":[{"name":"Universit\u00e9 de Lorraine, France \/ CNRS, France \/ Inria, France \/ LORIA, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0601-5425","authenticated-orcid":false,"given":"Romain","family":"P\u00e9choux","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Lorraine, France \/ CNRS, France \/ Inria, France \/ LORIA, France"}]}],"member":"320","published-online":{"date-parts":[[2023,1,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11957-6_6"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/5.4.349"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.09.015"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2004.1319621"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01201998"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_35"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-011-0111-7"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503290"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2010.09.003"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328456"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/s0049-237x(08)70843-7"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1998.2700"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp.1982.10014"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp.1984.10019"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.46298\/lmcs-18(1:33)2022"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37075-5_20"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2018.05.006"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(79)90046-X"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268976"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503297"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/s0890-5401(03)00009-9"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.240882"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796800003889"},{"key":"e_1_2_1_24_1","unstructured":"Stephen Cole Kleene. 1952. Introduction to metamathematics. North Holland. \t\t\t\t  Stephen Cole Kleene. 1952. Introduction to metamathematics. North Holland."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.23638\/LMCS-13(3:8)2017"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2003.10.018"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39212-2_32"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3233\/fi-1993-191-207"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41528-4_23"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2011.41"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2699855.2699858"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749608.1749613"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27813-9_2"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-06859-7_148"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2002.806121"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237725"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/514188.514190"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1996-42-304"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/bfb0030629"},{"key":"e_1_2_1_41_1","unstructured":"Steve Zdancewic. 2004. Challenges for information-flow security. In PLID\u201904. 6. \t\t\t\t  Steve Zdancewic. 2004. Challenges for information-flow security. In PLID\u201904. 6."}],"container-title":["Proceedings of the ACM on Programming Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571221","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:21Z","timestamp":1750183701000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571221"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,9]]},"references-count":41,"journal-issue":{"issue":"POPL","published-print":{"date-parts":[[2023,1,9]]}},"alternative-id":["10.1145\/3571221"],"URL":"https:\/\/doi.org\/10.1145\/3571221","relation":{},"ISSN":["2475-1421"],"issn-type":[{"type":"electronic","value":"2475-1421"}],"subject":[],"published":{"date-parts":[[2023,1,9]]},"assertion":[{"value":"2023-01-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}