{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:31Z","timestamp":1750219771410,"version":"3.41.0"},"reference-count":67,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T00:00:00Z","timestamp":1677801600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Helmholtz Association"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Program. Lang. Syst."],"published-print":{"date-parts":[[2023,3,31]]},"abstract":"<jats:p>Security-critical software applications contain confidential information which has to be protected from leaking to unauthorized systems. With language-based techniques, the confidentiality of applications can be enforced. Such techniques are for example type systems that enforce an information flow policy through typing rules. The precision of such type systems, especially in object-oriented languages, is an area of active research: an appropriate system should not reject too many secure programs while soundly preserving noninterference. In this work, we introduce the language SIFO which supports information flow control for an object-oriented language with type modifiers. Type modifiers increase the precision of the type system by utilizing immutability and uniqueness properties of objects for the detection of information leaks. We present SIFO informally by using examples to demonstrate the applicability of the language, formalize the type system, prove noninterference, implement SIFO as a pluggable type system in the programming language L42, and evaluate it with a feasibility study and a benchmark.<\/jats:p>","DOI":"10.1145\/3573270","type":"journal-article","created":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T13:46:05Z","timestamp":1669988765000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Immutability and Encapsulation for Sound OO Information Flow Control"],"prefix":"10.1145","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9154-7743","authenticated-orcid":false,"given":"Tobias","family":"Runge","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Institute of Information Security and Dependability (KASTEL), Germany and TU Braunschweig, Institute of Software Engineering and Automotive Informatics, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1458-2868","authenticated-orcid":false,"given":"Marco","family":"Servetto","sequence":"additional","affiliation":[{"name":"Victoria University of Wellington, Wellington, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4242-2725","authenticated-orcid":false,"given":"Alex","family":"Potanin","sequence":"additional","affiliation":[{"name":"Australian National University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7153-761X","authenticated-orcid":false,"given":"Ina","family":"Schaefer","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Institute of Information Security and Dependability (KASTEL), Germany and TU Braunschweig, Institute of Software Engineering and Automotive Informatics, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,3,3]]},"reference":[{"key":"e_1_3_2_2_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-49812-6","volume-title":"Deductive Software Verification - The KeY Book - From Theory to Practice","author":"Ahrendt Wolfgang","year":"2016","unstructured":"Wolfgang Ahrendt, Bernhard Beckert, Richard Bubel, Reiner H\u00e4hnle, Peter H. Schmitt, and Mattias Ulbrich (Eds.). 2016. Deductive Software Verification - The KeY Book - From Theory to Practice. Lecture Notes in Computer Science, Vol. 10001. Springer."},{"key":"e_1_3_2_3_1","first-page":"91","volume-title":"POPL","author":"Amtoft Torben","year":"2006","unstructured":"Torben Amtoft, Sruthi Bandhakavi, and Anindya Banerjee. 2006. A logic for information flow in object-oriented programs. In POPL. 91\u2013102."},{"key":"e_1_3_2_4_1","series-title":"LNCS","first-page":"100","volume-title":"SAS","author":"Amtoft Torben","year":"2004","unstructured":"Torben Amtoft and Anindya Banerjee. 2004. Information flow analysis in logical form. In SAS(LNCS, Vol. 3148). Springer, 100\u2013115."},{"key":"e_1_3_2_5_1","first-page":"229","volume-title":"FM","author":"Amtoft Torben","year":"2008","unstructured":"Torben Amtoft, John Hatcliff, Edwin Rodr\u00edguez, Robby, Jonathan Hoag, and David A. Greve. 2008. Specification and checking of software contracts for conditional information flow. In FM. Springer, 229\u2013245."},{"key":"e_1_3_2_6_1","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/1167473.1167479","volume-title":"OOPSLA","author":"Andreae Chris","year":"2006","unstructured":"Chris Andreae, James Noble, Shane Markstrum, and Todd Millstein. 2006. A framework for implementing pluggable type systems. In OOPSLA. 57\u201374."},{"issue":"1","key":"e_1_3_2_7_1","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/357084.357088","article-title":"An axiomatic approach to information flow in programs","volume":"2","author":"Andrews Gregory R.","year":"1980","unstructured":"Gregory R. Andrews and Richard P. Reitman. 1980. An axiomatic approach to information flow in programs. TOPLAS 2, 1 (1980), 56\u201376.","journal-title":"TOPLAS"},{"key":"e_1_3_2_8_1","first-page":"259","volume-title":"PLDI","author":"Arzt Steven","year":"2014","unstructured":"Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick D. McDaniel. 2014. FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. In PLDI, Vol. 49. ACM, 259\u2013269."},{"key":"e_1_3_2_9_1","first-page":"113","volume-title":"PLAS","author":"Austin Thomas H.","year":"2009","unstructured":"Thomas H. Austin and Cormac Flanagan. 2009. Efficient purely-dynamic information flow analysis. In PLAS. ACM, 113\u2013124."},{"key":"e_1_3_2_10_1","first-page":"253","volume-title":"CSFW","author":"Banerjee Anindya","year":"2002","unstructured":"Anindya Banerjee and David A. Naumann. 2002. Secure information flow and pointer confinement in a Java-like language. In CSFW, Vol. 2. 253."},{"key":"e_1_3_2_11_1","first-page":"100","volume-title":"CSF","author":"Barthe Gilles","year":"2004","unstructured":"Gilles Barthe, Pedro R. D\u2019Argenio, and Tamara Rezk. 2004. Secure information flow by self-composition. In CSF. IEEE, 100\u2013114."},{"key":"e_1_3_2_12_1","first-page":"125","volume-title":"European Symposium on Programming","author":"Barthe Gilles","year":"2007","unstructured":"Gilles Barthe, David Pichardie, and Tamara Rezk. 2007. A certified lightweight non-interference Java bytecode verifier. In European Symposium on Programming. Springer, 125\u2013140."},{"key":"e_1_3_2_13_1","first-page":"53","volume-title":"FLOPS","author":"Barthe Gilles","year":"1999","unstructured":"Gilles Barthe and Bernard P. Serpette. 1999. Partial evaluation and non-interference for object calculi. In FLOPS, Vol. LNCS. Springer, 53\u201367."},{"key":"e_1_3_2_14_1","first-page":"19","volume-title":"LOPSTR","author":"Beckert Bernhard","year":"2013","unstructured":"Bernhard Beckert, Daniel Bruns, Vladimir Klebanov, Christoph Scheben, Peter H. Schmitt, and Mattias Ulbrich. 2013. Information flow in object-oriented software. In LOPSTR, Vol. LNCS. Springer, 19\u201337."},{"doi-asserted-by":"publisher","key":"e_1_3_2_15_1","DOI":"10.21236\/ADA023588"},{"key":"e_1_3_2_16_1","volume-title":"Integrity Considerations for Secure Computer Systems","author":"Biba Kenneth J.","year":"1977","unstructured":"Kenneth J. Biba. 1977. Integrity Considerations for Secure Computer Systems. Technical Report. MITRE Corp Bedford MA."},{"key":"e_1_3_2_17_1","volume-title":"Effective Java","author":"Bloch Joshua","year":"2016","unstructured":"Joshua Bloch. 2016. Effective Java. Pearson Education India."},{"key":"e_1_3_2_18_1","first-page":"12\u2013pp","volume-title":"19th IEEE Computer Security Foundations Workshop (CSFW\u201906)","author":"Chong Stephen","year":"2006","unstructured":"Stephen Chong and Andrew C. Myers. 2006. Decentralized robustness. In 19th IEEE Computer Security Foundations Workshop (CSFW\u201906). IEEE, 12\u2013pp."},{"key":"e_1_3_2_19_1","first-page":"193","volume-title":"SPC","author":"Darvas \u00c1d\u00e1m","year":"2005","unstructured":"\u00c1d\u00e1m Darvas, Reiner H\u00e4hnle, and David Sands. 2005. A theorem proving approach to analysis of secure information flow. In SPC, Vol. LNCS. Springer, 193\u2013209."},{"doi-asserted-by":"publisher","key":"e_1_3_2_20_1","DOI":"10.1145\/360051.360056"},{"doi-asserted-by":"publisher","key":"e_1_3_2_21_1","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_22_1","first-page":"1","volume-title":"DAC","author":"Ferraiuolo Andrew","year":"2017","unstructured":"Andrew Ferraiuolo, Weizhe Hua, Andrew C. Myers, and G. Edward Suh. 2017. Secure information flow verification with mutable dependent types. In DAC. IEEE, 1\u20136."},{"doi-asserted-by":"publisher","key":"e_1_3_2_23_1","DOI":"10.1016\/j.tcs.2018.09.001"},{"key":"e_1_3_2_24_1","first-page":"11","volume-title":"S&P","author":"Goguen Joseph A.","year":"1982","unstructured":"Joseph A. Goguen and Jos\u00e9 Meseguer. 1982. Security policies and security models. In S&P. IEEE, 11\u201311."},{"key":"e_1_3_2_25_1","volume-title":"Smalltalk-80: The Language and its Implementation","author":"Goldberg Adele","year":"1983","unstructured":"Adele Goldberg and David Robson. 1983. Smalltalk-80: The Language and its Implementation. Addison-Wesley Longman Publishing Co., Inc."},{"doi-asserted-by":"publisher","key":"e_1_3_2_26_1","DOI":"10.1145\/2398857.2384619"},{"key":"e_1_3_2_27_1","first-page":"123","volume-title":"Proceedings of the 6th Working Conference on Programming Languages (ATPS\u201913) (Lecture Notes in Informatics (LNI) 215)","author":"Graf J\u00fcrgen","year":"2013","unstructured":"J\u00fcrgen Graf, Martin Hecker, and Martin Mohr. 2013. Using JOANA for information flow control in Java programs - a practical guide. In Proceedings of the 6th Working Conference on Programming Languages (ATPS\u201913) (Lecture Notes in Informatics (LNI) 215). Springer, 123\u2013138."},{"doi-asserted-by":"publisher","key":"e_1_3_2_28_1","DOI":"10.1023\/B:AUSE.0000049208.84702.84"},{"key":"e_1_3_2_29_1","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/978-3-030-03638-6_27","volume-title":"Nordic Conference on Secure IT Systems","author":"Hamann Tobias","year":"2018","unstructured":"Tobias Hamann, Mihai Herda, Heiko Mantel, Martin Mohr, David Schneider, and Markus Tasch. 2018. A uniform information-flow security benchmark suite for source code and bytecode. In Nordic Conference on Secure IT Systems. Springer, 437\u2013453."},{"key":"e_1_3_2_30_1","first-page":"1663","volume-title":"SAC","author":"Hedin Daniel","year":"2014","unstructured":"Daniel Hedin, Arnar Birgisson, Luciano Bello, and Andrei Sabelfeld. 2014. JSFlow: Tracking information flow in JavaScript and its APIs. In SAC (Gyeongju, Republic of Korea). ACM, 1663\u20131671."},{"key":"e_1_3_2_31_1","series-title":"LNCS","first-page":"140","volume-title":"FASE","author":"Huang Wei","year":"2014","unstructured":"Wei Huang, Yao Dong, and Ana Milanova. 2014. Type-based taint analysis for Java web applications. In FASE(LNCS, Vol. 8411). Springer, 140\u2013154."},{"doi-asserted-by":"publisher","key":"e_1_3_2_32_1","DOI":"10.1145\/2398857.2384680"},{"issue":"1","key":"e_1_3_2_33_1","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1145\/1111320.1111045","article-title":"On flow-sensitive security types","volume":"41","author":"Hunt Sebastian","year":"2006","unstructured":"Sebastian Hunt and David Sands. 2006. On flow-sensitive security types. SIGPLAN Not. 41, 1 (Jan.2006), 79\u201390.","journal-title":"SIGPLAN Not."},{"doi-asserted-by":"publisher","key":"e_1_3_2_34_1","DOI":"10.1145\/503502.503505"},{"key":"e_1_3_2_35_1","first-page":"775","volume-title":"European Symposium on Research in Computer Security","author":"Jia Limin","year":"2013","unstructured":"Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, and Yutaka Miyake. 2013. Run-time enforcement of information-flow properties on Android. In European Symposium on Research in Computer Security. Springer, 775\u2013792."},{"key":"e_1_3_2_36_1","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1109\/CSF.2015.28","volume-title":"2015 IEEE 28th Computer Security Foundations Symposium","author":"K\u00fcsters Ralf","year":"2015","unstructured":"Ralf K\u00fcsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, and Martin Mohr. 2015. A hybrid approach for proving noninterference of Java programs. In 2015 IEEE 28th Computer Security Foundations Symposium. IEEE, 305\u2013319."},{"key":"e_1_3_2_37_1","first-page":"53","volume-title":"CSF","author":"Li Peixuan","year":"2017","unstructured":"Peixuan Li and Danfeng Zhang. 2017. Towards a flow-and path-sensitive information flow analysis. In CSF. IEEE, 53\u201367."},{"doi-asserted-by":"publisher","key":"e_1_3_2_38_1","DOI":"10.1007\/978-3-319-75650-9_8"},{"key":"e_1_3_2_39_1","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/2666620.2666631","volume-title":"Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices","author":"Lortz Steffen","year":"2014","unstructured":"Steffen Lortz, Heiko Mantel, Artem Starostin, Timo B\u00e4hr, David Schneider, and Alexandra Weber. 2014. Cassandra: Towards a certifying app store for Android. In Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. 93\u2013104."},{"doi-asserted-by":"publisher","key":"e_1_3_2_40_1","DOI":"10.1016\/0164-1212(88)90022-2"},{"key":"e_1_3_2_41_1","volume-title":"FTfJP","author":"Milanova Ana","year":"2013","unstructured":"Ana Milanova and Wei Huang. 2013. Composing polymorphic information flow systems with reference immutability. In FTfJP. ACM, Article 5, 7 pages."},{"key":"e_1_3_2_42_1","volume-title":"Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control","author":"Miller Mark Samuel","year":"2006","unstructured":"Mark Samuel Miller. 2006. Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control. Ph.D. Dissertation. Johns Hopkins University, Baltimore, Maryland, USA."},{"key":"e_1_3_2_43_1","first-page":"140","volume-title":"Software Engineering (Workshops)","author":"Mohr Martin","year":"2015","unstructured":"Martin Mohr, J\u00fcrgen Graf, and Martin Hecker. 2015. JoDroid: Adding Android support to a static information flow control tool. In Software Engineering (Workshops). Citeseer, 140\u2013145."},{"key":"e_1_3_2_44_1","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1145\/292540.292561","volume-title":"POPL","author":"Myers Andrew C.","year":"1999","unstructured":"Andrew C. Myers. 1999. JFlow: Practical mostly-static information flow control. In POPL (San Antonio, Texas, USA). ACM, New York, NY, USA, 228\u2013241."},{"issue":"4","key":"e_1_3_2_45_1","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1145\/363516.363526","article-title":"Protecting privacy using the decentralized label model","volume":"9","author":"Myers Andrew C.","year":"2000","unstructured":"Andrew C. Myers and Barbara Liskov. 2000. Protecting privacy using the decentralized label model. TOSEM 9, 4 (2000), 410\u2013442.","journal-title":"TOSEM"},{"key":"e_1_3_2_46_1","first-page":"1119","volume-title":"25th USENIX Security Symposium (USENIX Security\u201916)","author":"Nadkarni Adwait","year":"2016","unstructured":"Adwait Nadkarni, Benjamin Andow, William Enck, and Somesh Jha. 2016. Practical DIFC enforcement on Android. In 25th USENIX Security Symposium (USENIX Security\u201916). 1119\u20131136."},{"doi-asserted-by":"publisher","key":"e_1_3_2_47_1","DOI":"10.5555\/555142"},{"key":"e_1_3_2_48_1","first-page":"201","volume-title":"ISSTA","author":"Papi Matthew M.","year":"2008","unstructured":"Matthew M. Papi, Mahmood Ali, Telmo Luis Correa Jr., Jeff H. Perkins, and Michael D. Ernst. 2008. Practical pluggable types for Java. In ISSTA. 201\u2013212."},{"doi-asserted-by":"publisher","key":"e_1_3_2_49_1","DOI":"10.5555\/509043"},{"doi-asserted-by":"publisher","key":"e_1_3_2_50_1","DOI":"10.1145\/3051528.3051531"},{"key":"e_1_3_2_51_1","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/CSF.2018.00024","volume-title":"2018 IEEE 31st Computer Security Foundations Symposium (CSF\u201918)","author":"Rajani Vineet","year":"2018","unstructured":"Vineet Rajani and Deepak Garg. 2018. Types for information flow control: Labeling granularity and semantic models. In 2018 IEEE 31st Computer Security Foundations Symposium (CSF\u201918). IEEE, 233\u2013246."},{"key":"e_1_3_2_52_1","first-page":"63","volume-title":"Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation","author":"Roy Indrajit","year":"2009","unstructured":"Indrajit Roy, Donald E. Porter, Michael D. Bond, Kathryn S. McKinley, and Emmett Witchel. 2009. Laminar: Practical fine-grained decentralized information flow control. In Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation. 63\u201374."},{"key":"e_1_3_2_53_1","volume-title":"FormaliSE","author":"Runge Tobias","year":"2020","unstructured":"Tobias Runge, Alexander Kn\u00fcppel, Thomas Th\u00fcm, and Ina Schaefer. 2020. Lattice-based information flow control-by-construction for security-by-design. In FormaliSE. To appear."},{"key":"e_1_3_2_54_1","first-page":"186","volume-title":"CSF","author":"Russo Alejandro","year":"2010","unstructured":"Alejandro Russo and Andrei Sabelfeld. 2010. Dynamic vs. static flow-sensitive security analysis. In CSF. IEEE, 186\u2013199."},{"doi-asserted-by":"publisher","key":"e_1_3_2_55_1","DOI":"10.1109\/JSAC.2002.806121"},{"doi-asserted-by":"publisher","key":"e_1_3_2_56_1","DOI":"10.5555\/1662658.1662659"},{"key":"e_1_3_2_57_1","series-title":"LNCS","first-page":"502","volume-title":"ISoLA","author":"Schaefer Ina","year":"2018","unstructured":"Ina Schaefer, Tobias Runge, Alexander Kn\u00fcppel, Loek Cleophas, Derrick Kourie, and Bruce W. Watson. 2018. Towards confidentiality-by-construction. In ISoLA(LNCS, Vol. 11244). Springer, 502\u2013515."},{"key":"e_1_3_2_58_1","first-page":"152","volume-title":"APPSEM-II","author":"Simonet Vincent","year":"2003","unstructured":"Vincent Simonet. 2003. Flow Caml in a nutshell. In APPSEM-II. 152\u2013165."},{"key":"e_1_3_2_59_1","series-title":"Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security","first-page":"2","author":"Stoughton Alley","year":"2014","unstructured":"Alley Stoughton, Andrew Johnson, Samuel Beller, Karishma Chadha, Dennis Chen, Kenneth Foner, and Michael Zhivich. 2014. You sank my battleship! A case study in secure programming. In Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security (Uppsala, Sweden) (PLAS\u201914). Association for Computing Machinery, New York, NY, USA, 2\u201314."},{"key":"e_1_3_2_60_1","article-title":"Formal analysis of an information flow type system for MicroJava","author":"Strecker Martin","year":"2003","unstructured":"Martin Strecker. 2003. Formal analysis of an information flow type system for MicroJava. Technische Universit\u00e4t M\u00fcnchen, Tech. Rep (2003).","journal-title":"Technische Universit\u00e4t M\u00fcnchen, Tech. Rep"},{"key":"e_1_3_2_61_1","first-page":"84","volume-title":"SAS","author":"Sun Qi","year":"2004","unstructured":"Qi Sun, Anindya Banerjee, and David A. Naumann. 2004. Modular and constraint-based information flow inference for an object-oriented language. In SAS, Vol. LNCS. Springer, 84\u201399."},{"key":"e_1_3_2_62_1","first-page":"352","volume-title":"SAS","author":"Terauchi Tachio","year":"2005","unstructured":"Tachio Terauchi and Alex Aiken. 2005. Secure information flow as a safety problem. In SAS, Vol. LNCS. Springer, 352\u2013367."},{"key":"e_1_3_2_63_1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/2371401.2371404","volume-title":"GPCE","author":"Th\u00fcm Thomas","year":"2012","unstructured":"Thomas Th\u00fcm, Ina Schaefer, Sven Apel, and Martin Hentschel. 2012. Family-based deductive verification of software product lines. In GPCE. 11\u201320."},{"doi-asserted-by":"publisher","key":"e_1_3_2_64_1","DOI":"10.1145\/3290389"},{"doi-asserted-by":"publisher","key":"e_1_3_2_65_1","DOI":"10.5555\/353629.353648"},{"key":"e_1_3_2_66_1","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/SP40001.2021.00002","volume-title":"2021 IEEE Symposium on Security and Privacy (SP\u201921)","author":"Xiang Jian","year":"2021","unstructured":"Jian Xiang and Stephen Chong. 2021. Co-Inflow: Coarse-grained information flow control for Java-like languages. In 2021 IEEE Symposium on Security and Privacy (SP\u201921). IEEE, 18\u201335."},{"doi-asserted-by":"publisher","key":"e_1_3_2_67_1","DOI":"10.1145\/2775054.2694372"},{"key":"e_1_3_2_68_1","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/SECPRI.2003.1199340","volume-title":"2003 Symposium on Security and Privacy, 2003.","author":"Zheng Lantian","year":"2003","unstructured":"Lantian Zheng, Stephen Chong, Andrew C. Myers, and Steve Zdancewic. 2003. Using replication and partitioning to build secure distributed systems. In 2003 Symposium on Security and Privacy, 2003. IEEE, 236\u2013250."}],"container-title":["ACM Transactions on Programming Languages and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:25Z","timestamp":1750178245000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,3]]},"references-count":67,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,3,31]]}},"alternative-id":["10.1145\/3573270"],"URL":"https:\/\/doi.org\/10.1145\/3573270","relation":{},"ISSN":["0164-0925","1558-4593"],"issn-type":[{"type":"print","value":"0164-0925"},{"type":"electronic","value":"1558-4593"}],"subject":[],"published":{"date-parts":[[2023,3,3]]},"assertion":[{"value":"2021-11-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-10-31","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}