{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:29Z","timestamp":1750219709344,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,22]],"date-time":"2023-10-22T00:00:00Z","timestamp":1697932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,22]]},"DOI":"10.1145\/3610612.3610619","type":"proceedings-article","created":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T23:13:48Z","timestamp":1697498028000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Data-Dependent Confidentiality in DCR Graphs"],"prefix":"10.1145","author":[{"given":"Eduardo","family":"Geraldo","sequence":"first","affiliation":[{"name":"NOVA LINCS - NOVA University Lisbon, Portugal"}]},{"given":"Jo\u00e3o","family":"Costa Seco","sequence":"additional","affiliation":[{"name":"NOVA LINCS - NOVA University Lisbon, Portugal"}]},{"given":"Thomas","family":"Hildebrandt","sequence":"additional","affiliation":[{"name":"University of Copenhagen, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2023,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"Abadi Mart\u00edn","year":"1999","unstructured":"Mart\u00edn Abadi , Anindya Banerjee , Nevin Heintze , and Jon\u00a0 G. Riecke . 1999 . A Core Calculus of Dependency. In POPL \u201999 , Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages , San Antonio, TX, USA , January 20-22, 1999, Andrew\u00a0W. Appel and Alex Aiken (Eds.). ACM, 147\u2013160. https:\/\/doi.org\/10.1145\/292540.292555 10.1145\/292540.292555 Mart\u00edn Abadi, Anindya Banerjee, Nevin Heintze, and Jon\u00a0G. Riecke. 1999. A Core Calculus of Dependency. In POPL \u201999, Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Antonio, TX, USA, January 20-22, 1999, Andrew\u00a0W. Appel and Alex Aiken (Eds.). ACM, 147\u2013160. https:\/\/doi.org\/10.1145\/292540.292555"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1145\/155183.155225","article-title":"A calculus for access control in distributed systems","volume":"15","author":"Abadi Martin","year":"1993","unstructured":"Martin Abadi , Michael Burrows , Butler Lampson , and Gordon Plotkin . 1993 . A calculus for access control in distributed systems . ACM Transactions on Programming Languages and Systems (TOPLAS) 15 , 4 (1993), 706 \u2013 734 . Martin Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. 1993. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems (TOPLAS) 15, 4 (1993), 706\u2013734.","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"volume-title":"Automatic Information Flow Analysis of Business Process Models","author":"Accorsi Rafael","key":"e_1_3_2_1_3_1","unstructured":"Rafael Accorsi and Andreas Lehmann . 2012. Automatic Information Flow Analysis of Business Process Models . In Business Process Management, Alistair Barros, Avigdor Gal, and Ekkart Kindler (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 172\u2013187. Rafael Accorsi and Andreas Lehmann. 2012. Automatic Information Flow Analysis of Business Process Models. In Business Process Management, Alistair Barros, Avigdor Gal, and Ekkart Kindler (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 172\u2013187."},{"key":"e_1_3_2_1_4_1","volume-title":"Information Systems Engineering in Responsible Information Systems - CAiSE Forum 2019, Rome, Italy, June 3-7, 2019, Proceedings(Lecture Notes in Business Information Processing, Vol.\u00a0350)","author":"Agostinelli Simone","year":"2019","unstructured":"Simone Agostinelli , Fabrizio\u00a0Maria Maggi , Andrea Marrella , and Francesco Sapio . 2019 . Achieving GDPR Compliance of BPMN Process Models . In Information Systems Engineering in Responsible Information Systems - CAiSE Forum 2019, Rome, Italy, June 3-7, 2019, Proceedings(Lecture Notes in Business Information Processing, Vol.\u00a0350) , Cinzia Cappiello and Marcela Ruiz (Eds.). Springer, 10\u201322. https:\/\/doi.org\/10.1007\/978-3-030-21297-1_2 10.1007\/978-3-030-21297-1_2 Simone Agostinelli, Fabrizio\u00a0Maria Maggi, Andrea Marrella, and Francesco Sapio. 2019. Achieving GDPR Compliance of BPMN Process Models. In Information Systems Engineering in Responsible Information Systems - CAiSE Forum 2019, Rome, Italy, June 3-7, 2019, Proceedings(Lecture Notes in Business Information Processing, Vol.\u00a0350), Cinzia Cappiello and Marcela Ruiz (Eds.). Springer, 10\u201322. https:\/\/doi.org\/10.1007\/978-3-030-21297-1_2"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation","author":"Arzt Steven","year":"2014","unstructured":"Steven Arzt , Siegfried Rasthofer , Christian Fritz , Eric Bodden , Alexandre Bartel , Jacques Klein , Yves Le\u00a0Traon , Damien Octeau , and Patrick McDaniel . 2014 . FlowDroid: Precise Context, Flow, Field, Object-Sensitive and Lifecycle-Aware Taint Analysis for Android Apps . In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation ( Edinburgh, United Kingdom) (PLDI \u201914). Association for Computing Machinery, New York, NY, USA, 259\u2013269. https:\/\/doi.org\/10.1145\/2594291.2594299 10.1145\/2594291.2594299 Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le\u00a0Traon, Damien Octeau, and Patrick McDaniel. 2014. FlowDroid: Precise Context, Flow, Field, Object-Sensitive and Lifecycle-Aware Taint Analysis for Android Apps. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (Edinburgh, United Kingdom) (PLDI \u201914). Association for Computing Machinery, New York, NY, USA, 259\u2013269. https:\/\/doi.org\/10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security","author":"Askarov Aslan","year":"2008","unstructured":"Aslan Askarov , Sebastian Hunt , Andrei Sabelfeld , and David Sands . 2008 . Termination-Insensitive Noninterference Leaks More Than Just a Bit . In Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security ( M\u00e1laga, Spain) (ESORICS \u201908). Springer-Verlag, Berlin, Heidelberg, 333\u2013348. https:\/\/doi.org\/10.1007\/978-3-540-88313-5_22 10.1007\/978-3-540-88313-5_22 Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, and David Sands. 2008. Termination-Insensitive Noninterference Leaks More Than Just a Bit. In Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security (M\u00e1laga, Spain) (ESORICS \u201908). Springer-Verlag, Berlin, Heidelberg, 333\u2013348. https:\/\/doi.org\/10.1007\/978-3-540-88313-5_22"},{"volume-title":"Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security","author":"H.","key":"e_1_3_2_1_7_1","unstructured":"Thomas\u00a0 H. Austin and Cormac Flanagan. 2009. Efficient Purely-Dynamic Information Flow Analysis . In Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security ( Dublin, Ireland) (PLAS \u201909). Association for Computing Machinery, New York, NY, USA, 113\u2013124. https:\/\/doi.org\/10.1145\/1554339.1554353 10.1145\/1554339.1554353 Thomas\u00a0H. Austin and Cormac Flanagan. 2009. Efficient Purely-Dynamic Information Flow Analysis. In Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security (Dublin, Ireland) (PLAS \u201909). Association for Computing Machinery, New York, NY, USA, 113\u2013124. https:\/\/doi.org\/10.1145\/1554339.1554353"},{"volume-title":"Design and Verification of Privacy Patterns for Business Process Models","author":"Barati Masoud","key":"e_1_3_2_1_8_1","unstructured":"Masoud Barati and Omer Rana . 2021. Design and Verification of Privacy Patterns for Business Process Models . Springer Singapore , Singapore , 125\u2013139. https:\/\/doi.org\/10.1007\/978-981-33-6470-7_8 10.1007\/978-981-33-6470-7_8 Masoud Barati and Omer Rana. 2021. Design and Verification of Privacy Patterns for Business Process Models. Springer Singapore, Singapore, 125\u2013139. https:\/\/doi.org\/10.1007\/978-981-33-6470-7_8"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 5th International Conference on Principles of Security and Trust -","volume":"9635","author":"Bielova Nataliia","year":"2016","unstructured":"Nataliia Bielova and Tamara Rezk . 2016 . A Taxonomy of Information Flow Monitors . In Proceedings of the 5th International Conference on Principles of Security and Trust - Volume 9635 . Springer-Verlag, Berlin, Heidelberg, 46\u201367. Nataliia Bielova and Tamara Rezk. 2016. A Taxonomy of Information Flow Monitors. In Proceedings of the 5th International Conference on Principles of Security and Trust - Volume 9635. Springer-Verlag, Berlin, Heidelberg, 46\u201367."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"Broberg Niklas","year":"2010","unstructured":"Niklas Broberg and David Sands . 2010 . Paralocks: Role-Based Information Flow Control and Beyond . In Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages ( Madrid, Spain) (POPL \u201910). Association for Computing Machinery, New York, NY, USA, 431\u2013444. https:\/\/doi.org\/10.1145\/1706299.1706349 10.1145\/1706299.1706349 Niklas Broberg and David Sands. 2010. Paralocks: Role-Based Information Flow Control and Beyond. In Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (Madrid, Spain) (POPL \u201910). Association for Computing Machinery, New York, NY, USA, 431\u2013444. https:\/\/doi.org\/10.1145\/1706299.1706349"},{"key":"e_1_3_2_1_11_1","first-page":"6","article-title":"Structural Non-Interference in Elementary and Trace Nets","volume":"19","author":"Busi Nadia","year":"2009","unstructured":"Nadia Busi and Roberto Gorrieri . 2009 . Structural Non-Interference in Elementary and Trace Nets . Mathematical. Structures in Comp. Sci. 19 , 6 (dec 2009), 1065\u20131090. https:\/\/doi.org\/10.1017\/S0960129509990120 10.1017\/S0960129509990120 Nadia Busi and Roberto Gorrieri. 2009. Structural Non-Interference in Elementary and Trace Nets. Mathematical. Structures in Comp. Sci. 19, 6 (dec 2009), 1065\u20131090. https:\/\/doi.org\/10.1017\/S0960129509990120","journal-title":"Mathematical. Structures in Comp. Sci."},{"key":"e_1_3_2_1_12_1","volume-title":"Programming Languages and Systems - 20th European Symposium on Programming, ESOP","author":"Caires Lu\u00eds","year":"2011","unstructured":"Lu\u00eds Caires , Jorge\u00a0 A. P\u00e9rez , Jo\u00e3o Costa\u00a0Seco , Hugo\u00a0Torres Vieira , and L\u00facio Ferr\u00e3o . 2011. Type-Based Access Control in Data-Centric Systems . In Programming Languages and Systems - 20th European Symposium on Programming, ESOP 2011 , Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbr\u00fccken, Germany, March 26-April 3, 2011. Proceedings(Lecture Notes in Computer Science, Vol.\u00a06602), Gilles Barthe (Ed.). Springer , 136\u2013155. https:\/\/doi.org\/10.1007\/978-3-642-19718-5_8 10.1007\/978-3-642-19718-5_8 Lu\u00eds Caires, Jorge\u00a0A. P\u00e9rez, Jo\u00e3o Costa\u00a0Seco, Hugo\u00a0Torres Vieira, and L\u00facio Ferr\u00e3o. 2011. Type-Based Access Control in Data-Centric Systems. In Programming Languages and Systems - 20th European Symposium on Programming, ESOP 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbr\u00fccken, Germany, March 26-April 3, 2011. Proceedings(Lecture Notes in Computer Science, Vol.\u00a06602), Gilles Barthe (Ed.). Springer, 136\u2013155. https:\/\/doi.org\/10.1007\/978-3-642-19718-5_8"},{"key":"e_1_3_2_1_13_1","volume-title":"22nd IEEE International Enterprise Distributed Object Computing Conference, EDOC 2018","author":"Costa\u00a0Seco Jo\u00e3o","year":"2018","unstructured":"Jo\u00e3o Costa\u00a0Seco , S\u00f8ren Debois , Thomas\u00a0 T. Hildebrandt , and Tijs Slaats . 2018 . RESEDA: Declaring Live Event-Driven Computations as REactive SEmi-Structured DAta . In 22nd IEEE International Enterprise Distributed Object Computing Conference, EDOC 2018 , Stockholm, Sweden , October 16-19, 2018. IEEE Computer Society, 75\u201384. https:\/\/doi.org\/10.1109\/EDOC.2018.00020 10.1109\/EDOC.2018.00020 Jo\u00e3o Costa\u00a0Seco, S\u00f8ren Debois, Thomas\u00a0T. Hildebrandt, and Tijs Slaats. 2018. RESEDA: Declaring Live Event-Driven Computations as REactive SEmi-Structured DAta. In 22nd IEEE International Enterprise Distributed Object Computing Conference, EDOC 2018, Stockholm, Sweden, October 16-19, 2018. IEEE Computer Society, 75\u201384. https:\/\/doi.org\/10.1109\/EDOC.2018.00020"},{"volume-title":"Hierarchical Declarative Modelling with Refinement and Sub-processes","author":"Debois S\u00f8ren","key":"e_1_3_2_1_14_1","unstructured":"S\u00f8ren Debois , Thomas Hildebrandt , and Tijs Slaats . 2014. Hierarchical Declarative Modelling with Refinement and Sub-processes . In Business Process Management, Shazia Sadiq, Pnina Soffer, and Hagen V\u00f6lzer (Eds.). Springer International Publishing , Cham , 18\u201333. S\u00f8ren Debois, Thomas Hildebrandt, and Tijs Slaats. 2014. Hierarchical Declarative Modelling with Refinement and Sub-processes. In Business Process Management, Shazia Sadiq, Pnina Soffer, and Hagen V\u00f6lzer (Eds.). Springer International Publishing, Cham, 18\u201333."},{"volume-title":"FM 2015: Formal Methods, Nikolaj Bj\u00f8rner and Frank de\u00a0Boer (Eds.)","author":"Debois S\u00f8ren","key":"e_1_3_2_1_15_1","unstructured":"S\u00f8ren Debois , Thomas Hildebrandt , and Tijs Slaats . 2015. Safety , Liveness and Run-Time Refinement for Modular Process-Aware Information Systems with Dynamic Sub Processes . In FM 2015: Formal Methods, Nikolaj Bj\u00f8rner and Frank de\u00a0Boer (Eds.) . Springer International Publishing , Cham , 143\u2013160. S\u00f8ren Debois, Thomas Hildebrandt, and Tijs Slaats. 2015. Safety, Liveness and Run-Time Refinement for Modular Process-Aware Information Systems with Dynamic Sub Processes. In FM 2015: Formal Methods, Nikolaj Bj\u00f8rner and Frank de\u00a0Boer (Eds.). Springer International Publishing, Cham, 143\u2013160."},{"key":"e_1_3_2_1_16_1","volume-title":"BPM 2014, Haifa, Israel, September 7-11, 2014. Proceedings(Lecture Notes in Computer Science, Vol.\u00a08659)","author":"Debois S\u00f8ren","year":"2014","unstructured":"S\u00f8ren Debois , Thomas\u00a0 T. Hildebrandt , and Tijs Slaats . 2014 . Hierarchical Declarative Modelling with Refinement and Sub-processes. In Business Process Management - 12th International Conference , BPM 2014, Haifa, Israel, September 7-11, 2014. Proceedings(Lecture Notes in Computer Science, Vol.\u00a08659) , Shazia\u00a0Wasim Sadiq, Pnina Soffer, and Hagen V\u00f6lzer (Eds.). Springer, 18\u201333. https:\/\/doi.org\/10.1007\/978-3-319-10172-9_2 10.1007\/978-3-319-10172-9_2 S\u00f8ren Debois, Thomas\u00a0T. Hildebrandt, and Tijs Slaats. 2014. Hierarchical Declarative Modelling with Refinement and Sub-processes. In Business Process Management - 12th International Conference, BPM 2014, Haifa, Israel, September 7-11, 2014. Proceedings(Lecture Notes in Computer Science, Vol.\u00a08659), Shazia\u00a0Wasim Sadiq, Pnina Soffer, and Hagen V\u00f6lzer (Eds.). Springer, 18\u201333. https:\/\/doi.org\/10.1007\/978-3-319-10172-9_2"},{"key":"e_1_3_2_1_17_1","first-page":"5","article-title":"A Lattice Model of Secure Information","volume":"19","author":"Denning E.","year":"1976","unstructured":"Dorothy\u00a0 E. Denning . 1976 . A Lattice Model of Secure Information Flow. Commun. ACM 19 , 5 (may 1976), 236\u2013243. https:\/\/doi.org\/10.1145\/360051.360056 10.1145\/360051.360056 Dorothy\u00a0E. Denning. 1976. A Lattice Model of Secure Information Flow. Commun. ACM 19, 5 (may 1976), 236\u2013243. https:\/\/doi.org\/10.1145\/360051.360056","journal-title":"Flow. Commun. ACM"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 2nd International Workshop on Scripts to Programs Evolution(STOP \u201911)","author":"Disney Tim","year":"2011","unstructured":"Tim Disney and Cormac Flanagan . 2011 . rmation Flow Typing . In Proceedings of the 2nd International Workshop on Scripts to Programs Evolution(STOP \u201911) . Tim Disney and Cormac Flanagan. 2011. rmation Flow Typing. In Proceedings of the 2nd International Workshop on Scripts to Programs Evolution(STOP \u201911)."},{"key":"e_1_3_2_1_20_1","first-page":"3","article-title":"TaintDroid","volume":"57","author":"Enck William","year":"2014","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon\u00a0 P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol\u00a0 N. Sheth . 2014 . TaintDroid : An Information Flow Tracking System for Real-Time Privacy Monitoring on Smartphones. Commun. ACM 57 , 3 (mar 2014), 99\u2013106. https:\/\/doi.org\/10.1145\/2494522 10.1145\/2494522 William Enck, Peter Gilbert, Byung-Gon Chun, Landon\u00a0P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol\u00a0N. Sheth. 2014. TaintDroid: An Information Flow Tracking System for Real-Time Privacy Monitoring on Smartphones. Commun. ACM 57, 3 (mar 2014), 99\u2013106. https:\/\/doi.org\/10.1145\/2494522","journal-title":"Commun. ACM"},{"key":"e_1_3_2_1_21_1","volume-title":"Gradual Security Typing with References. In 2013 IEEE 26th Computer Security Foundations Symposium. 224\u2013239","author":"Fennell Luminous","year":"2013","unstructured":"Luminous Fennell and Peter Thiemann . 2013 . Gradual Security Typing with References. In 2013 IEEE 26th Computer Security Foundations Symposium. 224\u2013239 . https:\/\/doi.org\/10.1109\/CSF.2013.22 10.1109\/CSF.2013.22 Luminous Fennell and Peter Thiemann. 2013. Gradual Security Typing with References. In 2013 IEEE 26th Computer Security Foundations Symposium. 224\u2013239. https:\/\/doi.org\/10.1109\/CSF.2013.22"},{"volume-title":"Information flow analysis using data-dependent logical propositions.NOVA School do Science and Technology","author":"Abreu\u00a0Duarte Ferreira Paulo Jorge","key":"e_1_3_2_1_22_1","unstructured":"Paulo Jorge Abreu\u00a0Duarte Ferreira . 2012. M Sc Dissertation . Information flow analysis using data-dependent logical propositions.NOVA School do Science and Technology , NOVA University Lisbon . Paulo Jorge Abreu\u00a0Duarte Ferreira. 2012. MSc Dissertation. Information flow analysis using data-dependent logical propositions.NOVA School do Science and Technology, NOVA University Lisbon."},{"key":"e_1_3_2_1_23_1","volume-title":"AND APPARATUS FOR MODEL-BASED SECURITY CONTROL. Patent US20130246995A1.https:\/\/patents.google.com\/patent\/US20130246995A1\/en.","author":"Ferr\u00e3o L\u00facio","year":"2013","unstructured":"L\u00facio Ferr\u00e3o , Jo\u00e3o Costa\u00a0Seco , Lu\u00eds Caires , Gon\u00e7alo Borrega , and Ant\u00f3nio Melo . 2013 . SYSTEMS, METHODS , AND APPARATUS FOR MODEL-BASED SECURITY CONTROL. Patent US20130246995A1.https:\/\/patents.google.com\/patent\/US20130246995A1\/en. L\u00facio Ferr\u00e3o, Jo\u00e3o Costa\u00a0Seco, Lu\u00eds Caires, Gon\u00e7alo Borrega, and Ant\u00f3nio Melo. 2013. SYSTEMS, METHODS, AND APPARATUS FOR MODEL-BASED SECURITY CONTROL. Patent US20130246995A1.https:\/\/patents.google.com\/patent\/US20130246995A1\/en."},{"key":"e_1_3_2_1_24_1","volume-title":"Coordination Models and Languages - 23rd IFIP WG 6.1 International Conference, COORDINATION","author":"Galrinho Leandro","year":"2021","unstructured":"Leandro Galrinho , Jo\u00e3o Costa\u00a0Seco , S\u00f8ren Debois , Thomas\u00a0 T. Hildebrandt , H\u00e5kon Norman , and Tijs Slaats . 2021. ReGraDa: Reactive Graph Data . In Coordination Models and Languages - 23rd IFIP WG 6.1 International Conference, COORDINATION 2021 , Held as Part of the 16th International Federated Conference on Distributed Computing Techniques, DisCoTec 2021, Valletta, Malta, June 14-18, 2021, Proceedings(Lecture Notes in Computer Science, Vol.\u00a012717), Ferruccio Damiani and Ornela Dardha (Eds.). Springer , 188\u2013205. https:\/\/doi.org\/10.1007\/978-3-030-78142-2_12 10.1007\/978-3-030-78142-2_12 Leandro Galrinho, Jo\u00e3o Costa\u00a0Seco, S\u00f8ren Debois, Thomas\u00a0T. Hildebrandt, H\u00e5kon Norman, and Tijs Slaats. 2021. ReGraDa: Reactive Graph Data. In Coordination Models and Languages - 23rd IFIP WG 6.1 International Conference, COORDINATION 2021, Held as Part of the 16th International Federated Conference on Distributed Computing Techniques, DisCoTec 2021, Valletta, Malta, June 14-18, 2021, Proceedings(Lecture Notes in Computer Science, Vol.\u00a012717), Ferruccio Damiani and Ornela Dardha (Eds.). Springer, 188\u2013205. https:\/\/doi.org\/10.1007\/978-3-030-78142-2_12"},{"key":"e_1_3_2_1_25_1","volume-title":"SNITCH: A Platform for Information Flow Control. In Integrated Formal Methods: 17th International Conference, IFM 2022, Lugano, Switzerland, June 7\u201310, 2022, Proceedings","author":"Geraldo Eduardo","year":"2022","unstructured":"Eduardo Geraldo . 2022 . SNITCH: A Platform for Information Flow Control. In Integrated Formal Methods: 17th International Conference, IFM 2022, Lugano, Switzerland, June 7\u201310, 2022, Proceedings ( Lugano, Switzerland). Springer-Verlag, Berlin, Heidelberg, 365\u2013368. https:\/\/doi.org\/10.1007\/978-3-031-07727-2_24 10.1007\/978-3-031-07727-2_24 Eduardo Geraldo. 2022. SNITCH: A Platform for Information Flow Control. In Integrated Formal Methods: 17th International Conference, IFM 2022, Lugano, Switzerland, June 7\u201310, 2022, Proceedings (Lugano, Switzerland). Springer-Verlag, Berlin, Heidelberg, 365\u2013368. https:\/\/doi.org\/10.1007\/978-3-031-07727-2_24"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the Second Workshop on Verification of Objects at RunTime EXecution, VORTEX@ECOOP\/ISSTA 2018","author":"Geraldo Eduardo","year":"2018","unstructured":"Eduardo Geraldo and Jo\u00e3o Costa\u00a0Seco . 2018 . SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode . In Proceedings of the Second Workshop on Verification of Objects at RunTime EXecution, VORTEX@ECOOP\/ISSTA 2018 , Amsterdam, Netherlands, 17th July 2018(EPTCS, Vol.\u00a0302), Davide Ancona and Gordon Pace (Eds.). 16\u201331. https:\/\/doi.org\/10.4204\/EPTCS.302.2 10.4204\/EPTCS.302.2 Eduardo Geraldo and Jo\u00e3o Costa\u00a0Seco. 2018. SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode. In Proceedings of the Second Workshop on Verification of Objects at RunTime EXecution, VORTEX@ECOOP\/ISSTA 2018, Amsterdam, Netherlands, 17th July 2018(EPTCS, Vol.\u00a0302), Davide Ancona and Gordon Pace (Eds.). 16\u201331. https:\/\/doi.org\/10.4204\/EPTCS.302.2"},{"key":"e_1_3_2_1_27_1","volume-title":"SEFM 2021, Virtual Event, December 6-10, 2021, Proceedings(Lecture Notes in Computer Science, Vol.\u00a013085)","author":"Geraldo Eduardo","year":"2021","unstructured":"Eduardo Geraldo , Jos\u00e9\u00a0Fragoso Santos , and Jo\u00e3o Costa\u00a0Seco . 2021 . Hybrid Information Flow Control for Low-Level Code. In Software Engineering and Formal Methods - 19th International Conference , SEFM 2021, Virtual Event, December 6-10, 2021, Proceedings(Lecture Notes in Computer Science, Vol.\u00a013085) , Radu Calinescu and Corina\u00a0S. Pasareanu (Eds.). Springer, 141\u2013159. https:\/\/doi.org\/10.1007\/978-3-030-92124-8_9 10.1007\/978-3-030-92124-8_9 Eduardo Geraldo, Jos\u00e9\u00a0Fragoso Santos, and Jo\u00e3o Costa\u00a0Seco. 2021. Hybrid Information Flow Control for Low-Level Code. In Software Engineering and Formal Methods - 19th International Conference, SEFM 2021, Virtual Event, December 6-10, 2021, Proceedings(Lecture Notes in Computer Science, Vol.\u00a013085), Radu Calinescu and Corina\u00a0S. Pasareanu (Eds.). Springer, 141\u2013159. https:\/\/doi.org\/10.1007\/978-3-030-92124-8_9"},{"key":"e_1_3_2_1_28_1","volume-title":"SNITCH: Dependent Dynamic Information Flow Analysis on Intermediate Java Code. Master\u2019s thesis. NOVA School of Science & Technology.","author":"Pereira Cano\u00a0Rico Geraldo Eduardo Miguel","year":"2018","unstructured":"Eduardo Miguel Pereira Cano\u00a0Rico Geraldo . 2018 . SNITCH: Dependent Dynamic Information Flow Analysis on Intermediate Java Code. Master\u2019s thesis. NOVA School of Science & Technology. Eduardo Miguel Pereira Cano\u00a0Rico Geraldo. 2018. SNITCH: Dependent Dynamic Information Flow Analysis on Intermediate Java Code. Master\u2019s thesis. NOVA School of Science & Technology."},{"key":"e_1_3_2_1_29_1","volume-title":"Pifthon: A Compile-Time Information Flow Analyzer For An Imperative Language. CoRR abs\/2103.06039","author":"Ghosal Sandip","year":"2021","unstructured":"Sandip Ghosal and R.\u00a0 K. Shyamasundar . 2021 . Pifthon: A Compile-Time Information Flow Analyzer For An Imperative Language. CoRR abs\/2103.06039 (2021). arXiv:2103.06039https:\/\/arxiv.org\/abs\/2103.06039 Sandip Ghosal and R.\u00a0K. Shyamasundar. 2021. Pifthon: A Compile-Time Information Flow Analyzer For An Imperative Language. CoRR abs\/2103.06039 (2021). arXiv:2103.06039https:\/\/arxiv.org\/abs\/2103.06039"},{"key":"e_1_3_2_1_30_1","volume-title":"2012 IEEE 25th Computer Security Foundations Symposium. 3\u201318","author":"Hedin Daniel","year":"2012","unstructured":"Daniel Hedin and Andrei Sabelfeld . 2012 . Information-Flow Security for a Core of JavaScript . In 2012 IEEE 25th Computer Security Foundations Symposium. 3\u201318 . https:\/\/doi.org\/10.1109\/CSF.2012.19 10.1109\/CSF.2012.19 Daniel Hedin and Andrei Sabelfeld. 2012. Information-Flow Security for a Core of JavaScript. In 2012 IEEE 25th Computer Security Foundations Symposium. 3\u201318. https:\/\/doi.org\/10.1109\/CSF.2012.19"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the International Conference on Software and System Processes","author":"Hildebrandt T.","year":"2020","unstructured":"Thomas\u00a0 T. Hildebrandt , Amine\u00a0Abbad Andaloussi , Lars\u00a0 R. Christensen , S\u00f8ren Debois , Nicklas\u00a0Pape Healy , Hugo\u00a0 A. L\u00f3pez , Morten Marquard , Naja L.\u00a0H. M\u00f8ller , Anette C.\u00a0M. Petersen , Tijs Slaats , and Barbara Weber . 2020 . EcoKnow: Engineering Effective, Co-Created and Compliant Adaptive Case Management Systems for Knowledge Workers . In Proceedings of the International Conference on Software and System Processes ( Seoul, Republic of Korea) (ICSSP \u201920). Association for Computing Machinery, New York, NY, USA, 155\u2013164. https:\/\/doi.org\/10.1145\/3379177.3388908 10.1145\/3379177.3388908 Thomas\u00a0T. Hildebrandt, Amine\u00a0Abbad Andaloussi, Lars\u00a0R. Christensen, S\u00f8ren Debois, Nicklas\u00a0Pape Healy, Hugo\u00a0A. L\u00f3pez, Morten Marquard, Naja L.\u00a0H. M\u00f8ller, Anette C.\u00a0M. Petersen, Tijs Slaats, and Barbara Weber. 2020. EcoKnow: Engineering Effective, Co-Created and Compliant Adaptive Case Management Systems for Knowledge Workers. In Proceedings of the International Conference on Software and System Processes (Seoul, Republic of Korea) (ICSSP \u201920). Association for Computing Machinery, New York, NY, USA, 155\u2013164. https:\/\/doi.org\/10.1145\/3379177.3388908"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings Third Workshop on Programming Language Approaches to Concurrency and communication-cEntric Software, PLACES 2010","author":"T.","year":"2010","unstructured":"Thomas\u00a0 T. Hildebrandt and Raghava\u00a0Rao Mukkamala. 2010. Declarative Event-Based Workflow as Distributed Dynamic Condition Response Graphs . In Proceedings Third Workshop on Programming Language Approaches to Concurrency and communication-cEntric Software, PLACES 2010 , Paphos, Cyprus, 21st March 2010 (EPTCS, Vol.\u00a069), Kohei Honda and Alan Mycroft (Eds.). 59\u201373. https:\/\/doi.org\/10.4204\/EPTCS.69.5 10.4204\/EPTCS.69.5 Thomas\u00a0T. Hildebrandt and Raghava\u00a0Rao Mukkamala. 2010. Declarative Event-Based Workflow as Distributed Dynamic Condition Response Graphs. In Proceedings Third Workshop on Programming Language Approaches to Concurrency and communication-cEntric Software, PLACES 2010, Paphos, Cyprus, 21st March 2010(EPTCS, Vol.\u00a069), Kohei Honda and Alan Mycroft (Eds.). 59\u201373. https:\/\/doi.org\/10.4204\/EPTCS.69.5"},{"key":"e_1_3_2_1_33_1","volume-title":"Business Process Management Workshops, Andrea Marrella and Barbara Weber (Eds.). Springer International Publishing, Cham, 362\u2013374","author":"Hildebrandt T.","year":"2022","unstructured":"Thomas\u00a0 T. Hildebrandt , H\u00e5kon Normann , Morten Marquard , S\u00f8ren Debois , and Tijs Slaats . 2022 . Decision Modelling in\u00a0Timed Dynamic Condition Response Graphs with\u00a0Data . In Business Process Management Workshops, Andrea Marrella and Barbara Weber (Eds.). Springer International Publishing, Cham, 362\u2013374 . Thomas\u00a0T. Hildebrandt, H\u00e5kon Normann, Morten Marquard, S\u00f8ren Debois, and Tijs Slaats. 2022. Decision Modelling in\u00a0Timed Dynamic Condition Response Graphs with\u00a0Data. In Business Process Management Workshops, Andrea Marrella and Barbara Weber (Eds.). Springer International Publishing, Cham, 362\u2013374."},{"key":"e_1_3_2_1_34_1","volume-title":"Programming Languages and Systems, 9th European Symposium on Programming, ESOP","author":"Honda Kohei","year":"2000","unstructured":"Kohei Honda , Vasco\u00a0Thudichum Vasconcelos , and Nobuko Yoshida . 2000. Secure Information Flow as Typed Process Behaviour . In Programming Languages and Systems, 9th European Symposium on Programming, ESOP 2000 , Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000, Berlin, Germany, March 25 - April 2, 2000, Proceedings(Lecture Notes in Computer Science, Vol.\u00a01782), Gert Smolka (Ed.). Springer , 180\u2013199. https:\/\/doi.org\/10.1007\/3-540-46425-5_12 10.1007\/3-540-46425-5_12 Kohei Honda, Vasco\u00a0Thudichum Vasconcelos, and Nobuko Yoshida. 2000. Secure Information Flow as Typed Process Behaviour. In Programming Languages and Systems, 9th European Symposium on Programming, ESOP 2000, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000, Berlin, Germany, March 25 - April 2, 2000, Proceedings(Lecture Notes in Computer Science, Vol.\u00a01782), Gert Smolka (Ed.). Springer, 180\u2013199. https:\/\/doi.org\/10.1007\/3-540-46425-5_12"},{"key":"e_1_3_2_1_35_1","first-page":"4","article-title":"Type-based information flow analysis for the pi-calculus","volume":"42","author":"Kobayashi Naoki","year":"2005","unstructured":"Naoki Kobayashi . 2005 . Type-based information flow analysis for the pi-calculus . Acta Informatica 42 , 4 - 5 (2005), 291\u2013347. https:\/\/doi.org\/10.1007\/s00236-005-0179-x 10.1007\/s00236-005-0179-x Naoki Kobayashi. 2005. Type-based information flow analysis for the pi-calculus. Acta Informatica 42, 4-5 (2005), 291\u2013347. https:\/\/doi.org\/10.1007\/s00236-005-0179-x","journal-title":"Acta Informatica"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles","author":"Krohn Maxwell","year":"2007","unstructured":"Maxwell Krohn , Alexander Yip , Micah Brodsky , Natan Cliffer , M.\u00a0 Frans Kaashoek , Eddie Kohler , and Robert Morris . 2007 . Information Flow Control for Standard OS Abstractions . In Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles ( Stevenson, Washington, USA) (SOSP \u201907). Association for Computing Machinery, New York, NY, USA, 321\u2013334. https:\/\/doi.org\/10.1145\/1294261.1294293 10.1145\/1294261.1294293 Maxwell Krohn, Alexander Yip, Micah Brodsky, Natan Cliffer, M.\u00a0Frans Kaashoek, Eddie Kohler, and Robert Morris. 2007. Information Flow Control for Standard OS Abstractions. In Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles (Stevenson, Washington, USA) (SOSP \u201907). Association for Computing Machinery, New York, NY, USA, 321\u2013334. https:\/\/doi.org\/10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 10th International Conference on Business Process Management - Demo Track (BPM","author":"Lehmann A.","year":"2012","unstructured":"A. Lehmann and D. Fahland . 2012. Information Flow Security for Business Process Models - just one click away . In Proceedings of the 10th International Conference on Business Process Management - Demo Track (BPM 2012 ). A. Lehmann and D. Fahland. 2012. Information Flow Security for Business Process Models - just one click away. In Proceedings of the 10th International Conference on Business Process Management - Demo Track (BPM 2012)."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"Louren\u00e7o Lu\u00edsa","year":"2015","unstructured":"Lu\u00edsa Louren\u00e7o and Lu\u00eds Caires . 2015 . Dependent Information Flow Types . In Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages ( Mumbai, India) (POPL \u201915). Association for Computing Machinery, New York, NY, USA, 317\u2013328. https:\/\/doi.org\/10.1145\/2676726.2676994 10.1145\/2676726.2676994 Lu\u00edsa Louren\u00e7o and Lu\u00eds Caires. 2015. Dependent Information Flow Types. In Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (Mumbai, India) (POPL \u201915). Association for Computing Machinery, New York, NY, USA, 317\u2013328. https:\/\/doi.org\/10.1145\/2676726.2676994"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1145\/363516.363526","article-title":"Protecting Privacy Using the Decentralized Label Model","volume":"9","author":"Myers C.","year":"2000","unstructured":"Andrew\u00a0 C. Myers and Barbara Liskov . 2000 . Protecting Privacy Using the Decentralized Label Model . ACM Trans. Softw. Eng. Methodol. 9 , 4 (oct 2000), 410\u2013442. https:\/\/doi.org\/10.1145\/363516.363526 10.1145\/363516.363526 Andrew\u00a0C. Myers and Barbara Liskov. 2000. Protecting Privacy Using the Decentralized Label Model. ACM Trans. Softw. Eng. Methodol. 9, 4 (oct 2000), 410\u2013442. https:\/\/doi.org\/10.1145\/363516.363526","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the ACM Programming Languages 4, ICFP, Article 105 (aug","author":"Polikarpova Nadia","year":"2020","unstructured":"Nadia Polikarpova , Deian Stefan , Jean Yang , Shachar Itzhaky , Travis Hance , and Armando Solar-Lezama . 2020 . Liquid Information Flow Control . Proceedings of the ACM Programming Languages 4, ICFP, Article 105 (aug 2020), 30\u00a0pages. https:\/\/doi.org\/10.1145\/3408987 10.1145\/3408987 Nadia Polikarpova, Deian Stefan, Jean Yang, Shachar Itzhaky, Travis Hance, and Armando Solar-Lezama. 2020. Liquid Information Flow Control. Proceedings of the ACM Programming Languages 4, ICFP, Article 105 (aug 2020), 30\u00a0pages. https:\/\/doi.org\/10.1145\/3408987"},{"volume-title":"PE-BPMN: Privacy-Enhanced Business Process Model and Notation","author":"Pullonen Pille","key":"e_1_3_2_1_41_1","unstructured":"Pille Pullonen , Raimundas Matulevi\u010dius , and Dan Bogdanov . 2017. PE-BPMN: Privacy-Enhanced Business Process Model and Notation . In Business Process Management, Josep Carmona, Gregor Engels, and Akhil Kumar (Eds.). Springer International Publishing , Cham , 40\u201356. Pille Pullonen, Raimundas Matulevi\u010dius, and Dan Bogdanov. 2017. PE-BPMN: Privacy-Enhanced Business Process Model and Notation. In Business Process Management, Josep Carmona, Gregor Engels, and Akhil Kumar (Eds.). Springer International Publishing, Cham, 40\u201356."},{"key":"e_1_3_2_1_42_1","volume-title":"Privacy-enhanced BPMN: enabling data privacy analysis in business processes models. Software & Systems Modeling 18 (12","author":"Pullonen Pille","year":"2019","unstructured":"Pille Pullonen , Jake Tom , Raimundas Matulevi\u010dius , and Aivo Toots . 2019. Privacy-enhanced BPMN: enabling data privacy analysis in business processes models. Software & Systems Modeling 18 (12 2019 ). https:\/\/doi.org\/10.1007\/s10270-019-00718-z 10.1007\/s10270-019-00718-z Pille Pullonen, Jake Tom, Raimundas Matulevi\u010dius, and Aivo Toots. 2019. Privacy-enhanced BPMN: enabling data privacy analysis in business processes models. Software & Systems Modeling 18 (12 2019). https:\/\/doi.org\/10.1007\/s10270-019-00718-z"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 2006 Conference on Pattern Languages of Programs","author":"Romanosky Sasha","year":"2006","unstructured":"Sasha Romanosky , Alessandro Acquisti , Jason Hong , Lorrie\u00a0Faith Cranor , and Batya Friedman . 2006 . Privacy Patterns for Online Interactions . In Proceedings of the 2006 Conference on Pattern Languages of Programs ( Portland, Oregon, USA) (PLoP \u201906). Association for Computing Machinery, New York, NY, USA, Article 12, 9\u00a0pages. https:\/\/doi.org\/10.1145\/1415472.1415486 10.1145\/1415472.1415486 Sasha Romanosky, Alessandro Acquisti, Jason Hong, Lorrie\u00a0Faith Cranor, and Batya Friedman. 2006. Privacy Patterns for Online Interactions. In Proceedings of the 2006 Conference on Pattern Languages of Programs (Portland, Oregon, USA) (PLoP \u201906). Association for Computing Machinery, New York, NY, USA, Article 12, 9\u00a0pages. https:\/\/doi.org\/10.1145\/1415472.1415486"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the ACM Programming Languages 2, POPL","author":"Santos Jos\u00e9\u00a0Fragoso","year":"2018","unstructured":"Jos\u00e9\u00a0Fragoso Santos , Petar Maksimovic , Daiva Naudziuniene , Thomas Wood , and Philippa Gardner . 2018 . JaVerT: JavaScript verification toolchain . Proceedings of the ACM Programming Languages 2, POPL (2018), 50:1\u201350:33. https:\/\/doi.org\/10.1145\/3158138 10.1145\/3158138 Jos\u00e9\u00a0Fragoso Santos, Petar Maksimovic, Daiva Naudziuniene, Thomas Wood, and Philippa Gardner. 2018. JaVerT: JavaScript verification toolchain. Proceedings of the ACM Programming Languages 2, POPL (2018), 50:1\u201350:33. https:\/\/doi.org\/10.1145\/3158138"},{"key":"e_1_3_2_1_45_1","volume-title":"Gradual Typing for Objects. In ECOOP 2007 \u2013 Object-Oriented Programming, Erik Ernst (Ed.). Springer Berlin Heidelberg","author":"Siek Jeremy","year":"2007","unstructured":"Jeremy Siek and Walid Taha . 2007 . Gradual Typing for Objects. In ECOOP 2007 \u2013 Object-Oriented Programming, Erik Ernst (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg, 2\u201327. Jeremy Siek and Walid Taha. 2007. Gradual Typing for Objects. In ECOOP 2007 \u2013 Object-Oriented Programming, Erik Ernst (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 2\u201327."},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the first APPSEM-II workshop, Graham Hutton (Ed.)","author":"Simonet Vincent","year":"2003","unstructured":"Vincent Simonet . 2003 . Flow Caml in a Nutshell . In Proceedings of the first APPSEM-II workshop, Graham Hutton (Ed.) . Nottingham, United Kingdom, 152\u2013165. Vincent Simonet. 2003. Flow Caml in a Nutshell. In Proceedings of the first APPSEM-II workshop, Graham Hutton (Ed.). Nottingham, United Kingdom, 152\u2013165."},{"key":"e_1_3_2_1_47_1","first-page":"280","article-title":"Checking probabilistic noninterference using JOANA. it","volume":"56","author":"Snelting Gregor","year":"2014","unstructured":"Gregor Snelting , Dennis Giffhorn , J\u00fcrgen Graf , Christian Hammer , Martin Hecker , Martin Mohr , and Daniel Wasserrab . 2014 . Checking probabilistic noninterference using JOANA. it Inf. Technol. 56 , 6 (2014), 280 \u2013 287 . http:\/\/www.degruyter.com\/view\/j\/itit.2014.56.issue-6\/itit-2014-1051\/itit-2014-1051.xml Gregor Snelting, Dennis Giffhorn, J\u00fcrgen Graf, Christian Hammer, Martin Hecker, Martin Mohr, and Daniel Wasserrab. 2014. Checking probabilistic noninterference using JOANA. it Inf. Technol. 56, 6 (2014), 280\u2013287. http:\/\/www.degruyter.com\/view\/j\/itit.2014.56.issue-6\/itit-2014-1051\/itit-2014-1051.xml","journal-title":"Inf. Technol."},{"key":"e_1_3_2_1_48_1","volume-title":"Business Process Privacy Analysis in Pleak. CoRR abs\/1902.05052","author":"Toots Aivo","year":"2019","unstructured":"Aivo Toots , Reedik Tuuling , Maksym Yerokhin , Marlon Dumas , Luciano Garc\u00eda-Ba\u00f1uelos , Peeter Laud , Raimundas Matulevicius , Alisa Pankova , Martin Pettai , Pille Pullonen , and Jake Tom . 2019. Business Process Privacy Analysis in Pleak. CoRR abs\/1902.05052 ( 2019 ). arXiv:1902.05052http:\/\/arxiv.org\/abs\/1902.05052 Aivo Toots, Reedik Tuuling, Maksym Yerokhin, Marlon Dumas, Luciano Garc\u00eda-Ba\u00f1uelos, Peeter Laud, Raimundas Matulevicius, Alisa Pankova, Martin Pettai, Pille Pullonen, and Jake Tom. 2019. Business Process Privacy Analysis in Pleak. CoRR abs\/1902.05052 (2019). arXiv:1902.05052http:\/\/arxiv.org\/abs\/1902.05052"},{"key":"e_1_3_2_1_49_1","article-title":"Type-Driven Gradual Security with References","volume":"40","author":"Toro Mat\u00edas","year":"2018","unstructured":"Mat\u00edas Toro , Ronald Garcia , and \u00c9ric Tanter . 2018 . Type-Driven Gradual Security with References . ACM Trans. Program. Lang. Syst. 40 , 4 (2018), 16:1\u201316:55. https:\/\/doi.org\/10.1145\/3229061 10.1145\/3229061 Mat\u00edas Toro, Ronald Garcia, and \u00c9ric Tanter. 2018. Type-Driven Gradual Security with References. ACM Trans. Program. Lang. Syst. 40, 4 (2018), 16:1\u201316:55. https:\/\/doi.org\/10.1145\/3229061","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"e_1_3_2_1_50_1","volume-title":"van\u00a0der Aalst","author":"Wil","year":"2009","unstructured":"Wil M.\u00a0P. van\u00a0der Aalst . 2009 . Process-Aware Information Systems: Lessons to Be Learned from Process Mining. Springer Berlin Heidelberg , Berlin, Heidelberg, 1\u201326. https:\/\/doi.org\/10.1007\/978-3-642-00899-3_1 10.1007\/978-3-642-00899-3_1 Wil M.\u00a0P. van\u00a0der Aalst. 2009. Process-Aware Information Systems: Lessons to Be Learned from Process Mining. Springer Berlin Heidelberg, Berlin, Heidelberg, 1\u201326. https:\/\/doi.org\/10.1007\/978-3-642-00899-3_1"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 30th International Workshop on Description Logics, Montpellier, France, July 18-21, 2017(CEUR Workshop Proceedings, Vol.\u00a01879)","author":"van\u00a0der Aalst Wil","year":"2017","unstructured":"Wil M.\u00a0P. van\u00a0der Aalst , Alessandro Artale , Marco Montali , and Simone Tritini . 2017 . Object-Centric Behavioral Constraints: Integrating Data and Declarative Process Modelling . In Proceedings of the 30th International Workshop on Description Logics, Montpellier, France, July 18-21, 2017(CEUR Workshop Proceedings, Vol.\u00a01879) , Alessandro Artale, Birte Glimm, and Roman Kontchakov (Eds.). CEUR-WS.org. http:\/\/ceur-ws.org\/Vol- 1879\/paper51.pdf Wil M.\u00a0P. van\u00a0der Aalst, Alessandro Artale, Marco Montali, and Simone Tritini. 2017. Object-Centric Behavioral Constraints: Integrating Data and Declarative Process Modelling. In Proceedings of the 30th International Workshop on Description Logics, Montpellier, France, July 18-21, 2017(CEUR Workshop Proceedings, Vol.\u00a01879), Alessandro Artale, Birte Glimm, and Roman Kontchakov (Eds.). CEUR-WS.org. http:\/\/ceur-ws.org\/Vol-1879\/paper51.pdf"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","article-title":"A Sound Type System for Secure Flow Analysis","volume":"4","author":"Volpano M.","year":"1996","unstructured":"Dennis\u00a0 M. Volpano , Cynthia\u00a0 E. Irvine , and Geoffrey Smith . 1996 . A Sound Type System for Secure Flow Analysis . J. Comput. Secur. 4 , 2\/3 (1996), 167 \u2013 188 . https:\/\/doi.org\/10.3233\/JCS-1996-42-304 10.3233\/JCS-1996-42-304 Dennis\u00a0M. Volpano, Cynthia\u00a0E. Irvine, and Geoffrey Smith. 1996. A Sound Type System for Secure Flow Analysis. J. Comput. Secur. 4, 2\/3 (1996), 167\u2013188. https:\/\/doi.org\/10.3233\/JCS-1996-42-304","journal-title":"J. Comput. Secur."}],"event":{"name":"PPDP 2023: International Symposium on Principles and Practice of Declarative Programming","acronym":"PPDP 2023","location":"Lisboa Portugal"},"container-title":["International Symposium on Principles and Practice of Declarative Programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3610612.3610619","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:00Z","timestamp":1750178160000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3610612.3610619"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,22]]},"references-count":51,"alternative-id":["10.1145\/3610612.3610619","10.1145\/3610612"],"URL":"https:\/\/doi.org\/10.1145\/3610612.3610619","relation":{},"subject":[],"published":{"date-parts":[[2023,10,22]]},"assertion":[{"value":"2023-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}