{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T12:30:42Z","timestamp":1777984242600,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,1,14]],"date-time":"2015-01-14T00:00:00Z","timestamp":1421193600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,1,14]]},"DOI":"10.1145\/2676726.2676994","type":"proceedings-article","created":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T08:51:05Z","timestamp":1418979065000},"page":"317-328","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Dependent Information Flow Types"],"prefix":"10.1145","author":[{"given":"Lu\u00edsa","family":"Louren\u00e7o","sequence":"first","affiliation":[{"name":"CITI and NOVA-LINCS \/ Universidade Nova de Lisboa, Caparica, Portugal"}]},{"given":"Lu\u00eds","family":"Caires","sequence":"additional","affiliation":[{"name":"CITI and NOVA-LINCS \/ Universidade Nova de Lisboa, Caparica, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2015,1,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292555"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.22"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796812000032"},{"key":"e_1_3_2_2_4_1","volume-title":"Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications. In USENIX OSDI","author":"Chlipala A.","year":"2010","unstructured":"A. Chlipala . Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications. In USENIX OSDI 2010 . A. Chlipala. Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications. In USENIX OSDI 2010."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559875"},{"key":"e_1_3_2_2_6_1","volume-title":"USENIX WebApps","author":"Davis B.","year":"2010","unstructured":"B. Davis and H. Chen . DBTaint: Cross-Application Information Flow Tracking via Databases . In USENIX WebApps 2010 . B. Davis and H. Chen. DBTaint: Cross-Application Information Flow Tracking via Databases. In USENIX WebApps 2010."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_2_9_1","volume-title":"TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In USENIX OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B. Chun , L. P. Cox , J. Jung , P. M. , and A. Sheth . TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In USENIX OSDI 2010 . W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung, P. M., and A. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In USENIX OSDI 2010."},{"key":"e_1_3_2_2_10_1","volume-title":"Security Policies and Security Models. In IEEE SSP","author":"Goguen J. A.","year":"1982","unstructured":"J. A. Goguen and J. Meseguer . Security Policies and Security Models. In IEEE SSP 1982 . J. A. Goguen and J. Meseguer. Security Policies and Security Models. In IEEE SSP 1982."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.19"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268976"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/645394.651914"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.10"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2005.23"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629606"},{"key":"e_1_3_2_2_17_1","volume-title":"Information Flow Analysis for Valued-Indexed Data Security Compartments. In TGC","author":"Louren\u00e7o L.","year":"2013","unstructured":"L. Louren\u00e7o and L. Caires . Information Flow Analysis for Valued-Indexed Data Security Compartments. In TGC 2013 . L. Louren\u00e7o and L. Caires. Information Flow Analysis for Valued-Indexed Data Security Compartments. In TGC 2013."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.12"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503302"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011553200337"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.29"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11957-6_28"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034811"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290520.1290526"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/353629.353648"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292560"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212703"},{"key":"e_1_3_2_2_31_1","volume-title":"Securing Distributed Systems with Information Flow Control. In USENIX NSDI","author":"Zeldovich N.","year":"2008","unstructured":"N. Zeldovich , S. Boyd-Wickizer , and D. Mazi\u00e8res . Securing Distributed Systems with Information Flow Control. In USENIX NSDI 2008 . N. Zeldovich, S. Boyd-Wickizer, and D. Mazi\u00e8res. Securing Distributed Systems with Information Flow Control. In USENIX NSDI 2008."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0019-9"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535847"},{"key":"e_1_3_2_2_34_1","volume-title":"UNL","author":"Louren\u00e7o L.","year":"2014","unstructured":"L. Louren\u00e7o and L. Caires . Dependent Information Flow Types. Technical report , UNL , 2014 . L. Louren\u00e7o and L. Caires. Dependent Information Flow Types. Technical report, UNL, 2014."},{"key":"e_1_3_2_2_35_1","unstructured":"DIFT Prototype. http:\/\/ctp.di.fct.unl.pt\/DIFTprototype.  DIFT Prototype. http:\/\/ctp.di.fct.unl.pt\/DIFTprototype."}],"event":{"name":"POPL '15: The 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","location":"Mumbai India","acronym":"POPL '15","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676726.2676994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2676726.2676994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:03Z","timestamp":1750212783000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676726.2676994"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,14]]},"references-count":35,"alternative-id":["10.1145\/2676726.2676994","10.1145\/2676726"],"URL":"https:\/\/doi.org\/10.1145\/2676726.2676994","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2775051.2676994","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,1,14]]},"assertion":[{"value":"2015-01-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}