{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:57:44Z","timestamp":1773615464477,"version":"3.50.1"},"reference-count":7,"publisher":"Allerton Press","issue":"7","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.3103\/s0146411614070177","type":"journal-article","created":{"date-parts":[[2015,1,30]],"date-time":"2015-01-30T19:16:45Z","timestamp":1422645405000},"page":"589-593","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A translator with a security static analysis feature of an information flow for a simple programming language"],"prefix":"10.3103","volume":"48","author":[{"given":"E. Ju.","family":"Antoshina","sequence":"first","affiliation":[]},{"given":"A. N.","family":"Barakova","sequence":"additional","affiliation":[]},{"given":"E. S.","family":"Nikitin","sequence":"additional","affiliation":[]},{"given":"D. Ju.","family":"Chalyy","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2015,2,1]]},"reference":[{"key":"6361_CR1","volume-title":"Modeli bezopasnosti kompjuternyh sistem: Uchebnoe posobie dlja studentov vysshih uchebnyh zavedenii","author":"PN Devyanin","year":"2005","unstructured":"Devyanin, P.N., Modeli bezopasnosti kompjuternyh sistem: Uchebnoe posobie dlja studentov vysshih uchebnyh zavedenii (Models of Computer System Security. A Tutorial for Students of Higher Educational Institutes) Moscow: Akademija, 2005."},{"key":"6361_CR2","volume-title":"The Art of Computer Programming. MMIX-A RISC Computer for the New Millenium","author":"DE Knuth","year":"2005","unstructured":"Knuth, D.E., The Art of Computer Programming. MMIX-A RISC Computer for the New Millenium, vol. 1, fasc. 1, Addison-Wesley Professional, 2005."},{"key":"6361_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-68954-8","volume-title":"Parsing Techniques. A Practical Guide","author":"D Grune","year":"2008","unstructured":"Grune, D. and Jacobs, C.J.H., Parsing Techniques. A Practical Guide, Springer-Verlag, 2008, 2nd ed.","edition":"2nd ed"},{"key":"6361_CR4","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1145\/363235.363259","volume":"12","author":"CAR Hoare","year":"1969","unstructured":"Hoare, C.A.R., An axiomatic basis for computer programming, Commun. ACM, 1969, vol. 12, pp. 576\u2013580.","journal-title":"Commun. ACM"},{"key":"6361_CR5","volume-title":"Flex and Bison","author":"J Levine","year":"2009","unstructured":"Levine, J., Flex and Bison. O\u2019Reilly Media, 2009."},{"key":"6361_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A. and Myers, A.C., Language-based information-flow security, IEEE J. Selected Areas in Commun., 2003, vol. 21, pp. 5\u201319.","journal-title":"IEEE J. Selected Areas in Commun."},{"key":"6361_CR7","unstructured":"SWHILE-while-language translator with security types, www:https:\/\/bitbucket.org\/kafti\/swhile. since 22.04.2014"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411614070177.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411614070177","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411614070177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411614070177.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:14Z","timestamp":1773612014000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411614070177"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":7,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["6361"],"URL":"https:\/\/doi.org\/10.3103\/s0146411614070177","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12]]},"assertion":[{"value":"28 April 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2015","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}