{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:17:18Z","timestamp":1771003038357,"version":"3.50.1"},"reference-count":11,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2016,10,13]]},"DOI":"10.3233\/jcm-160642","type":"journal-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T10:03:26Z","timestamp":1469527406000},"page":"591-597","source":"Crossref","is-referenced-by-count":1,"title":["Alternative composition analysis of noninterference in cyber-physical system"],"prefix":"10.1177","volume":"16","author":[{"given":"Jingming","family":"Wang","sequence":"first","affiliation":[]}],"member":"179","reference":[{"key":"10.3233\/JCM-160642_ref1","doi-asserted-by":"crossref","unstructured":"Gamage T.T. and McMillin B.M., Observing for Changes: Non-Deducibility Based Analysis of Cyber-Physical Systems. In Proceedings of the 3rd International Federation for Information Processing Conference (IFIP WG 11.10). Hanover, NH: Springer Boston, April 2009, pp. 169-183.","DOI":"10.1007\/978-3-642-04798-5_12"},{"key":"10.3233\/JCM-160642_ref3","unstructured":"Goguen J.A. and Meseguer J., Security policies and security models. Proc. 1982 IEEE Symposium on Security and Privacy, IEEE Press, 1982, pp. 11-20."},{"key":"10.3233\/JCM-160642_ref4","unstructured":"Goguen J.A. and Meseguer J., Inference control and unwinding. Proc. 1984 IEEE Symposium on Security and Privacy, IEEE Press, 1984, pp. 75-86."},{"key":"10.3233\/JCM-160642_ref5","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.ijcip.2010.09.001","article-title":"Analysis of information flow security in cyber-physical system","volume":"3","author":"Akella","year":"2010","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"10.3233\/JCM-160642_ref6","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/978-3-642-01465-9_14","volume-title":"Formal Aspects in Security and Trust","author":"Frau","year":"2009"},{"key":"10.3233\/JCM-160642_ref7","doi-asserted-by":"crossref","unstructured":"Busi N. and Gorrieri R., A Survey on NonInterference with Petri Nets. Advanced Course on Petri Nets 2003, Springer LNCS 3098: 328-344, 2004.","DOI":"10.1007\/978-3-540-27755-2_8"},{"key":"10.3233\/JCM-160642_ref8","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/3-540-45608-2_6","volume-title":"Foundations of Security Analysis and Design - Tutorial Lectures","author":"Focardi","year":"2001"},{"key":"10.3233\/JCM-160642_ref9","unstructured":"Chen S., Zhou C.-H., Ju S.-G. and Li H.-Y., Analysis for the composition of information flow security properties on Petri net. In Proceedings of the 3rd IEEE International Conference on Information Science and Engineering, Hefei, China, Dec, 2010."},{"issue":"1","key":"10.3233\/JCM-160642_ref10","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","article-title":"A Classification of Security Properties","volume":"3","author":"Focardi","year":"1995","journal-title":"Journal of Computer Security"},{"issue":"6","key":"10.3233\/JCM-160642_ref11","doi-asserted-by":"crossref","first-page":"3137","DOI":"10.12785\/amis\/080655","article-title":"Analysis of the Composition of Non-Deducibility in Cyber-Phyiscal Systems","volume":"8","author":"Wang","year":"2014","journal-title":"Applied Mathematics and Information Sciences"},{"issue":"3","key":"10.3233\/JCM-160642_ref12","doi-asserted-by":"crossref","first-page":"185","DOI":"10.14257\/ijsia.2014.8.3.20","article-title":"Sequence compostion analysis of non-interference in cyber-physical system with Petri net","volume":"8","author":"Wang","year":"2014","journal-title":"International Journal of Security and its Applications"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JCM-160642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:31:17Z","timestamp":1771000277000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JCM-160642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,13]]},"references-count":11,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/jcm-160642","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,13]]}}}