{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T04:20:27Z","timestamp":1741666827327,"version":"3.38.0"},"reference-count":11,"publisher":"SAGE Publications","issue":"4-5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCS"],"published-print":{"date-parts":[[2017,7,10]]},"DOI":"10.3233\/jcs-0559","type":"journal-article","created":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:08:05Z","timestamp":1498234085000},"page":"319-321","source":"Crossref","is-referenced-by-count":7,"title":["Special issue on verified information flow security"],"prefix":"10.1177","volume":"25","author":[{"given":"Toby","family":"Murray","sequence":"first","affiliation":[{"name":"School of Computing and Information Systems, University of Melbourne, Australia. E-mail:\u00a0toby.murray@unimelb.edu.au"},{"name":"Data61, CSIRO, Australia"}]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chalmers University of Technology, Sweden. E-mail:\u00a0andrei@chalmers.se"}]},{"given":"Lujo","family":"Bauer","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering and Institute for Software Research, Carnegie Mellon University, PA, USA. E-mail:\u00a0lbauer@cmu.edu"}]}],"member":"179","reference":[{"issue":"6","key":"10.3233\/JCS-0559_ref1","doi-asserted-by":"publisher","first-page":"667","DOI":"10.3233\/JCS-15746","article-title":"A verified information-flow architecture","volume":"24","author":"Azevedo de Amorim","year":"2016","journal-title":"Journal of Computer Security"},{"key":"10.3233\/JCS-0559_ref2","doi-asserted-by":"crossref","unstructured":"L.\u00a0Bauer, S.\u00a0Cai, L.\u00a0Jia, T.\u00a0Passaro, M.\u00a0Stroucken and Y.\u00a0Tian, Run-time monitoring and formal analysis of information flows in chromium, in: Proceedings of the 22nd Annual Network & Distributed System Security Symposium, Internet Society, 2015.","DOI":"10.14722\/ndss.2015.23295"},{"key":"10.3233\/JCS-0559_ref3","doi-asserted-by":"crossref","unstructured":"T.\u00a0Bauerei\u00df, A.P.\u00a0Gritti, A.\u00a0Popescu and F.\u00a0Raimondi, CoSMed: A confidentiality-verified social media platform, in: International Conference on Interactive Theorem Proving, Springer, 2016, pp.\u00a087\u2013106.","DOI":"10.1007\/978-3-319-43144-4_6"},{"key":"10.3233\/JCS-0559_ref4","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","article-title":"A lattice model of secure information flow","volume":"19","author":"Denning","year":"1976","journal-title":"Communications of the ACM"},{"key":"10.3233\/JCS-0559_ref5","doi-asserted-by":"crossref","unstructured":"J.\u00a0Goguen and J.\u00a0Meseguer, Security policies and security models, in: IEEE Symposium on Security and Privacy, IEEE Computer Society, 1982, pp.\u00a011\u201320.","DOI":"10.1109\/SP.1982.10014"},{"issue":"6","key":"10.3233\/JCS-0559_ref6","doi-asserted-by":"publisher","first-page":"793","DOI":"10.3233\/JCS-160558","article-title":"A verified information-flow architecture","volume":"24","author":"Guanciale","year":"2016","journal-title":"Journal of Computer Security"},{"issue":"2","key":"10.3233\/JCS-0559_ref7","doi-asserted-by":"publisher","first-page":"181","DOI":"10.3233\/JCS-160544","article-title":"Information-flow security for JavaScript and its APIs","volume":"24","author":"Hedin","year":"2016","journal-title":"Journal of Computer Security"},{"key":"10.3233\/JCS-0559_ref8","unstructured":"D.\u00a0Jang, Z.\u00a0Tatlock and S.\u00a0Lerner, Establishing browser security guarantees through formal shim verification, in: Proceedings of the 21st USENIX Security Symposium, USENIX Association, 2012, p.\u00a08."},{"key":"10.3233\/JCS-0559_ref9","doi-asserted-by":"crossref","unstructured":"L.\u00a0Jia, J.\u00a0Aljuraidan, E.\u00a0Fragkaki, L.\u00a0Bauer, M.\u00a0Stroucken, K.\u00a0Fukushima, S.\u00a0Kiyomoto and Y.\u00a0Miyake, Run-time enforcement of information-flow properties on Android (extended abstract), in: Computer Security\u00a0\u2013 ESORICS 2013: 18th European Symposium on Research in Computer Security, Springer, 2013.","DOI":"10.1007\/978-3-642-40203-6_43"},{"key":"10.3233\/JCS-0559_ref10","doi-asserted-by":"crossref","unstructured":"S.\u00a0Kanav, P.\u00a0Lammich and A.\u00a0Popescu, A conference management system with verified document confidentiality, in: International Conference on Computer Aided Verification, Springer, 2014, pp.\u00a0167\u2013183.","DOI":"10.1007\/978-3-319-08867-9_11"},{"key":"10.3233\/JCS-0559_ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.35"}],"container-title":["Journal of Computer Security"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JCS-0559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T15:03:35Z","timestamp":1741619015000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JCS-0559"}},"subtitle":[],"editor":[{"given":"Toby","family":"Murray","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[]},{"given":"Lujo","family":"Bauer","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2017,7,10]]},"references-count":11,"journal-issue":{"issue":"4-5"},"URL":"https:\/\/doi.org\/10.3233\/jcs-0559","relation":{},"ISSN":["1875-8924","0926-227X"],"issn-type":[{"type":"electronic","value":"1875-8924"},{"type":"print","value":"0926-227X"}],"subject":[],"published":{"date-parts":[[2017,7,10]]}}}