{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T11:01:46Z","timestamp":1777806106182,"version":"3.51.4"},"reference-count":61,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T00:00:00Z","timestamp":1583366400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2020,3,17]]},"abstract":"<jats:p>Restrictions that a reactive information flow (RIF) label imposes on a value are determined by the sequence of operations used to derive that value. This allows declassification, endorsement, and other forms of reclassification to be supported in a uniform way. Piecewise noninterference (PWNI) is introduced as a fitting security policy, because noninterference is not suitable. A type system is given for static enforcement of PWNI in programs that associate checkable classes of RIF labels with variables. Two checkable classes of RIF labels are described: RIF automata are general-purpose and based on finite-state automata; \u03ba-labels concern confidentiality in programs that use cryptographic operations.<\/jats:p>","DOI":"10.3233\/jcs-191316","type":"journal-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T10:48:44Z","timestamp":1583491724000},"page":"191-228","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":5,"title":["RIF: Reactive information flow labels"],"prefix":"10.1177","volume":"28","author":[{"given":"Elisavet","family":"Kozyri","sequence":"first","affiliation":[{"name":"School of Engineering and Applied Sciences, Harvard University, MA, USA. E-mail:\u00a0"}]},{"given":"Fred\u00a0B.","family":"Schneider","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Cornell University, NY, USA. E-mail:\u00a0"}]}],"member":"179","published-online":{"date-parts":[[2020,3,5]]},"reference":[{"key":"ref001","unstructured":"M.\u00a0Abadi and C.\u00a0Fournet, Access control based on execution history, in: Proceedings of the 10th Annual Network and Distributed System Security Symposium, 2003, pp.\u00a0107\u2013121."},{"key":"ref002","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.04.028"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.22"},{"key":"ref004","doi-asserted-by":"publisher","DOI":"10.1145\/1255329.1255339"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103677"},{"key":"ref006","doi-asserted-by":"publisher","DOI":"10.1145\/2465106.2465121"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.20"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.21236\/ADA023588"},{"key":"ref009","unstructured":"E.\u00a0Birrell and F.B.\u00a0Schneider, A reactive approach to use-based privacy, Technical Report 54843, Cornell University, Computing and Information Science, November 2017."},{"key":"ref010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03542-0_16"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1007\/11693024_13"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706349"},{"key":"ref013","doi-asserted-by":"publisher","DOI":"10.1007\/11693024_13"},{"key":"ref014","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.16"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.22"},{"key":"ref016","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.12"},{"key":"ref017","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-010-9187-9"},{"key":"ref018","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25560-1_24"},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"ref020","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"ref021","unstructured":"D.E.R.\u00a0Denning, Secure information flow in computer systems., PhD thesis, Purdue University, West Lafayette, IN, USA, 1975."},{"key":"ref022","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref023","unstructured":"E.\u00a0Elnikety, D.\u00a0Garg and P.\u00a0Druschel, SHAI: Enforcing data-specific policies with near-zero runtime overhead, Technical report, Max Planck Institute for Software Systems, Saarland Informatics Campus, Germany, January 2018."},{"key":"ref024","unstructured":"E.\u00a0Elnikety, A.\u00a0Mehta, A.\u00a0Vahldiek-Oberwagner, D.\u00a0Garg and P.\u00a0Druschel, Thoth: Comprehensive policy compliance in data retrieval systems, in:\n                      Proceedings of the 25th USENIX Conference on Security Symposium,\n                      SEC\u201916, USENIX Association, 2016, pp.\u00a0637\u2013654."},{"key":"ref025","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328478"},{"key":"ref026","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1984.10019"},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"ref028","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0086-1"},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1145\/800191.805538"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.1145\/1134744.1134757"},{"key":"ref031","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1988.8101"},{"key":"ref032","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737957"},{"key":"ref033","unstructured":"E.\u00a0Kozyri, Enhancing expressiveness of information flow labels: Reclassification and permissiveness, PhD thesis, Cornell University, Ithaca, New York, USA, 2018, https:\/\/search.proquest.com\/docview\/2167492985?accountid=10267."},{"key":"ref034","unstructured":"E.\u00a0Kozyri, O.\u00a0Arden, A.C.\u00a0Myers and F.B.\u00a0Schneider, JRIF: Reactive information flow control for Java, Technical report, Cornell Univarsity, February 2016."},{"key":"ref035","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"ref036","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45309-1_6"},{"key":"ref037","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328479"},{"key":"ref038","doi-asserted-by":"publisher","DOI":"10.1007\/11537311_32"},{"key":"ref039","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040319"},{"key":"ref040","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2005.23"},{"key":"ref041","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_5"},{"key":"ref042","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2005.21"},{"key":"ref043","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_26"},{"key":"ref044","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"ref045","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"ref046","unstructured":"A.C.\u00a0Myers, L.\u00a0Zheng, S.\u00a0Zdancewic, S.\u00a0Chong and N.\u00a0Nystrom, Jif 3.0: Java information flow, Software release, http:\/\/www.cs.cornell.edu\/jif, July 2006."},{"key":"ref047","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.14"},{"key":"ref048","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2267798"},{"key":"ref049","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542484"},{"key":"ref050","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"ref051","doi-asserted-by":"crossref","unstructured":"A.\u00a0Sabelfeld and A.C.\u00a0Myers, A\u00a0model for delimited information release, in: Proceedings of the International Symposium on Software Security (ISSS\u201903), LNCS, Vol.\u00a03233, Springer-Verlag, 2004, pp.\u00a0174\u2013191.","DOI":"10.1007\/978-3-540-37621-7_9"},{"key":"ref052","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49099-X_4"},{"key":"ref053","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0352"},{"key":"ref054","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952990"},{"key":"ref055","doi-asserted-by":"publisher","DOI":"10.1145\/1180337.1180341"},{"key":"ref056","doi-asserted-by":"publisher","DOI":"10.1145\/2034675.2034688"},{"key":"ref057","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312929"},{"key":"ref058","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2000.856941"},{"key":"ref059","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1996-42-304"},{"key":"ref060","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325729"},{"key":"ref061","doi-asserted-by":"publisher","DOI":"10.1090\/dimacs\/038\/07"}],"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-191316","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JCS-191316","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-191316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:45:22Z","timestamp":1777495522000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-191316"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,5]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,3,17]]}},"alternative-id":["10.3233\/JCS-191316"],"URL":"https:\/\/doi.org\/10.3233\/jcs-191316","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"value":"0926-227X","type":"print"},{"value":"1875-8924","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,5]]}}}