{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T06:04:46Z","timestamp":1648965886504},"reference-count":25,"publisher":"International Academy Publishing (IAP)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.6.11.2310-2320","type":"journal-article","created":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T11:31:14Z","timestamp":1318851074000},"source":"Crossref","is-referenced-by-count":1,"title":["SAT-based Algorithmic Verification of Noninterference"],"prefix":"10.17706","volume":"6","author":[{"given":"Conghua","family":"Zhou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Meiling","family":"Cao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Meng","family":"Ye","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhihao","family":"Qian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"7163","published-online":{"date-parts":[[2011,11,1]]},"reference":[{"key":"ref1","first-page":"113","article-title":"20 years of covert channel modeling and analysis","volume-title":"IEEE Symposium on Security and Privacy","author":"Millen","year":"1999"},{"issue":"no. 12","key":"ref2","first-page":"1837","article-title":"Covert channel analysis in secure operating systems with high security levels","volume":"15","author":"Qing","year":"2004","journal-title":"J. Softw.","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref3","first-page":"11","article-title":"Security policies and security models","volume-title":"IEEE Symposium on Security and Privacy","year":"1982"},{"key":"ref4","first-page":"79","article-title":"A general theory of composition for trace sets closed under selective interleaving functions","volume-title":"IEEE Symposium on Security and Privacy","year":"1994"},{"key":"ref5","first-page":"79","article-title":"A general theory of security properties","volume-title":"IEEE Symposium on Security and Privacy","author":"Zakinthinos","year":"1997"},{"key":"ref6","first-page":"161","article-title":"Specifications for multilevel security and a hookup property","volume-title":"IEEE Symposium on Security and Privacy","author":"McCullough","year":"1987"},{"key":"ref7","article-title":"A model of information","volume-title":"National Computer Security Conference","author":"Sutherland","year":"1986"},{"issue":"no. 1","key":"ref8","first-page":"37","article-title":"Approximate noninterference, journal of computer security","volume":"12","author":"Alessandra Di Pierro","year":"2004","journal-title":"Journal of Computer Security"},{"key":"ref9","first-page":"530","article-title":"Madigan and S. Malik, \u201cChaff: Engineering an efficient sat solver","volume-title":"Design Automation Conference","author":"Moskewicz","year":"2002"},{"key":"ref10","first-page":"272","article-title":"Sato: An efficient propositional prover","volume-title":"International Conference on Automated Deduction","author":"Zhang","year":"1997"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/12.769433"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36577-X_4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/10722167_11"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44585-4_44"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44585-4_43"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.12.021"},{"key":"ref17","volume-title":"Computer Security: Art and Science.","author":"Bishop","year":"2002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(93)90018-C"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/368273.368557"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/B:FORM.0000004785.67232.f8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.06.062"},{"key":"ref22","first-page":"379","article-title":"On solving stackbased incremental satisfiability problems","volume-title":"International Conference on Computer Design","author":"Kim","year":"2000"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/32.489078"},{"key":"ref24","first-page":"75","article-title":"Unwinding and inference control","volume-title":"Symposium on Security and Privacy","author":"Goguen","year":"1984"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.11.002"}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:07:25Z","timestamp":1442329645000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/4688"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,1]]},"references-count":25,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2011,11,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.6.11.2310-2320","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2011,11,1]]}}}