{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T05:08:05Z","timestamp":1648876085864},"reference-count":21,"publisher":"International Academy Publishing (IAP)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.7.11.2478-2487","type":"journal-article","created":{"date-parts":[[2012,11,27]],"date-time":"2012-11-27T19:36:55Z","timestamp":1354045015000},"source":"Crossref","is-referenced-by-count":0,"title":["Flow-Sensitive Automaton-Based Monitoring of a Declassification Policy"],"prefix":"10.17706","volume":"7","author":[{"given":"Hao","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Yi","family":"Zhuang","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2012,11,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"ref2","first-page":"11","article-title":"Security policies and security models","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"Goguen","year":"1982","unstructured":"[2] J. A. Goguen and J. Meseguer, \"Security policies and security models,\" In Proceedings of IEEE Symposium on Security and Privacy, pp. 11-20, 1982."},{"issue":"no. 5","key":"ref3","doi-asserted-by":"crossref","first-page":"517","DOI":"10.3233\/JCS-2009-0352","article-title":"Declassification: dimensions and principles","volume":"17","author":"Sabelfeld","year":"2009","unstructured":"[3] A. Sabelfeld and D. Sands, \"Declassification: dimensions and principles,\" Journal of Computer Security, vol. 17, no. 5, pp. 517-548, 2009.","journal-title":"Journal of Computer Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-37621-7_9"},{"key":"ref5","first-page":"186","article-title":"Dynamic vs. Static Flow-Sensitive Security Analysis","volume-title":"Proceedings of the IEEE Computer Security Foundations Symposium","author":"Russo","year":"2010","unstructured":"[6] A. Russo and A. Sabelfeld, \"Dynamic vs. Static Flow-Sensitive Security Analysis,\" In Proceedings of the IEEE Computer Security Foundations Symposium, pp. 186-199, 2010."},{"key":"ref6","first-page":"75","volume-title":"\"Automata-based confidentiality monitoring \" Advances in Computer Science-ASIAN 2006","volume":"4435","author":"Le Guernic","year":"2007","unstructured":"[8] G. Le Guernic, A. Banerjee and D. A. Schmidt, \"Automata-based confidentiality monitoring,\" Advances in Computer Science-ASIAN 2006. Secure Software and Related Issues, Lecture Notes in Computer Science, vol. 4435, pp. 75-89, 2007."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15257-3_16"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"ref9","first-page":"64","volume-title":"A semantic framework for declassification and endorsement","volume":"6012","author":"Askarov","year":"2010","unstructured":"[11] A. Askarov and A. C. Myers, \"A semantic framework for declassification and endorsement,\" Programming Languages and Systems, Lecture Notes in Computer Science, vol. 6012, pp. 64-84, 2010."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1513443.1513449"},{"issue":"no. 2","key":"ref11","first-page":"20","article-title":"Reliability of software: the challenges of the Internet","volume":"6","author":"Mei","year":"2010","unstructured":"[13] Hong Mei and Dong-gang Cao, \"Reliability of software: the challenges of the Internet,\" Communication of the CCF, vol. 6, no. 2. pp. 20-24, 2010.","journal-title":"Communication of the CCF"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/SP.2008.20","article-title":"Expressive declassification policies and modular static enforcement","volume-title":"2008 IEEE Symposium on Security and Privacy","author":"Banerjee","year":"2008","unstructured":"[15] A. Banerjee, D. A. Naumann and S. Rosenberg, \"Expressive declassification policies and modular static enforcement,\" In 2008 IEEE Symposium on Security and Privacy, pp. 339-353, 2008."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1999.779776"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30477-7_9"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"549","DOI":"10.3233\/JCS-2009-0355","article-title":"On declassification and the non-disclosure policy","volume":"17","author":"Almeida Matos","year":"2009","unstructured":"[19] A. Almeida Matos and G. Boudol, \"On declassification and the non-disclosure policy,\" Journal of Computer Security, vol. 17, pp. 549-597, 2009.","journal-title":"Journal of Computer Security"},{"key":"ref16","first-page":"207","article-title":"Gradual release: unifying declassification, encryption and key release policies","volume-title":"IEEE Symposium on Security and Privacy","author":"Askarov","year":"2007","unstructured":"[20] A. Askarov, A. Sabelfeld, \"Gradual release: unifying declassification, encryption and key release policies,\" In IEEE Symposium on Security and Privacy, pp. 207-221, 2007."},{"key":"ref17","first-page":"847","volume-title":"Safety versus secrecy","volume":"1694","author":"Volpano","year":"1999","unstructured":"[21] D. Volpano, \"Safety versus secrecy\" Static Analysis, Lecture Notes in Computer Science, Vol. 1694\/1999, pp. 847-848, 1999."},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[5] A. Askarov and A. Sabelfeld, \"Localized delimited release: combining the what and where dimensions of information release,\" In Proceedings of Programming Languages and Analysis for Security, pp. 53-60, 2007.","DOI":"10.1145\/1255329.1255339"},{"key":"ref17","unstructured":"[7] A. Sabelfeld and A. Russo, \"From dynamic to static and back: Riding the roller coaster of information-flow control research,\" Perspectives of Systems Informatics, Lecture Notes in Computer Science, vol. 5947, pp. 352-365, 2010."},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[14] A. Chudnov and D. A. Naumann, \"Information flow monitor inlining,\" In 2010 23rd IEEE Computer Security Foundations Symposium, pp. 200-214, 2010.","DOI":"10.1109\/CSF.2010.21"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[16] G. Barthe, S. Cavadini, and T. Rezk, \"Tractable enforcement of declassification policies,\" In 2008 IEEE 21st Computer Security Foundations Symposium, pp. 83-97, 2008.","DOI":"10.1109\/CSF.2008.11"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T04:45:22Z","timestamp":1562388322000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/7086"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,1]]},"references-count":21,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2012,11,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.7.11.2478-2487","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,11,1]]}}}