{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:05:19Z","timestamp":1725559519813},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540266556"},{"type":"electronic","value":"9783540316831"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11506676_6","type":"book-chapter","created":{"date-parts":[[2010,7,18]],"date-time":"2010-07-18T16:07:52Z","timestamp":1279469272000},"page":"85-100","source":"Crossref","is-referenced-by-count":0,"title":["Unwinding Conditions for Security in Imperative Languages"],"prefix":"10.1007","author":[{"given":"Annalisa","family":"Bossi","sequence":"first","affiliation":[]},{"given":"Carla","family":"Piazza","sequence":"additional","affiliation":[]},{"given":"Sabina","family":"Rossi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","first-page":"40","volume-title":"Proc. of ACM Symposium on Principles of Programming Languages (POPL2000)","author":"J. Agat","year":"2000","unstructured":"Agat, J.: Transforming out Timing Leaks. In: Proc. of ACM Symposium on Principles of Programming Languages (POPL2000), pp. 40\u201353. ACM Press, New York (2000)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-27864-1_10","volume-title":"Static Analysis","author":"T. Amtoft","year":"2004","unstructured":"Amtoft, T., Banerjee, A.: Information Flow Analysis in Logical Form. In: Giacobazzi, R. (ed.) SAS 2004. LNCS, vol.\u00a03148, pp. 100\u2013115. Springer, Heidelberg (2004)"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/CSFW.2004.1310735","volume-title":"Proc. of the 17th IEEE Computer Security Foundations Workshop (CSFW2004)","author":"G. Barthe","year":"2004","unstructured":"Barthe, G., D\u2019Argenio, P., Rezk, T.: Secure Information Flow by Self Composition. In: Proc. of the 17th IEEE Computer Security Foundations Workshop (CSFW2004), pp. 100\u2013114. IEEE Computer Society Press, Los Alamitos (2004)"},{"issue":"3-4","key":"6_CR4","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.cl.2004.02.005","volume":"30","author":"A. Bossi","year":"2004","unstructured":"Bossi, A., Focardi, R., Piazza, C., Rossi, S.: Verifying Persistent Security Properties. Computer Languages, Systems and Structures\u00a030(3-4), 231\u2013258 (2004)","journal-title":"Computer Languages, Systems and Structures"},{"key":"6_CR5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/CSFW.2002.1021803","volume-title":"Proc. of the IEEE Computer Security Foundations Workshop (CSFW2002)","author":"A. Di Pierro","year":"2002","unstructured":"Di Pierro, A., Hankin, C., Wiklicky, H.: Approximate Non-Interference. In: Proc. of the IEEE Computer Security Foundations Workshop (CSFW2002), pp. 3\u201317. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-45608-2_6","volume-title":"Foundations of Security Analysis and Design","author":"R. Focardi","year":"2001","unstructured":"Focardi, R., Gorrieri, R.: Classification of Security Properties. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 331\u2013396. Springer, Heidelberg (2001)"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1145\/964001.964017","volume-title":"Proc. of ACM Symposium on Principles of Programming Languages (POPL2004)","author":"R. Giacobazzi","year":"2004","unstructured":"Giacobazzi, R., Mastroeni, I.: Abstract Non-Interference: Parameterizing Non-Interference by Abstract Interpretation. In: Proc. of ACM Symposium on Principles of Programming Languages (POPL2004), pp. 186\u2013197. ACM Press, New York (2004)"},{"key":"6_CR8","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/SP.1982.10014","volume-title":"Proc. of the IEEE Symposium on Security and Privacy (SSP1982)","author":"J.A. Goguen","year":"1982","unstructured":"Goguen, J.A., Meseguer, J.: Security Policies and Security Models. In: Proc. of the IEEE Symposium on Security and Privacy (SSP1982), pp. 11\u201320. IEEE Computer Society Press, Los Alamitos (1982)"},{"key":"6_CR9","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/SP.1984.10019","volume-title":"Proc. of the IEEE Symposium on Security and Privacy (SSP1984)","author":"J.A. Goguen","year":"1984","unstructured":"Goguen, J.A., Meseguer, J.: Unwinding and Inference Control. In: Proc. of the IEEE Symposium on Security and Privacy (SSP1984), pp. 75\u201386. IEEE Computer Society Press, Los Alamitos (1984)"},{"issue":"1\u20133","key":"6_CR10","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/S0167-6423(99)00024-6","volume":"37","author":"R. Joshi","year":"2000","unstructured":"Joshi, R., Leino, K.R.M.: A Semantic Approach to Secure Information Flow. Science of Computer Programming\u00a037(1\u20133), 113\u2013138 (2000)","journal-title":"Science of Computer Programming"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/10722599_15","volume-title":"Computer Security - ESORICS 2000","author":"H. Mantel","year":"2000","unstructured":"Mantel, H.: Unwinding Possibilistic Security Properties. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 238\u2013254. Springer, Heidelberg (2000)"},{"key":"6_CR12","volume-title":"Communication and Concurrency","author":"R. Milner","year":"1989","unstructured":"Milner, R.: Communication and Concurrency. Prentice-Hall, Englewood Cliffs (1989)"},{"key":"6_CR13","unstructured":"Ryan, P.Y.A.: A CSP Formulation of Non-Interference and Unwinding. Cipher, 19\u201327 (1991)"},{"issue":"1\/2","key":"6_CR14","doi-asserted-by":"crossref","first-page":"75","DOI":"10.3233\/JCS-2001-91-204","volume":"9","author":"P.Y.A. Ryan","year":"2001","unstructured":"Ryan, P.Y.A., Schneider, S.: Process Algebra and Non-Interference. Journal of Computer Security\u00a09(1\/2), 75\u2013103 (2001)","journal-title":"Journal of Computer Security"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-45789-5_27","volume-title":"Static Analysis","author":"A. Sabelfeld","year":"2002","unstructured":"Sabelfeld, A., Mantel, H.: Static Confidentiality Enforcement for Distributed Programs. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 376\u2013394. Springer, Heidelberg (2002)"},{"issue":"1","key":"6_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Communication\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communication"},{"issue":"1","key":"6_CR17","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1023\/A:1011553200337","volume":"14","author":"A. Sabelfeld","year":"2001","unstructured":"Sabelfeld, A., Sands, D.: A Per Model of Secure Information Flow in Sequential Programs. Higher-Order and Symbolic Computation\u00a014(1), 59\u201391 (2001)","journal-title":"Higher-Order and Symbolic Computation"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1145\/268946.268975","volume-title":"Proc. of ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL1998)","author":"G. Smith","year":"1998","unstructured":"Smith, G., Volpano, D.M.: Secure Information Flow in a Multi-threaded Imperative Language. In: Proc. of ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL1998), pp. 355\u2013364. ACM Press, New York (1998)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Volpano, D.M., Smith, G.: A Type-Based Approach to Program Security. In: TAPSOFT, pp. 607\u2013621 (1997)","DOI":"10.21236\/ADA486429"},{"key":"6_CR20","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3054.001.0001","volume-title":"The formal semantics of programming languages","author":"G. Winskel","year":"1993","unstructured":"Winskel, G.: The formal semantics of programming languages. MIT Press, Cambridge (1993)"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/CSFW.2001.930133","volume-title":"Proc. of the IEEE Computer Security Foundations Workshop (CSFW2001)","author":"S. Zdancewic","year":"2001","unstructured":"Zdancewic, S., Myers, A.C.: Robust Declassification. In: Proc. of the IEEE Computer Security Foundations Workshop (CSFW2001), pp. 15\u201323. IEEE Computer Society Press, Los Alamitos (2001)"}],"container-title":["Lecture Notes in Computer Science","Logic Based Program Synthesis and Transformation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11506676_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:44:10Z","timestamp":1619505850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11506676_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540266556","9783540316831"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11506676_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}