{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:45Z","timestamp":1763468025660,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/csf.2011.15","type":"proceedings-article","created":{"date-parts":[[2011,8,25]],"date-time":"2011-08-25T16:04:03Z","timestamp":1314288243000},"page":"114-128","source":"Crossref","is-referenced-by-count":32,"title":["Dynamic Enforcement of Knowledge-Based Security Policies"],"prefix":"10.1109","author":[{"given":"Piotr","family":"Mardziel","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Magill","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Hicks","sequence":"additional","affiliation":[]},{"given":"Mudhakar","family":"Srivatsa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Analyse de programmes probabilistes par interpr&#x00E9;tation abstraite","author":"monniaux","year":"2001","journal-title":"Th&#x00E8;se de doctorat Universit&#x00E9; Paris IX Dauphine"},{"key":"ref10","article-title":"The design and implementation of IBAL: A general-purpose probabilistic language","author":"pfeffer","year":"2007","journal-title":"Statistical Relational Learning"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1297081.1297085"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1452044.1452048"},{"key":"ref13","article-title":"Church: a language for generative models","author":"goodman","year":"2008","journal-title":"UAI"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03034-5_17"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/512760.512770"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/978-3-540-45099-3_17","article-title":"Abstract interpretation of probabilistic semantics","volume":"200","author":"monniaux","year":"0","journal-title":"Static Analysis Symposium (SAS)"},{"journal-title":"PPL The Parma polyhedral library","year":"2011","key":"ref17"},{"journal-title":"LATTES","year":"2008","author":"loera","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375606"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exi009"},{"key":"ref4","article-title":"Myspace user data for sale","author":"worthington","year":"2010","journal-title":"PC World on-line"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.15"},{"journal-title":"Statements of Rights and Responsibilities","year":"2010","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592585"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.10.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1810931.1810939"},{"journal-title":"Facebook demographics and statistics report 2010","year":"2010","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179615"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879152"},{"key":"ref9","article-title":"Quantifying information flow with beliefs","volume":"17","author":"clarkson","year":"2009","journal-title":"J Comput Secur"},{"journal-title":"Facebook developers","year":"2011","key":"ref1"},{"key":"ref20","article-title":"On the foundations of quantitative information flow","author":"smith","year":"2009","journal-title":"FOSSACS"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.18"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1559795.1559812"},{"key":"ref26","article-title":"Inferring disjunctive postconditions","author":"popeea","year":"2006","journal-title":"In ASIAN CS Conference"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-005-0215-8"}],"event":{"name":"2011 IEEE 24th Computer Security Foundations Symposium (CSF)","start":{"date-parts":[[2011,6,27]]},"location":"Cernay-la-Ville, France","end":{"date-parts":[[2011,6,29]]}},"container-title":["2011 IEEE 24th Computer Security Foundations Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5991608\/5992135\/05992158.pdf?arnumber=5992158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T11:59:30Z","timestamp":1560513570000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5992158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/csf.2011.15","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}