{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T16:52:04Z","timestamp":1648918324235},"reference-count":18,"publisher":"Open Publishing Association","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron. Proc. Theor. Comput. Sci.","EPTCS"],"DOI":"10.4204\/eptcs.129.17","type":"journal-article","created":{"date-parts":[[2013,9,8]],"date-time":"2013-09-08T05:10:39Z","timestamp":1378617039000},"page":"284-308","source":"Crossref","is-referenced-by-count":0,"title":["A Simple Semantics and Static Analysis for Stack Inspection"],"prefix":"10.4204","volume":"129","author":[{"given":"Anindya","family":"Banerjee","sequence":"first","affiliation":[]},{"given":"David A.","family":"Naumann","sequence":"additional","affiliation":[]}],"member":"2720","published-online":{"date-parts":[[2013,9,19]]},"reference":[{"issue":"4","key":"AbadiBLP93","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","article-title":"A Calculus for Access Control in Distributed Systems","volume":"15","author":"Abadi","year":"1993","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"Ager05afunctional","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.tcs.2005.06.008","article-title":"A Functional Correspondence between Monadic Evaluators and Abstract Machines for Languages with Computational Effects","volume":"342","author":"Ager","year":"2005","journal-title":"Theoretical Computer Science"},{"key":"BanerjeeNaumann02a","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1145\/503272.503289","article-title":"Representation Independence, Confinement and Access Control","volume-title":"ACM Symposium on Principles of Programming Languages","author":"Banerjee","year":"2002"},{"issue":"2","key":"BanerjeeNaumann03b","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1017\/S0956796804005453","article-title":"Stack-based Access Control for Secure Information Flow","volume":"15","author":"Banerjee","year":"2005","journal-title":"Journal of Functional Programming"},{"key":"BessonBFG04","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/CSFW.2004.11","article-title":"From Stack Inspection to Access Control: A Security Analysis for Libraries","volume-title":"Computer Security Foundations Workshop (CSFW)","author":"Besson","year":"2004"},{"issue":"3","key":"BessonJM01","doi-asserted-by":"crossref","first-page":"217","DOI":"10.3233\/JCS-2001-9303","article-title":"Model Checking Security Properties of Control Flow Graphs","volume":"9","author":"Besson","year":"2001","journal-title":"Journal of Computer Security"},{"issue":"2","key":"BessonLJ05","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1017\/S0956796804005465","article-title":"Interfaces for Stack Inspection","volume":"15","author":"Besson","year":"2005","journal-title":"Journal of Functional Programming"},{"key":"CentonzeFP07","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1109\/ACSAC.2007.14","article-title":"Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies","volume-title":"Computer Security Applications Conference (ACSAC)","author":"Centonze","year":"2007"},{"issue":"6","key":"ClementsF04","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1145\/1034774.1034778","article-title":"A Tail-recursive Machine with Stack Inspection","volume":"26","author":"Clements","year":"2004","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"3","key":"FournetG03","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1145\/641909.641912","article-title":"Stack inspection: Theory and Variants","volume":"25","author":"Fournet","year":"2003","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"Gong99","volume-title":"Inside Java 2 Platform Security","author":"Gong","year":"1999"},{"key":"LaMacchiaEtal02","volume-title":".NET Framework Security","author":"LaMacchia","year":"2002"},{"key":"PistoiaBanerjeeNaumann","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/SP.2007.10","article-title":"Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model","volume-title":"28th IEEE Symposium on Security and Privacy","author":"Pistoia","year":"2007"},{"issue":"2","key":"PottierSS05","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1145\/1057387.1057392","article-title":"A Systematic Approach to Static Access Control","volume":"27","author":"Pottier","year":"2005","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"skalka:phd","volume-title":"Types for Programming Language-Based Security","author":"Skalka","year":"2002"},{"key":"SkalkaS:ICFP00","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/351240.351244","article-title":"Static Enforcement of Security with Types","volume-title":"International Conference on Functional Programming","author":"Skalka","year":"2000"},{"issue":"2","key":"skalkaSVh08","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1017\/S0956796807006466","article-title":"Types and Trace Effects of Higher Order Programs","volume":"18","author":"Skalka","year":"2008","journal-title":"Journal of Functional Programming"},{"issue":"4","key":"WallachAF00","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1145\/363516.363520","article-title":"SAFKASI: A Security Mechanism for Language-based Systems","volume":"9","author":"Wallach","year":"2000","journal-title":"ACM Transactions on Software Engineering and Methodology"}],"container-title":["Electronic Proceedings in Theoretical Computer Science"],"original-title":[],"language":"en","deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T17:33:16Z","timestamp":1498066396000},"score":1,"resource":{"primary":{"URL":"http:\/\/arxiv.org\/abs\/1309.5144v1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,19]]},"references-count":18,"URL":"https:\/\/doi.org\/10.4204\/eptcs.129.17","relation":{},"ISSN":["2075-2180"],"issn-type":[{"value":"2075-2180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,19]]}}}