{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T14:07:55Z","timestamp":1751983675980,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540586180"},{"type":"electronic","value":"9783540490340"}],"license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-58618-0_56","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T11:38:34Z","timestamp":1330256314000},"page":"55-73","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Compile-time detection of information flow in sequential programs"],"prefix":"10.1007","author":[{"given":"Jean-Pierre","family":"Ban\u00e2tre","sequence":"first","affiliation":[]},{"given":"Ciar\u00e1n","family":"Bryce","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Le M\u00e9tayer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"key":"4_CR1","unstructured":"Abramsky (S.) and Hankin (C. L.), \u201cAbstract interpretation of declarative languages\u201d, Ellis Horwood, 1987."},{"key":"4_CR2","volume-title":"Compilers: Principles, Techniques and Tools","author":"(A. V. ) ). Aho","year":"1986","unstructured":"Aho (A. V.), Sethi (R.) and Ullman (J. D.), \u201cCompilers: Principles, Techniques and Tools\u201d, Addison Wesley, Reading, Mass, 1986."},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/357084.357088","volume":"2","author":"(G. R. ) ). Andrews","year":"1980","unstructured":"Andrews (G.R.), Reitman (R.P.), \u201cAn Axiomatic Approach to Information Flow in Programs\u201d, in ACM Transactions on Programming Languages and Systems, volume 2 (1), January 1980, pages 504\u2013513.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"4_CR4","unstructured":"Ban\u00e2tre (J.-P.) and C. Bryce, (C.), \u201cA security proof system for networks of communicating processes\u201d, Irisa research report, no 744, June 1993."},{"key":"4_CR5","unstructured":"Ban\u00e2tre (J.-P.) and C. Bryce, (C.), and Le M\u00e9tayer (D.), \u201cMechanical proof of security properties\u201d, Irisa research report, no 825, May 1994."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Cohen (E.), \u201cInformation Transmission in Computational Systems\u201d, in Proceedings ACM Symposium on Operating System Principles, 1977, pages 133\u2013139.","DOI":"10.1145\/1067625.806556"},{"issue":"No4","key":"4_CR7","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1145\/115372.115320","volume":"13","author":"(R. ). Cytron","year":"1991","unstructured":"Cytron (R.), Ferrante (J.), Rosen (B. K.) and Wegman (M. N.), \u201cEfficiently computing Static Single Assignment form and the control dependence graph\u201d, in A CM Transactions on Programming Languages and Systems, Vol. 13, No 4, October 1991, pages 451\u2013490.","journal-title":"A CM Transactions on Programming Languages and Systems"},{"key":"4_CR8","unstructured":"Denning (D.E.), Secure Information Flow in Computer Systems, Phd Thesis, Purdue University, May 1975."},{"issue":"7","key":"4_CR9","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"(D. E. ) ). Denning","year":"1977","unstructured":"Denning (D.E.), Denning (P.J.), \u201cCertification of Programs for Secure Information Flow\u201d, in Communications of the ACM, volume 20 (7), July 1977, pages 504\u2013513.","journal-title":"Communications of the ACM"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Hankin (C. L.) and Le M\u00e9tayer (D.), \u201cDeriving Algorithms from Type Inference Systems: Application to Strictness Analysis\u201d, in Proceedings ACM POPL, 1994, pages 202\u2013212.","DOI":"10.1145\/174675.177858"},{"key":"4_CR11","volume-title":"Communicating Sequential Processes","author":"(C. A. R. R. ) ). Hoare","year":"1985","unstructured":"Hoare (C.A.R.), Communicating Sequential Processes, Prentice-Hall London, 1985."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Jones (A.), Lipton (R.), \u201cThe Enforcement of Security Policies for Computations\u201d, in Proceedings of the 5th Symposium on Operating System Principles, November 1975, pages 197\u2013206.","DOI":"10.1145\/800213.806538"},{"key":"4_CR13","volume-title":"Program Flow Analysis","author":"K. W. Kennedy","year":"1981","unstructured":"Kennedy K. W., \u201cA Survey of Data Flow Analysis Techniques\u201d, in Program Flow Analysis, S. S. Muchnik and N. D. Jones, Eds, Prentice-Hall, Englewood Cliffs, NJ, 1981."},{"issue":"10","key":"4_CR14","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"(B. ). Lampson","year":"1973","unstructured":"Lampson (B.), \u201cA note on the Confinement Problem\u201d, in Communications of the ACM, volume 16 (10), October 1973, pages 613\u2013615.","journal-title":"Communications of the ACM"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Landi (W.) and Ryder (B. G.), \u201cPointer-induced aliasing: a problem classification\u201d, in Proceedings ACM POPL, 1991, pages 93\u2013103.","DOI":"10.1145\/99583.99599"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Landi (W.) and Ryder (B. G.), \u201cA safe approximate algorithm for interprocedural pointer aliasing\u201d, in Proceedings ACM Programming Language Design and Implementation, 1992, pages 235\u2013248.","DOI":"10.1145\/143103.143137"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1145\/828.829","volume":"31","author":"(J. ). McLean","year":"1984","unstructured":"McLean (J.), \u201cA Formal Method for the Abstract Specification of Software\u201d, in Journal of the ACM, 31, July 1984, pages 600\u2013627.","journal-title":"Journal of the ACM"},{"issue":"1","key":"4_CR18","doi-asserted-by":"crossref","first-page":"37","DOI":"10.3233\/JCS-1992-1103","volume":"1","author":"(J. ). McLean","year":"1992","unstructured":"McLean (J.), \u201cProving Non-interference and Functional Correctness Using Traces\u201d, in Journal of Computer Security, 1(1), Spring 1992, pages 37\u201357.","journal-title":"Journal of Computer Security"},{"issue":"6A","key":"4_CR19","first-page":"722","volume":"4","author":"(M. ). Mizuno","year":"1992","unstructured":"Mizuno (M.), Schmidt (D.), \u201cA Security Control Flow Control Algorithm and Its Denotational Semantics Correctness Proof\u201d, Journal on the Formal Aspects of Computing, 4 (6A), november 1992, pages 722\u2013754.","journal-title":"Journal on the Formal Aspects of Computing"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 94"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/3-540-58618-0_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:06:10Z","timestamp":1559505970000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/10.1007\/3-540-58618-0_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540586180","9783540490340"],"references-count":19,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/3-540-58618-0_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]},"assertion":[{"value":"7 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}