{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:51:53Z","timestamp":1725864713789},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319457437"},{"type":"electronic","value":"9783319457444"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45744-4_27","type":"book-chapter","created":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T04:54:30Z","timestamp":1473828870000},"page":"538-557","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Flexible Manipulation of Labeled Values for\u00a0Information-Flow Control Libraries"],"prefix":"10.1007","author":[{"given":"Marco","family":"Vassena","sequence":"first","affiliation":[]},{"given":"Pablo","family":"Buiras","sequence":"additional","affiliation":[]},{"given":"Lucas","family":"Waye","sequence":"additional","affiliation":[]},{"given":"Alejandro","family":"Russo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,15]]},"reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-540-88313-5_22","volume-title":"Computer Security - ESORICS 2008","author":"A Askarov","year":"2008","unstructured":"Askarov, A., Hunt, S., Sabelfeld, A., Sands, D.: Termination-Insensitive noninterference leaks more than just a bit. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 333\u2013348. Springer, Heidelberg (2008)"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Bauer, L., Cai, S., Jia, L., Passaro, T., Stroucken, M., Tian, Y.: Run-time monitoring and formal analysis of information flows in Chromium. In: Annual Network & Distributed System Security Symposium. Internet Society (2015)","DOI":"10.14722\/ndss.2015.23295"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Bell, D.E., La Padula, L.: Secure computer system: unified exposition and multics interpretation. Technical report MTR-2997, Rev. 1, MITRE Corporation, Bedford, MA (1976)","DOI":"10.21236\/ADA023588"},{"key":"27_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-319-03542-0_16","volume-title":"Programming Languages and Systems","author":"N Broberg","year":"2013","unstructured":"Broberg, N., van Delft, B., Sands, D.: Paragon for practical programming with information-flow control. In: Shan, C. (ed.) APLAS 2013. LNCS, vol. 8301, pp. 217\u2013232. Springer, Heidelberg (2013)"},{"key":"27_CR5","unstructured":"Bugiel, S., Heuser, S., Sadeghi, A.R.: Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In: USENIX Conference on Security, SEC. USENIX Association (2013)"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Buiras, P., Vytiniotis, D., Russo, A.: HLIO: Mixing static and dynamic typing for information-flow control in Haskell. In: ACM SIGPLAN International Conference on Functional Programming. ACM (2015)","DOI":"10.1145\/2784731.2784758"},{"issue":"7","key":"27_CR7","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"DE Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504\u2013513 (1977)","journal-title":"Commun. ACM"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Devriese, D., Piessens, F.: Information flow enforcement in monadic libraries. In: ACM SIGPLAN Workshop on Types in Language Design and Implementation. ACM (2011)","DOI":"10.1145\/1929553.1929564"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Efstathopoulos, P., Krohn, M., VanDeBogart, S., Frey, C., Ziegler, D., Kohler, E., Mazi\u00e8res, D., Kaashoek, F., Morris, R.: Labels and event processes in the asbestos operating system. In: ACM Symposium on Operating Systems Principles, SOSP. ACM (2005)","DOI":"10.1145\/1095810.1095813"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Goguen, J., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and Privacy. IEEE Computer Society (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: JSFlow: Tracking information flow in JavaScript and its APIs. In: ACM Symposium on Applied Computing. ACM (2014)","DOI":"10.1145\/2554850.2554909"},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/3-540-46425-5_12","volume-title":"Programming Languages and Systems","author":"K Honda","year":"2000","unstructured":"Honda, K., Vasconcelos, V.T., Yoshida, N.: Secure information flow as typed process behaviour. In: Smolka, G. (ed.) ESOP 2000. LNCS, vol. 1782, pp. 180\u2013199. Springer, Heidelberg (2000)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Hritcu, C., Greenberg, M., Karel, B., Peirce, B.C., Morrisett, G.: All your IFCexception are belong to us. In: IEEE Symposium on Security and Privacy. IEEE Computer Society (2013)","DOI":"10.1109\/SP.2013.10"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1093\/comjnl\/32.2.98","volume":"32","author":"J Hughes","year":"1984","unstructured":"Hughes, J.: Why functional programming matters. Comput. J. 32, 98\u2013107 (1984)","journal-title":"Comput. J."},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-642-29709-0_16","volume-title":"Perspectives of Systems Informatics","author":"M Jaskelioff","year":"2012","unstructured":"Jaskelioff, M., Russo, A.: Secure multi-execution in Haskell. In: Clarke, E., Virbitskaite, I., Voronkov, A. (eds.) PSI 2011. LNCS, vol. 7162, pp. 170\u2013178. Springer, Heidelberg (2012)"},{"key":"27_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/978-3-642-40203-6_43","volume-title":"Computer Security \u2013 ESORICS 2013","author":"L Jia","year":"2013","unstructured":"Jia, L., Aljuraidan, J., Fragkaki, E., Bauer, L., Stroucken, M., Fukushima, K., Kiyomoto, S., Miyake, Y.: Run-time enforcement of information-flow properties on android (extended abstract). In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 775\u2013792. Springer, Heidelberg (2013)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Krohn, M., Yip, A., Brodsky, M., Cliffer, N., Kaashoek, M.F., Kohler, E., Morris, R.: Information flow control for standard OS abstractions. In: ACM SIGOPS Symposium on Operating Systems Principles, SOSP. ACM (2007)","DOI":"10.1145\/1294261.1294293"},{"key":"27_CR18","unstructured":"Li, P., Zdancewic, S.: Encoding information flow in Haskell. In: IEEE Workshop on Computer Security Foundations. IEEE Computer Society (2006)"},{"issue":"19","key":"27_CR19","doi-asserted-by":"publisher","first-page":"1974","DOI":"10.1016\/j.tcs.2010.01.025","volume":"411","author":"P Li","year":"2010","unstructured":"Li, P., Zdancewic, S.: Arrows for secure information flow. Theoret. Comput. Sci. 411(19), 1974\u20131994 (2010)","journal-title":"Theoret. Comput. Sci."},{"issue":"1","key":"27_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0956796807006326","volume":"18","author":"C Mcbride","year":"2008","unstructured":"Mcbride, C., Paterson, R.: Applicative programming with effects. J. Funct. Program. 18(1), 1\u201313 (2008)","journal-title":"J. Funct. Program."},{"key":"27_CR21","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","first-page":"1","volume-title":"Security and Privacy in Mobile Information and Communication Systems","author":"S Meurer","year":"2012","unstructured":"Meurer, S., Wism\u00fcller, R.: APEFS: an infrastructure for permission-based filtering of android apps. In: Schmidt, A.U., Russello, G., Krontiris, I., Lian, S. (eds.) MobiSec 2012. LNICST, vol. 107, pp. 1\u201311. Springer, Heidelberg (2012)"},{"issue":"1","key":"27_CR22","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/0890-5401(91)90052-4","volume":"93","author":"E Moggi","year":"1991","unstructured":"Moggi, E.: Notions of computation and monads. Inf. Comput. 93(1), 55\u201392 (1991)","journal-title":"Inf. Comput."},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Murray, T., Matichuk, D., Brassil, M., Gammie, P., Bourke, T., Seefried, S., Lewis, C., Gao, X., Klein, G.: sel4: from general purpose to a proof of information flow enforcement. In: 2012 IEEE Symposium on Security and Privacy (2013)","DOI":"10.1109\/SP.2013.35"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: practical mostly-static information flow control. In: ACM Symposium on Principles of Programming Languages, pp. 228\u2013241 (1999)","DOI":"10.1145\/292540.292561"},{"key":"27_CR25","unstructured":"Myers, A.C., Zheng, L., Zdancewic, S., Chong, S., Nystrom, N.: Jif: Java information flow (2001). http:\/\/www.cs.cornell.edu\/jif"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Pottier, F., Simonet, V.: Information flow inference for ML. In: ACM Symposium on Principles of Programming Languages, pp. 319\u2013330 (2002)","DOI":"10.1145\/565816.503302"},{"key":"27_CR27","unstructured":"Pottier, F.: A simple view of type-secure information flow in the $$\\pi $$-calculus. In: IEEE Computer Security Foundations Workshop, pp. 320\u2013330 (2002)"},{"key":"27_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-30806-7_2","volume-title":"Engineering Secure Software and Systems","author":"W Rafnsson","year":"2016","unstructured":"Rafnsson, W., Garg, D., Sabelfeld, A.: Progress-sensitive security for SPARK. In: Caballero, J., Bodden, E., Athanasopoulos, E. (eds.) ESSoS 2016. LNCS, vol. 9639, pp. 20\u201337. Springer, Heidelberg (2016). doi:10.1007\/978-3-319-30806-7_2"},{"key":"27_CR29","doi-asserted-by":"crossref","unstructured":"Roy, I., Porter, D.E., Bond, M.D., McKinley, K.S., Witchel, E.: Laminar: practical fine-grained decentralized information flow control. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI. ACM (2009)","DOI":"10.1145\/1542476.1542484"},{"key":"27_CR30","doi-asserted-by":"crossref","unstructured":"Russo, A., Claessen, K., Hughes, J.: A library for light-weight information-flow security in Haskell. In: ACM SIGPLAN Symposium on Haskell. ACM (2008)","DOI":"10.1145\/1411286.1411289"},{"key":"27_CR31","doi-asserted-by":"crossref","unstructured":"Russo, A.: Functional pearl: two can keep a secret, if one of them uses Haskell. In: ACM SIGPLAN International Conference on Functional Programming, ICFP. ACM (2015)","DOI":"10.1145\/2784731.2784756"},{"issue":"1","key":"27_CR32","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5\u201319 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"27_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-49635-0_1","volume-title":"Principles of Security and Trust","author":"T Schmitz","year":"2016","unstructured":"Schmitz, T., Rhodes, D., Austin, T.H., Knowles, K., Flanagan, C.: Faceted dynamic information flow via control and data monads. In: Piessens, F., Vigan\u00f2, L. (eds.) POST 2016. LNCS, vol. 9635, pp. 3\u201323. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-49635-0_1"},{"key":"27_CR34","unstructured":"Simonet, V.: The Flow Caml system (2003), software release at http:\/\/cristal.inria.fr\/~simonet\/soft\/flowcaml\/"},{"key":"27_CR35","doi-asserted-by":"crossref","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: ACM symposium on Principles of Programming Languages (1998)","DOI":"10.1145\/268946.268975"},{"key":"27_CR36","doi-asserted-by":"crossref","unstructured":"Stefan, D., Russo, A., Buiras, P., Levy, A., Mitchell, J.C., Mazi\u00e9res, D.: Addressing covert termination and timing channels in concurrent information flow systems. In: ACM SIGPLAN International Conference on Functional Programming. ACM (2012)","DOI":"10.1145\/2364527.2364557"},{"key":"27_CR37","doi-asserted-by":"crossref","unstructured":"Stefan, D., Russo, A., Mitchell, J.C., Mazi\u00e8res, D.: Flexible dynamic information flow control in Haskell. In: ACM SIGPLAN Haskell Symposium (2011)","DOI":"10.1145\/2034675.2034688"},{"key":"27_CR38","unstructured":"Stefan, D., Yang, E.Z., Marchenko, P., Russo, A., Herman, D., Karp, B., Mazi\u00e8res, D.: Protecting users by confining JavaScript with COWL. In: USENIX Symposium on Operating Systems Design and Implementation. USENIX Association (2014)"},{"key":"27_CR39","doi-asserted-by":"crossref","unstructured":"Tsai, T.C., Russo, A., Hughes, J.: A library for secure multi-threaded information flow in Haskell. In: IEEE Computer Security Foundations Symposium (2007)","DOI":"10.1109\/CSF.2007.6"},{"key":"27_CR40","unstructured":"Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazi\u00e8res, D.: Making information flow explicit in HiStar. In: USENIX Symposium on Operating Systems Design and Implementation. USENIX (2006)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45744-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T03:00:30Z","timestamp":1631674830000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-45744-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319457437","9783319457444"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45744-4_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"15 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}