{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:18:56Z","timestamp":1726409936085},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723945"},{"type":"electronic","value":"9783319723952"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72395-2_20","type":"book-chapter","created":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T09:56:41Z","timestamp":1512727001000},"page":"209-218","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach"],"prefix":"10.1007","author":[{"given":"Kuzman","family":"Katkalov","sequence":"first","affiliation":[]},{"given":"Kurt","family":"Stenzel","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"Reif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,9]]},"reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-54848-2_1","volume-title":"From Programs to Systems. The Systems perspective in Computing","author":"N Ben Said","year":"2014","unstructured":"Ben Said, N., Abdellatif, T., Bensalem, S., Bozga, M.: Model-driven information flow security for component-based systems. In: Bensalem, S., Lakhneck, Y., Legay, A. (eds.) ETAPS 2014. LNCS, vol. 8415, pp. 1\u201320. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-642-54848-2_1"},{"key":"20_CR2","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, p. 21. USENIX Association (2011)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 627\u2013638. ACM (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"20_CR4","unstructured":"Graf, J., Hecker, M., Mohr, M., Snelting, G.: Checking applications using security APIs with JOANA. In: 8th International Workshop on Analysis of Security APIs, July 2015"},{"key":"20_CR5","unstructured":"Hammer, C.: Information Flow Control for Java - A Comprehensive Approach based on Path Conditions in Dependence Graphs. Ph.D. thesis, Universit\u00e4t Karlsruhe (TH), Fak. f. Informatik, July 2009. ISBN 978-3-86644-398-3"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-642-11747-3_4","volume-title":"Engineering Secure Software and Systems","author":"C Hammer","year":"2010","unstructured":"Hammer, C.: Experiences with PDG-based IFC. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 44\u201360. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-11747-3_4"},{"issue":"2","key":"20_CR7","first-page":"65","volume":"2","author":"K Katkalov","year":"2013","unstructured":"Katkalov, K., Stenzel, K., Borek, M., Reif, W.: Model-driven development of information flow-secure systems with IFlow. ASE Sci. J. 2(2), 65\u201382 (2013)","journal-title":"ASE Sci. J."},{"key":"20_CR8","doi-asserted-by":"publisher","unstructured":"Katkalov, K., Stenzel, K., Borek, M., Reif, W.: Modeling information flow properties with UML. In: 2015 7th International Conference on New Technologies, Mobility and Security (NTMS). IEEE Conference Publications (2015). \nhttps:\/\/doi.org\/10.1109\/NTMS.2015.7266507","DOI":"10.1109\/NTMS.2015.7266507"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-642-54792-8_12","volume-title":"Principles of Security and Trust","author":"R K\u00fcsters","year":"2014","unstructured":"K\u00fcsters, R., Scapin, E., Truderung, T., Graf, J.: Extending and applying a framework for the cryptographic verification of Java programs. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol. 8414, pp. 220\u2013239. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-642-54792-8_12"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Truderung, T., Graf, J.: A framework for the cryptographic verification of java-like programs. In: Proceedings of the 2012 IEEE 25th Computer Security Foundations Symposium, CSF 2012, pp. 198\u2013212. IEEE Computer Society, Washington, DC (2012)","DOI":"10.1109\/CSF.2012.9"},{"key":"20_CR11","unstructured":"Lam, P., Bodden, E., Lhot\u00e1k, O., Hendren, L.: The Soot framework for Java program analysis: a retrospective. In: Cetus Users and Compiler Infrastructure Workshop, Galveston Island, TX, October 2011"},{"key":"20_CR12","unstructured":"Mohr, M., Graf, J., Hecker, M.: JoDroid: adding android support to a static information flow control tool. In: Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015, Dresden, Germany, 17.\u201318. M\u00e4rz 2015. CEUR Workshop Proceedings, vol. 1337, pp. 140\u2013145. CEUR-WS.org (2015)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Rasthofer, S., Arzt, S., Bodden, E.: A machine-learning approach for classifying and categorizing android sources and sinks. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23039"},{"key":"20_CR14","unstructured":"Seehusen, F.: Model-driven security: exemplified for information flow properties and policies. Ph.D. thesis, Faculty of Mathematics and Natural Sciences, University of Oslo, January 2009"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/978-3-642-55032-4_46","volume-title":"Information Communication Technology-EurAsia","author":"K Stenzel","year":"2014","unstructured":"Stenzel, K., Katkalov, K., Borek, M., Reif, W.: Formalizing information flow control in a model-driven approach. In: Linawati, Mahendra, M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) ICT-EurAsia 2014. LNCS, vol. 8407, pp. 456\u2013461. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-642-55032-4_46"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Stenzel, K., Katkalov, K., Borek, M., Reif, W.: Declassification of information with complex filter functions. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, pp. 490\u2013497 (2016)","DOI":"10.5220\/0005782904900497"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72395-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T09:10:21Z","timestamp":1512983421000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72395-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723945","9783319723952"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72395-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}