{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:06:43Z","timestamp":1725548803657},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540229407"},{"type":"electronic","value":"9783540286448"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28644-8_15","type":"book-chapter","created":{"date-parts":[[2010,2,25]],"date-time":"2010-02-25T19:48:13Z","timestamp":1267127293000},"page":"225-239","source":"Crossref","is-referenced-by-count":7,"title":["Type Based Discretionary Access Control"],"prefix":"10.1007","author":[{"given":"Michele","family":"Bugliesi","sequence":"first","affiliation":[]},{"given":"Dario","family":"Colazzo","sequence":"additional","affiliation":[]},{"given":"Silvia","family":"Crafa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/3-540-63141-0_5","volume-title":"CONCUR 1997: Concurrency Theory","author":"M. Abadi","year":"1997","unstructured":"Abadi, M., Gordon, A.D.: Reasoning about cryptographic protocols in the \u03c0 calculus. In: Mazurkiewicz, A., Winkowski, J. (eds.) CONCUR 1997. LNCS, vol.\u00a01243, pp. 59\u201373. Springer, Heidelberg (1997)"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/3-540-44618-4_27","volume-title":"CONCUR 2000 - Concurrency Theory","author":"L. Cardelli","year":"2000","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Secrecy and Group Creation. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol.\u00a01877, pp. 365\u2013379. Springer, Heidelberg (2000)"},{"key":"15_CR3","first-page":"170","volume-title":"CSFW 2003","author":"T. Chothia","year":"2003","unstructured":"Chothia, T., Duggan, D., Vitek, J.: Type-based distributed access control. In: CSFW 2003, pp. 170\u2013184. IEEE, Los Alamitos (2003)"},{"issue":"5","key":"15_CR4","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1145\/570886.570890","volume":"24","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Information flow vs resource access in the asynchronous \u03c0-calculus. ACM TOPLAS\u00a024(5), 566\u2013591 (2002)","journal-title":"ACM TOPLAS"},{"key":"15_CR5","first-page":"82","volume":"173","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. I&C\u00a0173, 82\u2013120 (2002)","journal-title":"I&C"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-540-24727-2_18","volume-title":"Foundations of Software Science and Computation Structures","author":"M. Hennessy","year":"2004","unstructured":"Hennessy, M., Rathke, J., Yoshida, N.: safeDpi: A language for controlling mobile code. In: Walukiewicz, I. (ed.) FOSSACS 2004. LNCS, vol.\u00a02987, pp. 241\u2013256. Springer, Heidelberg (2004)"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K. Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V., Kubo, M.: Language primitives and type discipline for structured communication-based programming. In: Hankin, C. (ed.) ESOP 1998 and ETAPS 1998. LNCS, vol.\u00a01381, pp. 122\u2013138. Springer, Heidelberg (1998)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/3-540-46425-5_12","volume-title":"Secure information flow as typed process behaviour","author":"K. Honda","year":"2000","unstructured":"Honda, K., Vasconcelos, V.T., Yoshida, N.: Secure Information Flow as Typed Process Behaviour. In: Smolka, G. (ed.) ESOP 2000 and ETAPS 2000. LNCS, vol.\u00a01782, pp. 180\u2013199. Springer, Heidelberg (2000)"},{"key":"15_CR9","unstructured":"Kobayashi, N.: Type-based information flow analysis for the \u03c0-calculus. Technical Report TR03-0007, Dept. of Computer Science, Tokyo Institute of Technology (2003)"},{"issue":"1","key":"15_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"B.W. Lampson","year":"1974","unstructured":"Lampson, B.W.: Protection. ACM Operating Systems Rev.\u00a08(1), 18\u201324 (1974)","journal-title":"ACM Operating Systems Rev."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"McCollum, C.J., Messing, J.R., Notargiacomo, L.: Beyond the pale of mac and dac \u2013 defining new forms of access control. In: Proc. of IEEE Symposium on Security and Privacy, pp. 190\u2013200 (1990)","DOI":"10.1109\/RISP.1990.63850"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol\u00a0(4) 410\u2013442 (2000)","DOI":"10.1145\/363516.363526"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Pierce, B., Sangiorgi, D.: Typing and subtyping for mobile processes. Mathematical Structures in Computer Science\u00a06(5) (1996)","DOI":"10.1017\/S096012950007002X"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Pottier, F.: A simple view of type-secure information flow in the \u03c0-calculus. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop, pp. 320\u2013330 (2002)","DOI":"10.1109\/CSFW.2002.1021826"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of Security Analysis and Design","author":"P. Samarati","year":"2001","unstructured":"Samarati, P., di Vimercati, S.d.C.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, p. 137. Springer, Heidelberg (2001)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Munawer, Q.: How to do discretionary access control using roles. In: ACM Workshop on Role-Based Access Control, pp. 47\u201354 (1998)","DOI":"10.1145\/286884.286893"},{"issue":"1","key":"15_CR17","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur.\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"15_CR18","doi-asserted-by":"publisher","first-page":"135","DOI":"10.3233\/JCS-2003-11202","volume":"11","author":"P. Sewell","year":"2003","unstructured":"Sewell, P., Vitek, J.: Secure composition of untrusted code: Boxmpi, wrappers and causality types. Journal of Computer Security\u00a011(2), 135\u2013188 (2003)","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","CONCUR 2004 - Concurrency Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28644-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T11:53:44Z","timestamp":1558871624000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28644-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229407","9783540286448"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28644-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}