{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:50:43Z","timestamp":1725558643469},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540202165"},{"type":"electronic","value":"9783540452089"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45208-9_28","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T04:49:20Z","timestamp":1277700560000},"page":"355-368","source":"Crossref","is-referenced-by-count":1,"title":["Security-Aware Program Transformations"],"prefix":"10.1007","author":[{"given":"Massimo","family":"Bartoletti","sequence":"first","affiliation":[]},{"given":"Pierpaolo","family":"Degano","sequence":"additional","affiliation":[]},{"given":"Gian Luigi","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"15","key":"28_CR1","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"4","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems\u00a04(15), 706\u2013734 (1993)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"28_CR2","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.: Stack inspection and program transformations (2003), http:\/\/www.di.unipi.it\/~bartolet\/static-stack.ps"},{"key":"28_CR3","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.: Static analysis for eager stack inspection. In: Workshop on Formal Techniques for Java-like Programs, FTfJP 2003 (2003)"},{"key":"28_CR4","doi-asserted-by":"crossref","first-page":"217","DOI":"10.3233\/JCS-2001-9303","volume":"9","author":"F. Besson","year":"2001","unstructured":"Besson, F., Jensen, T., Le M\u00e9tayer, D., Thorn, T.: Model checking security properties of control flow graphs. Journal of computer security\u00a09, 217\u2013250 (2001)","journal-title":"Journal of computer security"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Choi, J.-D., Grove, D., Hind, M., Sarkar, V.: Efficient and precise modeling of exceptions for the analysis of Java programs. In: Workshop on Program Analysis For Software Tools and Engineering (1999)","DOI":"10.1145\/316158.316171"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-36575-3_3","volume-title":"Programming Languages and Systems","author":"J. Clemens","year":"2003","unstructured":"Clemens, J., Felleisen, M.: A tail-recursive semantics for stack inspections. In: Degano, P. (ed.) ESOP 2003. LNCS, vol.\u00a02618, pp. 22\u201337. Springer, Heidelberg (2003)"},{"issue":"3","key":"28_CR7","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1145\/641909.641912","volume":"25","author":"C. Fournet","year":"2003","unstructured":"Fournet, C., Gordon, A.D.: Stack inspection: theory and variants. ACM Transactions on Programming Languages and Systems (TOPLAS)\u00a025(3), 360\u2013399 (2003)","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"key":"28_CR8","volume-title":"Inside Java 2 platform security: architecture, API design, and implementation","author":"L. Gong","year":"1999","unstructured":"Gong, L.: Inside Java 2 platform security: architecture, API design, and implementation. Addison-Wesley, Reading (1999)"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45061-0_11","volume-title":"Automata, Languages and Programming","author":"D. Gorla","year":"2003","unstructured":"Gorla, D., Pugliese, R.: Resource access and mobility control with dynamic privileges acquisition. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol.\u00a02719, Springer, Heidelberg (2003)"},{"issue":"6","key":"28_CR10","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1145\/506315.506316","volume":"23","author":"D. Grove","year":"2001","unstructured":"Grove, D., Chambers, C.: A framework for call graph construction algorithms. ACM Transactions on Programming Languages and Systems (TOPLAS)\u00a023(6), 685\u2013746 (2001)","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"issue":"2","key":"28_CR11","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/S0096-0551(98)00003-4","volume":"24","author":"O. Kaser","year":"1998","unstructured":"Kaser, O., Ramakrishnan, C.R.: Evaluating inlining techniques. Computer Languages\u00a024(2), 55\u201372 (1998)","journal-title":"Computer Languages"},{"key":"28_CR12","volume-title":"Proc. of the 17th ACM conference on Object-oriented programming, systems, languages, and applications (OOPSLA 2002)","author":"L. Koved","year":"2002","unstructured":"Koved, L., Pistoia, M., Kershenbaum, A.: Access rights analysis for Java. In: Proc. of the 17th ACM conference on Object-oriented programming, systems, languages, and applications (OOPSLA 2002), ACM Press, New York (2002)"},{"key":"28_CR13","volume-title":"15th Annual Computer Security Application Reference","author":"C. Lai","year":"1999","unstructured":"Lai, C., Gong, L., Koved, L., Nadalin, A., Schemers, R.: User authentication and authorization in the Java platform. In: 15th Annual Computer Security Application Reference, IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"28_CR14","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. International Journal of Information Security (2003)"},{"key":"28_CR15","unstructured":"Microsoft Corp. .NET Framework Developer\u2019s Guide: Securing Applications"},{"key":"28_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03811-6","volume-title":"Principles of Program Analysis","author":"F. Nielson","year":"1999","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.L.: Principles of Program Analysis. Springer, Heidelberg (1999)"},{"key":"28_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/3-540-45309-1_3","volume-title":"Programming Languages and Systems","author":"F. Pottier","year":"2001","unstructured":"Pottier, F., Skalka, C., Smith, S.: A systematic approach to static access control. In: Sands, D. (ed.) ESOP 2001. LNCS, vol.\u00a02028, p. 30. Springer, Heidelberg (2001)"},{"issue":"9","key":"28_CR18","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/32.877846","volume":"26","author":"S. Sinha","year":"2000","unstructured":"Sinha, S., Harrold, M.J.: Analysis and testing of programs with exception handling constructs. Software Engineering\u00a026(9), 849\u2013871 (2000)","journal-title":"Software Engineering"},{"key":"28_CR19","unstructured":"Souter, A., Pollack, L.: Incremental call graph reanalysis for object-oriented software maintenance. In: IEEE International Conference on Software Maintenance (November 2001)"},{"key":"28_CR20","series-title":"SIGPLAN Notices","volume-title":"Proc. of the 2000 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages & Applications (OOPSLA 2000)","author":"V. Sundaresan","year":"2000","unstructured":"Sundaresan, V., Hendren, L., Razafimahefa, C., Vall\u00e9e-Rai, R., Lam, P., Gagnon, E., Godin, C.: Practical virtual method call resolution for Java. In: Proc. of the 2000 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages & Applications (OOPSLA 2000). SIGPLAN Notices, vol.\u00a035(10), ACM Press, New York (2000)"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Tip, F., Palsberg, J.: Scalable propagation-based call graph construction algorithms. In: Proc. of the 2000 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages & Applications, OOPSLA 2000 (2000)","DOI":"10.1145\/353171.353190"},{"issue":"4","key":"28_CR22","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1145\/363516.363520","volume":"9","author":"D.S. Wallach","year":"2001","unstructured":"Wallach, D.S., Appel, A.W., Felten, E.W.: SAFKASI: a security mechanism for language-based systems. ACM TOSEM\u00a09(4), 341\u2013378 (2001)","journal-title":"ACM TOSEM"},{"key":"28_CR23","volume-title":"Presenting C $\\sharp$","author":"C. Wille","year":"2000","unstructured":"Wille, C.: Presenting C $\\sharp$ . SAMS Publishing, USA (2000)"}],"container-title":["Lecture Notes in Computer Science","Theoretical Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45208-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T13:40:54Z","timestamp":1559223654000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45208-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540202165","9783540452089"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45208-9_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}