{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T10:48:11Z","timestamp":1720435691522},"reference-count":29,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":1461,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Science of Computer Programming"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1016\/j.scico.2014.03.011","type":"journal-article","created":{"date-parts":[[2014,4,7]],"date-time":"2014-04-07T21:15:13Z","timestamp":1396905313000},"page":"200-218","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":5,"special_numbering":"P2","title":["Security type error diagnosis for higher-order, polymorphic languages"],"prefix":"10.1016","volume":"95","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6548-8623","authenticated-orcid":false,"given":"Jeroen","family":"Weijers","sequence":"first","affiliation":[]},{"given":"Jurriaan","family":"Hage","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Holdermans","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.scico.2014.03.011_br0010","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/j.entcs.2007.02.002","article-title":"Access control in a core calculus of dependency","volume":"172","author":"Abadi","year":"2007","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"10.1016\/j.scico.2014.03.011_br0020","series-title":"POPL '99: Proceedings of the 26th ACM SIGPLAN\u2013SIGACT Symposium on Principles of Programming Languages","first-page":"147","article-title":"A core calculus of dependency","author":"Abadi","year":"1999"},{"key":"10.1016\/j.scico.2014.03.011_br0030","series-title":"POPL '82: Proceedings of the 9th ACM SIGPLAN\u2013SIGACT Symposium on Principles of Programming Languages","first-page":"207","article-title":"Principal type-schemes for functional programs","author":"Damas","year":"1982"},{"key":"10.1016\/j.scico.2014.03.011_br0040","series-title":"Introduction to Lattices and Order","author":"Davey","year":"1990"},{"key":"10.1016\/j.scico.2014.03.011_br0050","series-title":"Proceedings of the 44th Annual Southeast Regional Conference, ACM-SE 44","first-page":"543","article-title":"Type inference and informative error reporting for secure information flow","author":"Deng","year":"2006"},{"key":"10.1016\/j.scico.2014.03.011_br0060","series-title":"Proceedings of the ACM SIGPLAN 2010 Workshop on Partial Evaluation and Program Manipulation (PEPM '10)","first-page":"5","article-title":"Corrective hints for type incorrect Generic Java programs","author":"el Boustani","year":"2010"},{"issue":"1","key":"10.1016\/j.scico.2014.03.011_br0070","first-page":"3","article-title":"Improving type error messages for generic java","volume":"24","author":"el Boustani","year":"2012","journal-title":"High.-Order Symb. Comput."},{"issue":"1\u20133","key":"10.1016\/j.scico.2014.03.011_br0080","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.scico.2004.01.004","article-title":"Type error slicing in implicitly typed higher-order languages","volume":"50","author":"Haack","year":"2004","journal-title":"Sci. Comput. Program."},{"key":"10.1016\/j.scico.2014.03.011_br0090","series-title":"Implementation of Functional Languages \u2013 IFL 2006","first-page":"199","article-title":"Heuristics for type error discovery and recovery","volume":"vol. 4449","author":"Hage","year":"2007"},{"key":"10.1016\/j.scico.2014.03.011_br0100","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.entcs.2009.03.021","article-title":"Strategies for solving constraints in type and effect systems","volume":"236","author":"Hage","year":"2009","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"10.1016\/j.scico.2014.03.011_br0110","series-title":"ICFP '07: Proceedings of the 12th ACM SIGPLAN International Conference on Functional Programming","first-page":"235","article-title":"A generic usage analysis with subeffect qualifiers","author":"Hage","year":"2007"},{"key":"10.1016\/j.scico.2014.03.011_br0120","series-title":"Eighth ACM Sigplan International Conference on Functional Programming","first-page":"3","article-title":"Scripting the type inference process","author":"Heeren","year":"2003"},{"key":"10.1016\/j.scico.2014.03.011_br0130","unstructured":"B.J. Heeren, Top quality type error messages (PhD), September 2005."},{"key":"10.1016\/j.scico.2014.03.011_br0140","series-title":"POPL '98: Proceedings of the 25th ACM SIGPLAN\u2013SIGACT Symposium on Principles of Programming Languages","first-page":"365","article-title":"The slam calculus: programming with secrecy and integrity","author":"Heintze","year":"1998"},{"key":"10.1016\/j.scico.2014.03.011_br0150","series-title":"POPL '86: Proceedings of the 13th ACM Symposium on Principles of Programming Languages","first-page":"44","article-title":"A maximum-flow approach to anomaly isolation in unification-based incremental type inference","author":"Johnson","year":"1986"},{"key":"10.1016\/j.scico.2014.03.011_br0160","series-title":"Proceedings of the 13th Conference on USENIX Security Symposium \u2013Volume 13","first-page":"119","article-title":"Finding user\/kernel pointer bugs with type inference","author":"Johnson","year":"2004"},{"key":"10.1016\/j.scico.2014.03.011_br0170","series-title":"Qualified Types: Theory and Practice","author":"Jones","year":"1994"},{"key":"10.1016\/j.scico.2014.03.011_br0180","series-title":"Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering","first-page":"250","article-title":"Effective blame for information-flow violations","author":"King","year":"2008"},{"key":"10.1016\/j.scico.2014.03.011_br0190","first-page":"425","article-title":"Searching for type-error messages","volume":"vol. 42","author":"Lerner","year":"2007"},{"key":"10.1016\/j.scico.2014.03.011_br0200","series-title":"POPL '88: Proceedings of the 15th ACM SIGPLAN\u2013SIGACT Symposium on Principles of Programming Languages","first-page":"47","article-title":"Polymorphic effect systems","author":"Lucassen","year":"1988"},{"key":"10.1016\/j.scico.2014.03.011_br0210","series-title":"Principles of Program Analysis","author":"Nielson","year":"1999"},{"issue":"1","key":"10.1016\/j.scico.2014.03.011_br0220","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/596980.596983","article-title":"Information flow inference for ML","volume":"25","author":"Pottier","year":"2003","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10.1016\/j.scico.2014.03.011_br0230","series-title":"A constraint system for a SML type error slicer","author":"Rahli","year":"2010"},{"key":"10.1016\/j.scico.2014.03.011_br0240","series-title":"Haskell '08: Proceedings of the first ACM SIGPLAN Symposium on Haskell","first-page":"13","article-title":"A library for light-weight information-flow security in Haskell","author":"Russo","year":"2008"},{"key":"10.1016\/j.scico.2014.03.011_br0250","doi-asserted-by":"crossref","first-page":"2003","DOI":"10.1109\/JSAC.2002.806121","article-title":"Language-based information-flow security","volume":"21","author":"Sabelfeld","year":"2003","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.scico.2014.03.011_br0260","series-title":"Proceedings of the 2003 ACM SIGPLAN Workshop on Haskell","first-page":"72","article-title":"Interactive type debugging in Haskell","author":"Stuckey","year":"2003"},{"issue":"2\u20133","key":"10.1016\/j.scico.2014.03.011_br0270","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","article-title":"A sound type system for secure flow analysis","volume":"4","author":"Volpano","year":"1996","journal-title":"J. Comput. Secur."},{"key":"10.1016\/j.scico.2014.03.011_br0280","author":"Weijers"},{"key":"10.1016\/j.scico.2014.03.011_br0290","series-title":"Proceedings of the ACM SIGPLAN 2013 Workshop on Partial Evaluation and Program Manipulation","first-page":"3","article-title":"Security type error diagnosis for higher-order, polymorphic languages","author":"Weijers","year":"2013"}],"container-title":["Science of Computer Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642314001518?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642314001518?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T11:43:33Z","timestamp":1616586213000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167642314001518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":29,"alternative-id":["S0167642314001518"],"URL":"https:\/\/doi.org\/10.1016\/j.scico.2014.03.011","relation":{},"ISSN":["0167-6423"],"issn-type":[{"value":"0167-6423","type":"print"}],"subject":[],"published":{"date-parts":[[2014,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Security type error diagnosis for higher-order, polymorphic languages","name":"articletitle","label":"Article Title"},{"value":"Science of Computer Programming","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.scico.2014.03.011","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}