{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:19:11Z","timestamp":1740100751109,"version":"3.37.3"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/501100004359","name":"Swedish Research Council (VR)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004359","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001729","name":"Swedish Foundation for Strategic Research (SSF)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001729","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005801","name":"Facebook","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005801","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/eurosp53844.2022.00035","type":"proceedings-article","created":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T19:37:33Z","timestamp":1656013053000},"page":"448-466","source":"Crossref","is-referenced-by-count":2,"title":["Dynamic Policies Revisited"],"prefix":"10.1109","author":[{"given":"Amir M.","family":"Ahmadian","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology"}]},{"given":"Musard","family":"Balliu","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.22"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.22"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2166956.2166962"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1996-42-304"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0352"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.31"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41488-6_6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46666-7_3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.16"},{"key":"ref12","article-title":"Dynamic updating of information-flow policies","volume-title":"FCS","author":"Hicks","year":"2005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.17"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.20"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0355"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1554339.1554352"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32004-3_20"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.24"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129511000193"},{"key":"ref20","article-title":"DynCoVer","volume-title":"software release","author":"Ahmadian","year":"2022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00016"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01465-9_4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24732-6_13"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-37621-7_9"},{"key":"ref26","article-title":"ENCoVer","volume-title":"software release","author":"Balliu","year":"2012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-013-0122-2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2000.873645"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/5803.001.0001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45251-6_9"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CSF49147.2020.00022"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-191316"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CSF54842.2022.9919639"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30793-5_10"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.12.002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-15791"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1707801.1706349"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2096148.2034688"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2103621.2103669"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1515\/itit-2014-1051"},{"key":"ref43","article-title":"Attacker control and impact for confidentiality and integrity","volume":"7","author":"Myers","year":"2011","journal-title":"Logical Methods in Computer Science"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.1310740"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1554339.1554348"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17499-5_11"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134054"}],"event":{"name":"2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)","start":{"date-parts":[[2022,6,6]]},"location":"Genoa, Italy","end":{"date-parts":[[2022,6,10]]}},"container-title":["2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9797336\/9797337\/09797339.pdf?arnumber=9797339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T02:02:35Z","timestamp":1705024955000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9797339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/eurosp53844.2022.00035","relation":{},"subject":[],"published":{"date-parts":[[2022,6]]}}}