{"id":"https://openalex.org/W2911819040","doi":"https://doi.org/10.1007/978-3-030-17138-4_3","title":"A Dependently Typed Library for Static Information-Flow Control in Idris","display_name":"A Dependently Typed Library for Static Information-Flow Control in Idris","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2911819040","doi":"https://doi.org/10.1007/978-3-030-17138-4_3","mag":"2911819040"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-17138-4_3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-17138-4_3","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-030-17138-4_3.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-030-17138-4_3.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Simon Gregersen","orcid":null},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Simon Gregersen","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":null,"display_name":"S\u00f8ren Eller Thomsen","orcid":null},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"S\u00f8ren Eller Thomsen","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"last","author":{"id":null,"display_name":"Aslan Askarov","orcid":null},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Aslan Askarov","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I204337017"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":0.5518,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.64457866,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"51","last_page":"75"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.004600000102072954,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.0010999999940395355,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.644599974155426},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.6198999881744385},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5713000297546387},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5447999835014343},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4991999864578247},{"id":"https://openalex.org/keywords/exception-handling","display_name":"Exception handling","score":0.453900009393692},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4422999918460846},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.3497999906539917}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8838000297546387},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.644599974155426},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6230000257492065},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.6198999881744385},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5713000297546387},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5447999835014343},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4991999864578247},{"id":"https://openalex.org/C145428669","wikidata":"https://www.wikidata.org/wiki/Q471748","display_name":"Exception handling","level":2,"score":0.453900009393692},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4422999918460846},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3993000090122223},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.3497999906539917},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.33660000562667847},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32989999651908875},{"id":"https://openalex.org/C2988963302","wikidata":"https://www.wikidata.org/wiki/Q629206","display_name":"Program code","level":2,"score":0.30979999899864197},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.29829999804496765},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.29809999465942383},{"id":"https://openalex.org/C20528804","wikidata":"https://www.wikidata.org/wiki/Q997433","display_name":"Dependent type","level":3,"score":0.2955000102519989},{"id":"https://openalex.org/C93682546","wikidata":"https://www.wikidata.org/wiki/Q1056428","display_name":"Type theory","level":3,"score":0.2822999954223633},{"id":"https://openalex.org/C7051814","wikidata":"https://www.wikidata.org/wiki/Q1051282","display_name":"Generic programming","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.2639999985694885},{"id":"https://openalex.org/C84511453","wikidata":"https://www.wikidata.org/wiki/Q2914952","display_name":"Concurrency control","level":3,"score":0.25940001010894775},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C2987117450","wikidata":"https://www.wikidata.org/wiki/Q275603","display_name":"Logic program","level":3,"score":0.2538999915122986}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-030-17138-4_3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-17138-4_3","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-030-17138-4_3.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:arXiv.org:1902.06590","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1902.06590","pdf_url":"https://arxiv.org/pdf/1902.06590","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:pure.atira.dk:openaire/509b4f64-791c-453c-81ee-a05ab73f2c4b","is_oa":true,"landing_page_url":"https://pure.au.dk/portal/en/publications/509b4f64-791c-453c-81ee-a05ab73f2c4b","pdf_url":"https://pure.au.dk/ws/files/194217008/A_Dependently_Typed_Library_for_Static_Information_Flow_Control_in_IDRIS.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Gregersen, S O, Thomsen, S E & Askarov, A 2019, A Dependently Typed Library for Static Information-Flow Control in IDRIS. in F Nielson & D Sands (eds), Principles of Security and Trust : 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings. Springer, Cham, Lecture Notes in Computer Science, vol. 11426, pp. 51-75, 8th International Conference on Principles of Security and Trust , Prag, Czech Republic, 11/04/2019. https://doi.org/10.1007/978-3-030-17138-4_3","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1007/978-3-030-17138-4_3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-17138-4_3","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-030-17138-4_3.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320309928","display_name":"Aarhus Universitet","ror":"https://ror.org/01aj84f44"},{"id":"https://openalex.org/F4320321446","display_name":"Aarhus Universitets Forskningsfond","ror":"https://ror.org/01aj84f44"},{"id":"https://openalex.org/F4320322928","display_name":"Danmarks Frie Forskningsfond","ror":"https://ror.org/02sptwz63"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2911819040.pdf","grobid_xml":"https://content.openalex.org/works/W2911819040.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W153174126","https://openalex.org/W1538511530","https://openalex.org/W1819958245","https://openalex.org/W1957951093","https://openalex.org/W1986402635","https://openalex.org/W1991895580","https://openalex.org/W1999602293","https://openalex.org/W2005525408","https://openalex.org/W2027961147","https://openalex.org/W2028705369","https://openalex.org/W2033178475","https://openalex.org/W2060493407","https://openalex.org/W2060710422","https://openalex.org/W2064138295","https://openalex.org/W2070093650","https://openalex.org/W2088923183","https://openalex.org/W2099878912","https://openalex.org/W2100233145","https://openalex.org/W2106226772","https://openalex.org/W2106393422","https://openalex.org/W2110904621","https://openalex.org/W2113068339","https://openalex.org/W2116236474","https://openalex.org/W2116469687","https://openalex.org/W2122049982","https://openalex.org/W2122643307","https://openalex.org/W2128932642","https://openalex.org/W2129278597","https://openalex.org/W2136624255","https://openalex.org/W2145108549","https://openalex.org/W2145846275","https://openalex.org/W2146717998","https://openalex.org/W2154564703","https://openalex.org/W2155317744","https://openalex.org/W2158126684","https://openalex.org/W2162755110","https://openalex.org/W2165078378","https://openalex.org/W2295903522","https://openalex.org/W2538446731","https://openalex.org/W2617606417","https://openalex.org/W2774134654","https://openalex.org/W2799208700","https://openalex.org/W2896239678","https://openalex.org/W4240226860"],"related_works":[],"abstract_inverted_index":{"Safely":[0],"integrating":[1],"third-party":[2],"code":[3],"in":[4,50],"applications":[5],"while":[6],"protecting":[7],"the":[8,59],"confidentiality":[9],"of":[10,61,88],"information":[11],"is":[12],"a":[13,40,71,78],"long-standing":[14],"problem.":[15],"Pure":[16],"functional":[17],"programming":[18],"languages,":[19],"like":[20,32],"Haskell,":[21],"make":[22],"it":[23],"possible":[24],"to":[25],"enforce":[26],"lightweight":[27],"information-flow":[28,48,64,74],"control":[29,49,65],"through":[30],"libraries":[31,66],"MAC":[33,41],"by":[34],"Russo.":[35],"This":[36],"work":[37],"presents":[38],"DepSec,":[39],"inspired,":[42],"dependently":[43],"typed":[44],"library":[45],"for":[46],"static":[47,63],"Idris.":[51],"We":[52],"showcase":[53],"how":[54,68],"adding":[55],"dependent":[56,73,95],"types":[57],"increases":[58],"expressiveness":[60],"state-of-the-art":[62],"and":[67,85],"DepSec":[69],"matches":[70],"special-purpose":[72],"type":[75],"system":[76],"on":[77],"key":[79],"example.":[80],"Finally,":[81],"we":[82],"show":[83],"novel":[84],"powerful":[86],"means":[87],"specifying":[89],"statically":[90],"enforced":[91],"declassification":[92],"policies":[93],"using":[94],"types.":[96]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2019-02-21T00:00:00"}
