{"id":"https://openalex.org/W2001674045","doi":"https://doi.org/10.1017/s0956796804005441","title":"A monadic analysis of information flow security with mutable state","display_name":"A monadic analysis of information flow security with mutable state","publication_year":2005,"publication_date":"2005-03-01","ids":{"openalex":"https://openalex.org/W2001674045","doi":"https://doi.org/10.1017/s0956796804005441","mag":"2001674045"},"language":"en","primary_location":{"id":"doi:10.1017/s0956796804005441","is_oa":true,"landing_page_url":"https://doi.org/10.1017/s0956796804005441","pdf_url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/01A8F47B757460768168CAF18989F83A/S0956796804005441a.pdf/div-class-title-a-monadic-analysis-of-information-flow-security-with-mutable-state-div.pdf","source":{"id":"https://openalex.org/S12266929","display_name":"Journal of Functional Programming","issn_l":"0956-7968","issn":["0956-7968","1469-7653"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311721","host_organization_name":"Cambridge University Press","host_organization_lineage":["https://openalex.org/P4310311721","https://openalex.org/P4310311702"],"host_organization_lineage_names":["Cambridge University Press","University of Cambridge"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Functional Programming","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/01A8F47B757460768168CAF18989F83A/S0956796804005441a.pdf/div-class-title-a-monadic-analysis-of-information-flow-security-with-mutable-state-div.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045900536","display_name":"Karl Crary","orcid":"https://orcid.org/0000-0002-1556-2183"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"KARL CRARY","raw_affiliation_strings":["Carnegie Mellon University, 5000 Forbes Avenue Pittsburgh, PA 15213 USA","Carnegie Mellon University, 5000 Forbes Avenue Pittsburgh, PA 15213 USA (email: crary@cs.cmu.edu, aleksey@cs.cmu.edu, fp@cs.cmu.edu)#TAB#"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, 5000 Forbes Avenue Pittsburgh, PA 15213 USA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"Carnegie Mellon University, 5000 Forbes Avenue Pittsburgh, PA 15213 USA (email: crary@cs.cmu.edu, aleksey@cs.cmu.edu, fp@cs.cmu.edu)#TAB#","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042714579","display_name":"Aleksey Kliger","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"ALEKSEY KLIGER","raw_affiliation_strings":["Carnegie Mellon University, 5000 Forbes Avenue Pittsburgh, PA 15213 USA","Carnegie Mellon University, 5000 Forbes Avenue Pittsburgh, PA 15213 USA (email: crary@cs.cmu.edu, aleksey@cs.cmu.edu, fp@cs.cmu.edu)#TAB#"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, 5000 Forbes Avenue Pittsburgh, PA 15213 USA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"Carnegie Mellon University, 5000 Forbes Avenue Pittsburgh, PA 15213 USA (email: crary@cs.cmu.edu, aleksey@cs.cmu.edu, fp@cs.cmu.edu)#TAB#","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021476649","display_name":"Frank Pfenning","orcid":"https://orcid.org/0000-0002-8279-5817"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"FRANK PFENNING","raw_affiliation_strings":["Carnegie Mellon University, 5000 Forbes Avenue Pittsburgh, PA 15213 USA","Carnegie Mellon University, 5000 Forbes Avenue Pittsburgh, PA 15213 USA (email: crary@cs.cmu.edu, aleksey@cs.cmu.edu, fp@cs.cmu.edu)#TAB#"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, 5000 Forbes Avenue Pittsburgh, PA 15213 USA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"Carnegie Mellon University, 5000 Forbes Avenue Pittsburgh, PA 15213 USA (email: crary@cs.cmu.edu, aleksey@cs.cmu.edu, fp@cs.cmu.edu)#TAB#","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5045900536"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":6.8625,"has_fulltext":true,"cited_by_count":40,"citation_normalized_percentile":{"value":0.96629738,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"15","issue":"2","first_page":"249","last_page":"291"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9690999984741211,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8560388088226318},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.7033218145370483},{"id":"https://openalex.org/keywords/metalanguage","display_name":"Metalanguage","score":0.6892555356025696},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6050540804862976},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5259150266647339},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5144445896148682},{"id":"https://openalex.org/keywords/monad","display_name":"Monad (category theory)","score":0.5043312311172485},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5005433559417725},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.4252282977104187},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.41824251413345337},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34796565771102905},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09653541445732117},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.09221109747886658},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.08113515377044678}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8560388088226318},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.7033218145370483},{"id":"https://openalex.org/C142998047","wikidata":"https://www.wikidata.org/wiki/Q193983","display_name":"Metalanguage","level":2,"score":0.6892555356025696},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6050540804862976},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5259150266647339},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5144445896148682},{"id":"https://openalex.org/C33959348","wikidata":"https://www.wikidata.org/wiki/Q1630568","display_name":"Monad (category theory)","level":3,"score":0.5043312311172485},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5005433559417725},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.4252282977104187},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.41824251413345337},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34796565771102905},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09653541445732117},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.09221109747886658},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.08113515377044678},{"id":"https://openalex.org/C156772000","wikidata":"https://www.wikidata.org/wiki/Q864475","display_name":"Functor","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1017/s0956796804005441","is_oa":true,"landing_page_url":"https://doi.org/10.1017/s0956796804005441","pdf_url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/01A8F47B757460768168CAF18989F83A/S0956796804005441a.pdf/div-class-title-a-monadic-analysis-of-information-flow-security-with-mutable-state-div.pdf","source":{"id":"https://openalex.org/S12266929","display_name":"Journal of Functional Programming","issn_l":"0956-7968","issn":["0956-7968","1469-7653"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311721","host_organization_name":"Cambridge University Press","host_organization_lineage":["https://openalex.org/P4310311721","https://openalex.org/P4310311702"],"host_organization_lineage_names":["Cambridge University Press","University of Cambridge"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Functional Programming","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1017/s0956796804005441","is_oa":true,"landing_page_url":"https://doi.org/10.1017/s0956796804005441","pdf_url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/01A8F47B757460768168CAF18989F83A/S0956796804005441a.pdf/div-class-title-a-monadic-analysis-of-information-flow-security-with-mutable-state-div.pdf","source":{"id":"https://openalex.org/S12266929","display_name":"Journal of Functional Programming","issn_l":"0956-7968","issn":["0956-7968","1469-7653"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311721","host_organization_name":"Cambridge University Press","host_organization_lineage":["https://openalex.org/P4310311721","https://openalex.org/P4310311702"],"host_organization_lineage_names":["Cambridge University Press","University of Cambridge"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Functional Programming","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1792423808","display_name":"ITR/SY+SI: Language Technology for Trustless Software Dissemination","funder_award_id":"0121633","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G969786477","display_name":"CAREER: Type-Driven Language Technology for Software and Information Infrastructure","funder_award_id":"9984812","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2001674045.pdf","grobid_xml":"https://content.openalex.org/works/W2001674045.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W46637447","https://openalex.org/W1531439671","https://openalex.org/W1582983062","https://openalex.org/W1589806443","https://openalex.org/W1972238918","https://openalex.org/W1979101142","https://openalex.org/W1981311833","https://openalex.org/W1988824860","https://openalex.org/W1997143185","https://openalex.org/W2001674045","https://openalex.org/W2016017569","https://openalex.org/W2023931614","https://openalex.org/W2040669676","https://openalex.org/W2057503672","https://openalex.org/W2061056245","https://openalex.org/W2067012475","https://openalex.org/W2069107692","https://openalex.org/W2122049982","https://openalex.org/W2150174204","https://openalex.org/W2156876717","https://openalex.org/W2158126684","https://openalex.org/W2295903522","https://openalex.org/W4237073413"],"related_works":["https://openalex.org/W2188814192","https://openalex.org/W2114705216","https://openalex.org/W3094039898","https://openalex.org/W2151761340","https://openalex.org/W1555133226","https://openalex.org/W2173238669","https://openalex.org/W2130339907","https://openalex.org/W1519114293","https://openalex.org/W2188404590","https://openalex.org/W2105261429"],"abstract_inverted_index":{"We":[0],"explore":[1],"the":[2,27,41,75,83,98],"logical":[3],"underpinnings":[4],"of":[5,19,65,74,86,103,110],"higher-order,":[6],"security-typed":[7,48],"languages":[8,89],"with":[9,34,37,52,72,82],"mutable":[10,76],"state.":[11],"Our":[12],"analysis":[13,105],"is":[14,93],"based":[15],"on":[16,97],"a":[17,62,126],"logic":[18,25,32],"information":[20,91],"flow":[21,92],"derived":[22],"from":[23],"lax":[24],"and":[26],"monadic":[28],"metalanguage.":[29],"Thus,":[30],"our":[31,104],"deals":[33],"mutation":[35,53],"explicitly,":[36],"impurity":[38],"reflected":[39],"in":[40,43,107],"types,":[42],"contrast":[44],"to":[45],"most":[46],"higher-order":[47],"languages,":[49],"which":[50],"deal":[51],"implicitly":[54],"via":[55],"side-effects.":[56],"More":[57],"importantly,":[58],"we":[59],"also":[60],"take":[61],"store-oriented":[63],"view":[64,79],"security,":[66],"wherein":[67],"security":[68],"levels":[69],"are":[70],"associated":[71],"elements":[73],"store.":[77,99],"This":[78],"matches":[80],"closely":[81],"operational":[84],"semantics":[85],"low-level":[87],"imperative":[88],"where":[90],"expressed":[94],"by":[95],"operations":[96],"An":[100],"interesting":[101],"feature":[102],"lies":[106],"its":[108],"treatment":[109],"upcalls":[111],"(low-security":[112],"computations":[113],"that":[114],"include":[115],"high-security":[116],"ones),":[117],"employing":[118],"an":[119],"\u201cinformativeness\u201d":[120],"judgment":[121],"indicating":[122],"under":[123],"what":[124],"circumstances":[125],"type":[127],"carries":[128],"useful":[129],"information.":[130]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":5}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
