{"id":"https://openalex.org/W2168095934","doi":"https://doi.org/10.1109/secpri.2004.1301323","title":"Run-time principals in information-flow type systems","display_name":"Run-time principals in information-flow type systems","publication_year":2004,"publication_date":"2004-06-10","ids":{"openalex":"https://openalex.org/W2168095934","doi":"https://doi.org/10.1109/secpri.2004.1301323","mag":"2168095934"},"language":"en","primary_location":{"id":"doi:10.1109/secpri.2004.1301323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secpri.2004.1301323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040820774","display_name":"Stephen Tse","orcid":null},"institutions":[{"id":"https://openalex.org/I36788626","display_name":"California University of Pennsylvania","ror":"https://ror.org/01spssf70","country_code":"US","type":"education","lineage":["https://openalex.org/I36788626"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"S. Tse","raw_affiliation_strings":["University of Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"University of Pennsylvania, USA","institution_ids":["https://openalex.org/I36788626"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041830534","display_name":"Steve Zdancewic","orcid":"https://orcid.org/0000-0002-3516-1512"},"institutions":[{"id":"https://openalex.org/I36788626","display_name":"California University of Pennsylvania","ror":"https://ror.org/01spssf70","country_code":"US","type":"education","lineage":["https://openalex.org/I36788626"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Zdancewic","raw_affiliation_strings":["University of Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"University of Pennsylvania, USA","institution_ids":["https://openalex.org/I36788626"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040820774"],"corresponding_institution_ids":["https://openalex.org/I36788626"],"apc_list":null,"apc_paid":null,"fwci":14.5098,"has_fulltext":false,"cited_by_count":54,"citation_normalized_percentile":{"value":0.98884585,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"179","last_page":"193"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9771000146865845,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8216215372085571},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.6705370545387268},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6182986497879028},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.569746732711792},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.5341873168945312},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5311863422393799},{"id":"https://openalex.org/keywords/compile-time","display_name":"Compile time","score":0.4770185947418213},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.43476665019989014},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.43226373195648193},{"id":"https://openalex.org/keywords/information-protection-policy","display_name":"Information protection policy","score":0.4274557828903198},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.422539085149765},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.41580644249916077},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.27368563413619995},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.26613855361938477},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.11789387464523315}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8216215372085571},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.6705370545387268},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6182986497879028},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.569746732711792},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.5341873168945312},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5311863422393799},{"id":"https://openalex.org/C200833197","wikidata":"https://www.wikidata.org/wiki/Q333707","display_name":"Compile time","level":3,"score":0.4770185947418213},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.43476665019989014},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.43226373195648193},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.4274557828903198},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.422539085149765},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.41580644249916077},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.27368563413619995},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.26613855361938477},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.11789387464523315},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/secpri.2004.1301323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secpri.2004.1301323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.49000000953674316,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1479723338","https://openalex.org/W1497651746","https://openalex.org/W1519566437","https://openalex.org/W1531439671","https://openalex.org/W1541185175","https://openalex.org/W1557561422","https://openalex.org/W1585299317","https://openalex.org/W1589806443","https://openalex.org/W1614902435","https://openalex.org/W1957951093","https://openalex.org/W1961998804","https://openalex.org/W1972238918","https://openalex.org/W1974398164","https://openalex.org/W1977764760","https://openalex.org/W1987339920","https://openalex.org/W1997775274","https://openalex.org/W1998003182","https://openalex.org/W2001674045","https://openalex.org/W2006097813","https://openalex.org/W2011333687","https://openalex.org/W2016017569","https://openalex.org/W2016696108","https://openalex.org/W2017381819","https://openalex.org/W2038677544","https://openalex.org/W2040669676","https://openalex.org/W2057292961","https://openalex.org/W2067012475","https://openalex.org/W2084788336","https://openalex.org/W2100129018","https://openalex.org/W2104152314","https://openalex.org/W2110012131","https://openalex.org/W2122049982","https://openalex.org/W2124260419","https://openalex.org/W2127222666","https://openalex.org/W2134927156","https://openalex.org/W2135103842","https://openalex.org/W2145999544","https://openalex.org/W2148127931","https://openalex.org/W2148973616","https://openalex.org/W2149143260","https://openalex.org/W2150174204","https://openalex.org/W2154564703","https://openalex.org/W2168095934","https://openalex.org/W2174448446","https://openalex.org/W4210285581","https://openalex.org/W6628600897","https://openalex.org/W6632404389","https://openalex.org/W6635103316","https://openalex.org/W6636447621","https://openalex.org/W6654702688","https://openalex.org/W6678997163"],"related_works":["https://openalex.org/W1514244613","https://openalex.org/W2105261429","https://openalex.org/W2128487827","https://openalex.org/W2342414279","https://openalex.org/W2022781334","https://openalex.org/W2178383135","https://openalex.org/W2122049982","https://openalex.org/W30393995","https://openalex.org/W2145834325","https://openalex.org/W2953659785"],"abstract_inverted_index":{"Information-flow":[0],"type":[1],"systems":[2],"are":[3,18],"a":[4,60],"promising":[5],"approach":[6],"for":[7,57,62,83,93],"enforcing":[8],"strong":[9],"end-to-end":[10],"confidentiality":[11,38],"and":[12,89,129],"integrity":[13],"policies.":[14],"Such":[15],"policies,":[16,110],"however,":[17],"usually":[19],"specified":[20],"in":[21,86,97],"term":[22],"of":[23,39,81,116,137],"static":[24],"information-data":[25],"is":[26,50,147],"labeled":[27],"high":[28],"or":[29],"low":[30],"security":[31,65,109,118],"at":[32],"compile":[33],"time.":[34],"In":[35,103],"practice,":[36],"the":[37,48,74,78,114],"data":[40],"may":[41],"depend":[42,68],"on":[43,69],"information":[44],"available":[45],"only":[46],"while":[47],"system":[49],"running.":[51],"This":[52],"paper":[53],"studies":[54],"language":[55],"support":[56],"run-time":[58,91,95,111,138],"principals,":[59],"mechanism":[61],"specifying":[63,94],"information-flow":[64],"policies":[66],"that":[67,144],"which":[70],"principals":[71,92,112,139],"interact":[72],"with":[73,120],"system.":[75],"We":[76,133],"establish":[77],"basic":[79],"property":[80],"noninterference":[82],"programs":[84],"written":[85],"such":[87,100,124,143],"language,":[88],"use":[90],"authority":[96],"downgrading":[98],"mechanisms":[99,119],"as":[101,125],"declassification.":[102],"addition":[104],"to":[105],"allowing":[106],"more":[107],"expressive":[108],"enable":[113],"integration":[115],"language-based":[117],"other":[121],"existing":[122],"approaches":[123],"Java":[126],"stack":[127],"inspection":[128],"public":[130,141],"key":[131],"infrastructures.":[132],"sketch":[134],"an":[135],"implementation":[136],"via":[140],"keys":[142],"principal":[145],"delegation":[146],"verified":[148],"by":[149],"certificate":[150],"chains.":[151]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":4}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
